Is Pamela Anderson Dating French Soccer Star Adil Rami? – PEOPLE.com

DoesPamela Anderson have a new French beau?

The formerBaywatch star, 49, was seen kicking it with French soccer star Adil Rami, 31, in St. Tropez on Thursday, where the two shared a cozy dinner at La Gioa restaurant.

The duo sparked rumors in the French media after they were spotted out together in Nice over a week ago. Theyve also reportedly been seen spending time together around St. Tropez.

Rami, who born on the island of Corsica to Moroccan parents, played defense for Sevilla FC and the French national team. He earned himself the nickname Shrek because, asESPN explained in 2011, Rami eats voraciously and has been known, just occasionally, to belch. Loudly.

What Andersons budding relationship with Rami means for her other rumored love interest,Julian Assange, remains unclear. The controversial Wikileaks founder remains holed up in the Ecuadorian Embassy in London. The actress was first spotted visiting him therelast October, and shes written about her numerous visits to him inseveral lengthy posts on her website.

RELATED: Proud Mom Pamela Anderson Hits the Red Carpet With 21-Year-Old Son Brandon Lee

Anderson recently announced plans to open a restaurant to support Assanges release. Shes proposed opening an all-vegan pop-up in the South of France for 50 nights and says she has invited French President Emmanuel Macron and his wife to attend.

Join me on the day I open the doors, and we will sit and eat good food and discuss what can be done for Julian. France could display its strength, and so could you, if you give Julian asylum, she wrote in an onlinetribute to Assange.

Assange has claimed political asylum at the embassy since 2012 in order to avoid facing extradition to Sweden over a rape allegation he has long refuted. Assange has said he fears being sent to the U.S. to face espionage charges in relation to WikiLeaks.

Read the original post:
Is Pamela Anderson Dating French Soccer Star Adil Rami? - PEOPLE.com

Cryptocurrency: Funds of the future? – THE BUSINESS TIMES

VIRTUAL currencies have been said to capture the imagination of some, strike fear among others, and confuse the heck out of the rest of us. What exactly are they? Should we invest in them? Where do we even start? Here are some of the most popular questions answered.

What is cryptocurrency?

Cryptocurrency is digital money created from code. Most cryptocurrencies are built on blockchain, an incorruptible digital ledger of all economic transactions made in virtual currency. The cryptocurrency economy is free of all government oversight and monitored by a peer-to-peer Internet protocol.

What are the major cryptocurrencies?

Bitcoin (founded in 2008), Ethereum (2015) and Ripple (2014).

How much are these worth today?

Let's just say anyone who's bought cryptocurrency before 2017 would have made astronomical gains (see graphs below).

Why invest in cryptocurrency now?

Cryptocurrency is said to be one of the best-performing assets in the last two years. Its market added nearly US$7 billion in value in just the first quarter of 2017, going by a CoinDesk report.

Bitcoin, whose price topped US$2,000 per coin for the first time in May, has arguably entered the mainstream. You can actually use it to buy stuff now, at retailers such as Microsoft, OkCupid and even Subway.

How to invest - where to even start?

First, there are two ways one can invest using cryptocurrency:

1. Buy and sell cryptocurrency. One can do this through platforms such as Coinbase, Coinhako and CoinMama using a credit card, debit card or bank transfer. Identity verification may be required for large transactions on some platforms.

Notably, a majority of cryptocurrency investors conduct only this form of investment, where they wait for prices of virtual currencies to appreciate before selling them.

2. Buy cryptocurrency, and participate in initial coin offerings (ICOs). One can do this on token markets or cryptocurrency crowdfunding sites such as TokenMarket or FundYourselfNow (Singapore-founded).

An ICO allows startups with innovative products to issue their own digital tokens that can be bought by investors or backers using virtual currencies. Digital tokens typically entitle backers to monetary rewards (such as profit sharing), or non-monetary rewards (exclusive products).

Notably, only a minority of cryptocurrency investors buy virtual currencies and participate in ICOs. The latter is considered a more speculative form of cryptocurrency investment, as it entails backing a young and thus high-risk company, and profiting only if the company succeeds.

How much to invest for the first time?

The rule of thumb is to not invest what you cannot afford to lose. The cryptocurrency market is uniquely unregulated and extremely volatile: prices can one day rise by 100 per cent and plunge 50 per cent the next day. Panic selling is very common.

One should therefore not invest in cryptocurrency if he or she is unaccustomed to wild price fluctuations.

Early adopters recommend S$4,000 as a good first amount to set aside for such investing, and to never let cryptocurrencies occupy more than 50 per cent of one's portfolio.

More here:
Cryptocurrency: Funds of the future? - THE BUSINESS TIMES

This Is the Cryptocurrency Mark Cuban Is Backing – Fortune

Entrepreneur Mark Cuban, who previously helped Bitcoin's value drop after calling it a "bubble," is now interested in another digital currency. And no, it is not Ethereum, but the UnikoinGold .

According the Coindesk , Cuban is participating in another fundraising round of one of his portfolio companies , a sports-betting blockchain platform dubbed Unikrn, via an initial coin offering.

An ICO is a crowdfunding method that has grown in popularity as of late among blockchain startups, with more than 30 ICOs already this year. Companies sell their own digital currencies and use the proceeds to fund their businesses .

Unikrn has already raised some $10 million from investors, including Ashton Kutcher. The company allows anyone to place bets with its digital token, the Unikoin, according to Coindesk.

Investors will be allowed to register for the pre-sale starting mid-July. About 1 billion UnikoinGold tokens will be up for grabs.

The company has yet to establish a price for the UnikoinGold, though investors will be able to exchange digital currency for Ether, the token under Ethereum.

Read more here:
This Is the Cryptocurrency Mark Cuban Is Backing - Fortune

A Wall Street bank is betting Nvidia will win the cryptocurrency battle (NVDA, AMD) – Business Insider

Genesis Mining

Nvidia and AMD are in a war.

The two companies both produce graphics cards and compete over PC gamers, self-driving car manufacturers and data center managers to prove that their technology is superior. Nvidiatends to be ahead in many of those markets and has seen its stock rise more this year because of it.

A new market is emerging though. The two graphics processing unit (GPU) companies are currently fighting over the cryptocurrency GPU market, and both are rumored to be releasing cryptocurrency optimized chips in the near future, according to RBC Capital Markets.

Cryptocurrencies are red-hot right now. Bitcoin is probably the most notable and has been around for years. But, recent explosive growth in rival currency Ethereum, has been making headlines. Recently, $100 million worth of GPUs were added to the Ethereum network in just 11 days.

The cryptocurrencies are made up of a decentralized network of users, and every time a transaction occurs in one of these currencies, it has to be verified by the whole network. People who help confirm these transactions are called "miners" and often use GPUs to speed up the calculations required to verify payments.

Previously, miners have used GPUs designed for gaming in their computers. This works, but isn't optimized for the task. Nvidia and AMD could release new cards that are optimized to draw as little power as possible and increase the speed of cryptocurrency specific tasks.

RBC reckons that when this happens, Nvidia's chip will outpace its rival AMD.

"Given Nvidia's performance lead across numerous categories (gaming and data center) we think the Company is best positioned to become the market leader in GPU based cryptocurrency mining if a new product is released," RBC wrote in a recent note to clients.

Details about the new cards are sparse, and their existence is only rumored for now. Considering only current GPUs, AMD has beaten out Nvidia because it has been faster at mining-specific tasks. RBC is betting this will change soon. When Nvidia has time to optimize their technology for mining, RBC thinks the company will be able to outpace AMD.

Previous domination in markets Nvidia has set its sights on is really the only information RBC is working with. Until the new cards come out or are officially announced, improvements are only hypothetical. RBC thinks Nvidia's work in data centers and high-end consumer gaming is enough to bet on the company winning the cryptocurrency market as well. Nvidia is certainly making waves in the self-driving car market, with a recent slate of high-profile partnerships.

Onlytime will tell. Nvidia is up 43.4% this year, compared to AMD's 10.24% increase and the general S&P 500's 7.17% increase.

Markets Insider

Read the original post:
A Wall Street bank is betting Nvidia will win the cryptocurrency battle (NVDA, AMD) - Business Insider

Nvidia Could Have the Best Cryptocurrency Chip Out There…Soon – TheStreet.com

Graphics chip makers Nvidia Corp. (NVDA) and Advanced Micro Devices Inc. (AMD) are both working on graphics processing units (GPU) specifically for processing cryptocurrency transactions, and RBC Capital bet on Nvidia to make the superior chip in their note Friday.

Every time a transaction occurs in one of the cryptocurrency markets a GPU speeds up the calculations needed to verify payments. Nvidia and AMD currently make GPUs for everything from video games to self-driving vehicles but don'thave a chip specifically for cryptocurrency, yet, RBC said.

AMD's shares fell 0.5% to $12.54 early Friday afternoon. Nvidia's were down 0.7% to $145.64.

What's Hot On TheStreet

Get ready Tesla fanboys: Tesla Inc. (TSLA) CEO Elon Musk said Friday there would be "news on Sunday" about the company's much anticipated Model 3. While that's all fine and good, what Musk won't tell people is how his electric car company may be speeding toward a monopoly.

Tesla's master plan may hold the key for saving the future of the auto industry, a Moody's Analystics researcher told TheStreet.

With the advance of self-driving vehicles, Tony Hughes, managing director at Moody's Analytics, argued it is not the cars themselves that could lead to the decline in the automotive industry but ride-sharing services like Uber or Lyft. The plan CEO Elon Musk has laid out to create a fleet of self-driving Tesla vehicles for ride-sharing purposes could be the way to save automakers from a demise.

A VIP gives his market outlook: Nobel Prize winning-economist Robert Shiller told TheStreet's Anders Keitz that U.S. equities markets are "quite high" currently but may go even higher in coming months, and that's why he's not exiting the market completely. Indeed there's another thing that could have an unpredictable effect on the market Shiller explains: The narrative around Donald Trump.

"Short-run forecasting of the market is very hard," said Shiller. "I think it's a time for caution, but it could go up substantially."

Apple iPhone 8 pictures leak: Apple's (AAPL) iPhone 8 looks kind of cool. That is if yet another photo leak is to be believed. Noted Apple information leaker Benjamin Geskin tweeted photos of an alleged iPhone 8 finished prototype on Thursday evening (head here to see). Suffice it to say, Apple is gearing up for the mother of all product launches. And consumers look ready to respond.

About 92% of iPhone owners say they are "somewhat likely or "extremely likely" to upgrade their smartphone in the next 12 months, according to a note from Morgan Stanley. The loyalty rate is up sharply from 86% one year ago.

Nike managed to excite Wall Street: After a major restructuring announcement, Nike (NKE) was able to boost Wall Street's views on the company's prospects. On an earnings call Thursday evening, Mark Parker, Nike CEO and board chairman, said its pricey new Air VaporMax sneakers drove sales in the quarter and that there will be new styles coming to the brand sometime this summer. There are also "a few more surprises along the way," Parker said.

As TheStreet's Lindsay Rittenhouse reports, Nike also confirmed that it teamed up with Amazon (AMZN) to sell certain products on the e-commerce conglomerate's site. The company is also selling directly to consumers via Instagram.

Apple is a holding in Jim Cramer's Action Alerts PLUS Charitable Trust Portfolio. Want to be alerted before Cramer buys or sells AAPL? Learn more now .

Visit here for the latest business headlines.

See the article here:
Nvidia Could Have the Best Cryptocurrency Chip Out There...Soon - TheStreet.com

From Chelsea Manning’s DNA Springs an Art Show – New York Times

The 3D-printed portraits, titled Probably Chelsea, will hang on fishing line from a dropped ceiling in the center of the gallery. The gallerys director, Iliya Fridman, said, The Probably Chelseas will be in a lot of different places on the gender and race spectrum. It really demonstrates that there are so many elements of DNA that are common to humans.

The show isnt supposed to be about WikiLeaks, Mr. Fridman said, but sometimes the political parallel is too powerful to resist. A super-powerful dynamic happening here is that the freedom one could gain by defining ones own DNA in a variety of ways is really metaphorical to the freedom the entire country could gain from releasing secret data, Mr. Fridman said.

Mr. Fridman said the show would also feature images from a graphic short story illustrated by Shoili Kanungo, Suppressed Images, that recounts the collaboration between Ms. Manning and Ms. Dewey-Hagborg. The story ends with an image of Ms. Manning going to a gallery after her release.

Read more here:
From Chelsea Manning's DNA Springs an Art Show - New York Times

How Trump’s infuriating secrecy could backfire and lead to long-needed transparency reforms – Vox

Outside contributors' opinions and analysis of the most important issues in politics, science, and culture.

For people who care about good government, its been a bleak six months. Transparency has rarely been part of the ruling ethos in Washington, but secrecy has seldom been so en vogue. Information that politicians typically disclose tax returns, lists of White House visitors, draft legislation have disappeared. On-camera press briefings, presidential press conferences, answers to basic questions about administration positions these have dried up, too.

In both Congress and the White House, officials have violated transparency norms with such regularity, and so little pushback, that its a wonder those norms were effective as long as they were.

It may feel pointless to push for openness in a Washington that is so invested in secrecy. But there are reasons to be hopeful. Stonewalling by the Trump administration has already infuriated Congress. Why are you not answering these questions? Democratic Sen. Angus King barked in a testy exchange with Trumps NSA director, Adm. Michael Rogers, in a recent hearing probing whether President Donald Trump has tried to slow or stop the investigation into his administrations possible ties with Russia. What is classified about a conversation involving whether or not should you should intervene in the FBI investigation?

And Democrats arent the only ones fuming. Jason Chaffetz, a Republican congressman who built his career investigating the Obama administration, recently threw his hands up over obstructionism from the Trump White House. After years of hounding the Obama administration for information about various controversies (and pseudo-controversies), hed expected the Trump administration to be more open. In many ways, its almost worse, he said.

In the past, aggressive secrecy has led to a reformist backlash, triggering leaks, hearings, and ultimately government change. As Americans lost faith in their government in the 1960s and 1970s, they supported new legislation to ensure transparency, including the Freedom of Information Act and the Sunshine Law and to create ethical rules. How they did so can provide a roadmap to transparency advocates seeking to wrench open the window of reform today.

When people trusted government, secrecy flourished. The new national security state, formalized by the 1947 National Security Act, built up an intelligence regime that thrived on tightly held information. The press colluded with this secrecy in large ways and small, covering up illnesses and affairs, obsequiously deferring to government officials. Kennett Love, a reporter for the New York Times stationed in Iran during the 1953 coup, admitted that his bureau chief told him soon afterward that the CIA had helped to overthrow the democratically elected government in Tehran, but neither ever wrote about it.

Reporters and news executives didnt just keep state secrets in the 1950s and 1960s they collected them. At least 22 American news organizations employed journalists who reported to the CIA, like Austin Goodrich, a stringer at CBS News who was a journalist-spy, working undercover for the agency while filing reports about Scandinavia, including pieces on Soviet influence in the region.

In 1951, Harry Truman issued an executive order that created the system for classifying government information that exists to this day. It allowed the government to label information confidential, secret, or top secret, thereby creating an incentive to pull more and more information out of the public domain. Today, some 77 million documents are classified every year, although experts believe the majority of those documents should be available to the public.

But even by the late 1950s, some government officials worried that far too much information was being made secret.

The leader in that early fight for more transparency was Rep. John Moss, a California Democrat who entered office in 1953. Moss was particularly concerned about the way President Dwight D. Eisenhowers executive branch was refusing to answer questions from reporters, or even Congress

Moss, who sat on the Civil Service Committee, wanted to investigate charges made by Republicans that Harry Truman had turned a blind eye to the problem of subversive government employees. He wanted to dispel the innuendo, but when he asked for information from the Civil Service Commission, the agency denied his request. He was stunned. How could one part of the government deny a legitimate request for information from another part?

When John F. Kennedy was president, Moss was no less fierce in his criticisms about secrecy, arguing that Kennedy built on the practices the Eisenhower administration had pioneered. Early in the Kennedy administration, Moss challenged the restrictions placed on pool reporters during the Cuban Missile Crisis. A year later, frustrated with the practice of government officials claiming executive privilege in order to withhold information, he pressured Kennedy to issue a statement clarifying that only the president could invoke executive privilege. (Intelligence officials in the recent Russia investigation nearly reverted to the practice Moss complained about, refusing to answer questions about conversations with President Trump even as they stopped short of explicitly claiming executive privilege.)

The legislation that emerged from Mosss efforts, the Freedom of Information Act, met fierce opposition from federal agencies when it was proposed in 1966, but had strong backing from journalists and from Congress. The bill passed the House 307-0. It affirmed that any person had the right to request information and records from federal agencies, and that the agencies had to disclose that information. It was a powerful statement of the publics right to know: Anyone could ask, for any reason, and the burden was on the government to show cause for withholding information.

FOIA was the result of a 12-year fight against a system that Americans inherently trusted. As trust in government collapsed, journalists and activists began to wield it more aggressively especially after the law was amended in 1974 to give the act more teeth.

A government official used a FOIA request to gain access to summaries of FBI Director J. Edgar Hoovers secret files, which revealed that Hoover kept extensive records about the sex lives of prominent figures and government officials including himself (he tracked rumors that he was gay). The CIA quickly became a target of FOIA requests, and newspapers were soon thick with stories about the agencys often bizarre work.

A 1977 report revealed that the CIA had been pursuing mind-control efforts, with goals ranging from eliciting information to changing peoples sexual habits and desires. Thanks to FOIA, Americans began to learn details of CIA-backed coups in Latin America and the Middle East.

Two early-1970s revelations of government misdeeds in particular drove the modern push for more transparent government: news of domestic spying by intelligence agencies and the Watergate scandal.

In the 1960s, the NSA had launched Project Minaret, a program for monitoring, without a warrant, the communications of high-profile Americans like Martin Luther King Jr. and Muhammad Ali, as well as journalists and politicians. Another NSA program, Project Shamrock, scooped up every foreign telegram sent to the United States. Meanwhile, FBI and CIA agents were infiltrating the civil rights movement, the womens liberation movement, the anti-war movement.

Regimes of secrecy inevitably spring leaks, either because government workers feel important information is being withheld from the public (as when Daniel Ellsberg leaked the Pentagon Papers), or because they see corruption behind closed doors. That was what led Christopher Pyle, a former Army intelligence officer, to publish details of domestic surveillance in 1970.

Pyle penned an explosive expos for the Washington Monthly about the close monitoring of American activists by the Army. Domestic spying, he wrote, jeopardizes individual rights, democratic political processes, and even the national security it seeks to protect.

These revelations led Sen. Sam Ervin, an arch-segregationist and privacy crusader, to press for more details about the program. Frustrated by stonewalling from the Pentagon and the Nixon White House, Ervin decided to hold public hearings. They produced no dramatic disclosures, but they did inspire reporters like Seymour Hersh of the New York Times to start digging.

The result was Hershs groundbreaking, leak-filled story for the New York Times in December 1974, which detailed a massive, illegal domestic intelligence operation by the CIA, in direct violation of its charter (which restricts it to spying abroad).

Hershs article led to the Church Committee hearings, which laid bare abuses of power within the intelligence agencies including their targeting of groups like the Black Panthers, and anti-war activists. They also uncovered the CIAs role in assassination plots against foreign leaders, including efforts to kill Fidel Castro using poisoned cigars and exploding seashells.

And, in turn, the Church Committee hearings inspired institutional reforms: the creation of intelligence committees to provide congressional oversight over the FBI, CIA, and NSA , and the creation of courts through the Foreign Intelligence Surveillance Act to provide judicial oversight. (Intelligence officials are required to obtain warrants from FISA courts for any wiretaps or surveillance.)

In the wake of Watergate, Democrats swept the 1974 midterms, filling the Congress with new officeholders dubbed Watergate babies, who pushed hard for major open-records legislation: the expansion of FOIA, an Ethics in Government Act to require financial disclosures, and the Presidential Records Act to preserve all government documents. New laws checked the presidents war-making powers (in theory, at least) and empowered Congress and the courts to appoint special prosecutors.

No reform lasts forever. The FISA courts became rubber-stamp formalities and, after the September 11 attacks, intelligence agencies wrested back power. Intelligence agencies grew quickly the Defense Intelligence Agency went from 7,500 employees in 2002 to 16,500 by 2010. Meanwhile, President George W. Bush signed off on NSA spying without a warrant, sidestepped disclosure requirements, and authorized torture.

Again, the drift toward secrecy was bipartisan. The Obama administration aggressively prosecuted leakers and whistleblowers. It used the 1917 Espionage Act to prosecute government employees for leaking information to the media more than any administration since its passage. Journalists were caught up in these investigations as well.

And now the Trump administration appears intent on walling off as much information as possible, working assiduously to conceal the presidents visitors, his business and financial entanglements, and even details of executive orders and policies until they go into effect (like the travel ban, which is still being litigated).

Anti-secrecy reformers have been hard at work over the past decade or so, pushing for whistleblower protections (some of which they gained in the 2012 Whistleblower Protection Enhancement Act) and transparency laws while calling attention to the massive overclassification problem. And more and more Americans are coming to realize that norms like the decades-old tradition of presidents releasing their financial records arent worth much in the face of resistance.

Much of that current activism is happening at the state and local level, but ultimately federal reforms are required to crack the secrecy of the federal government. Now is the time to step up the public campaign against secrecy while also working out the nuts and bolts of reform legislation, so that when a new generation of Mar-a-Lago babies arrive in Washington, they will be able to move quickly to not only restore the norms that have been shredded in recent years, but to harden those norms into laws.

Nicole Hemmer, a Vox columnist, is the author of Messengers of the Right: Conservative Media and the Transformation of American Politics. She is an assistant professor at the University of Virginias Miller Center and co-host of the Past Present podcast.

The Big Idea is Voxs home for smart discussion of the most important issues and ideas in politics, science, and culture typically by outside contributors. If you have an idea for a piece, pitch us at thebigidea@vox.com.

See the article here:
How Trump's infuriating secrecy could backfire and lead to long-needed transparency reforms - Vox

A Tribute to Edward Snowden – BestVPN.com (blog)

21 June is Edward Snowdens 34th birthday. Here at BestVPN.com we think this is a great opportunity to re-examine who this self-depreciating, 34-year old all-American hero is, and what he did to make the world a better place.

Born in 1983 in North Carolina, Edward Joseph Snowden came from a family with a strong military and federal government background. He was fully expected to pursue the same path.

It therefore came as no surprise when, in 2004, following a brief period in which he dropped out of formal education, Snowden enlisted in the United States Army Reserve as a Special Forces candidate.

I wanted to fight in the Iraq war because I felt like I had an obligation as a human being to help free people from oppression.

This was not to be. After only five months of training, Snowden was discharged after breaking both his legs. It seems that during this time, however, Snowden became rather disillusioned with the military:

Most of the people training us seemed pumped up about killing Arabs, not helping anyone.

After leaving the army, Snowden served a short stint as security guard at a top-secret facility owned by the NSA. This required a very high security clearance, for which he underwent stringent background checks and passed a polygraph examination.

It was not long before Snowden was offered a job by the CIA, where he quickly established a reputation for being the go-to computer wizard, despite having no formal qualifications. In 2007 he was posted to Switzerland, where he was considered the top technical and cybersecurity expert.

Disturbed by the cynical nature of events he witnesses in Geneva, Snowden resigned from the CIA in 2009. According to a friend, he was already experiencing a crisis of conscience of sorts.

His history of working with spooky types, however, was far from over. Snowden accepted a job with Dell, managing government computer systems most notably the NSAs Hawaii regional operations center. It was during this time that Snowden started to collect evidence of unconstitutional mass surveillance by the US government.

The breaking point, however, came when Snowden watched the Director of National Intelligence, James Clapper, directly lie under oath to Congress. Snowden quit Dell and began working for Booz Allen Hamilton, a government-services company.

Still working at the NSAs Hawaii base, this provided Snowden the opportunity he was now actively seeking to collect evidence of the NSAs abuses of power.

During this period, Snowden claims to have raised his concerns at the scale of the NSAs surveillance program with superiors and colleagues. Although many expressed concern and dismay at what he told them, no-one was willing to take matter further.

In December 2012 Snowden made contact with Guardian journalist Glenn Greenwald. When Greenwald found the security measures demanded by Snowden too complicated to employ properly (notably PGP), Snowden also contacted Laura Poitras, a documentary filmmaker who had written an influential article on NSA whistleblower William Binney.

During early 2013, Snowden supplied Greenwald and Poitras with his store of documents. On 20 May he flew to Hong Kong in preparation for the publication of the first documents, on 5 June.

Snowden had hoped hiding out among refugees in Hong Kong would provide some protection against extradition back to the USA on treason charges. It soon because clear, however, that this position was untenable.

How Snowden ended up in Russia under the protection of Vladimir Putin remains somewhat unclear. It is thought that Russia agreed to help Snowden escape Hong Kong and reach asylum in Ecuador, via Moscow and Cuba.

It seems that under US pressure, Cuba changed its mind, and refused Snowden permission to land in Havana. Following a bizarre incident in which a plane carrying Bolivian president Evo Morales, who had been visiting Russia, was grounded when trying to pass through Europe, it became clear that Snowden was stuck in Russia.

Luckily for Snowden, Putin offered him refuge. He has been there ever since.

Nobody is exactly sure how many compromising documents Snowden obtained from the NSA, but Snowden says he examined every one of them to ensure they did not contain information that would compromise US security.

Current estimates claim that some 1.7 million documents were obtained. Important in his defense against treason charges after receiving asylum in Russia, Snowden insists that he had handed all documents over to reporters before fleeing Hawaii. This means that he had no information to hand over to Putin.

Edward Snowdens revelations showed the world the sheer scale of the United States NSA spying ambitions. It showed that the NSA is spying on just about everything everyone is doing online. Despite numerous Constitutional protections to the opposite, this includes US citizens.

The NSA used emergency legislation brought in following 9/11, plus numerous legal loopholes, to spy on just about everything every US citizen does online.

Its PRISM program co-opted the USAs tech giants into spying on their customers. This includes the likes of Microsoft, Apple, Google, Yahoo, and Facebook.

It performed bulk, warrantless, daily searches on telephone records belonging to US citizens, undermined international encryption standards that all internet users need to keep our data safe, monitored some 80%of the worlds internet traffic, infected thousands of computers with malware, and even resorted to extracting metadata from mobile apps such as Angry Birds.

The XKeyscore search and analysis tool provided a means to easily sort through this ocean of information in order to find almost anything done on the internet.

Snowden was prepared to lay down everything he had in order alert fellow Americans to such abuse of power. This makes him a hero. For a democracy to call itself such, there must be transparency. Citizens must know and understand what is being done in their name.

After all, if a government hides its actions from the people, then it cannot be accountable to them and a government that is not accountable is not democratic.

If a government acts against the best interest of its own citizens, should a moral individuals loyalty be to their government or their people? Snowden showed that he is both a very moral and very brave individual.

His revelations have, at the least, provided some transparency and provoked debate about the limits that can and should be placed on privacy in the nebulous name of national security.

Read more:
A Tribute to Edward Snowden - BestVPN.com (blog)

The Encryption Debate Should End Right Now – WIRED

Amin Yusifov/Getty Images

When law enforcement argues it needs a backdoor into encryption services, the counterargument has typically been that it would be impossible to limit such access to one person or organization. If you leave a key under the doormat, a seminal 2015 paper argues , a burglar eventually finds it. And now recent events suggest an even simpler rebuttal: Why entrust a key to someone who gets robbed frequently?

This aptly describe US intelligence services of late. In March, WikiLeaks released nearly 9,000 documents exposing the CIAs hacking arsenal. More so-called Vault 7 secrets trickled out as recently as this week. And then theres the mysterious group or individual known as the Shadow Brokers, which began sharing purported NSA secrets last fall. April 14 marked its biggest drop yet, a suite of hacking tools that target Windows PCs and servers to devastating effect.

The fallout from the Shadow Brokers has proven more concrete than that of Vault 7; one of its leaked exploits, EternalBlue, facilitated last months WannaCry ransomware meltdown. A few weeks later, EternalBlue and two other pilfered NSA tools helped advance the spread of Petya , a ransomware outbreak that looks more and more like an act of cyberwar against Ukraine .

Petya would have caused damage absent EternalBlue, and the Vault 7 dump hasnt yet resulted in a high-profile hack. But that all of this has fallen into public hands shifts the nature of the encryption debate from hypothetical concern that someone could reverse-engineer a backdoor to acute awareness that someone could just steal it. In fact, it should end any debate all together.

The government asking for backdoor access to our assets is ridiculous, says Jake Williams, founder of Rendition Infosec, if they can't first secure their own classified hacking tools.

If you think about the encryption debate at all, its likely in the context of the 2016 showdown between the FBI and Apple. The former wanted access to San Bernardino shooter Syed Rizwan Farooks locked iPhone; the latter argued that writing special code to break its own security measures would set a dangerous precedent.

That case ended in something like a draw. The FBI paid an outside company to break into the iPhone, quitting the court case before either side got a definitive ruling.

'The government asking for backdoor access to our assets is ridiculous.' Jake Williams, Rendition Infosec

Apple facing off against the FBI was certainly high profile, but it only amounted to one skirmish in a long-fought encryption war. In the wake of the March terrorist attack by Khalid Masood outside the British parliament, UK home secretary Amber Rudd called for police and intelligence agencies to have access to encrypted messaging services like WhatsApp. British prime minister Theresa May struck a similar chord following a terror attack in London earlier this month.

In fact, you neednt look even that far back to see encryption under duress. Five Eyes, the intelligence-sharing alliance of the US, UK, Canada, Australia, and New Zealand, met just this week to discuss their national security priorities. We committed to develop our engagement with communications and technology companies to explore shared solutions while upholding cybersecurity and individual rights and freedoms, the group wrote Tuesday morning, pushing for an encryption compromise that does not technologically exist.

A few hours later, reports began to emerge that Petya was wending its way through networks around the world, thanks in part to exploits that the NSA failed to secure.

I think Vault 7 and Shadow Brokers illustrate the challenges that even intelligence agencies have in securing extremely sensitive information, says Andrew Crocker, staff attorney with the Electronic Frontier Foundation. And its hard to think of information that would be more sensitive than special access to the worlds encryption protocols.

The intelligence communitys apparent inability to keep its secrets appears bad enough on its face. But remember that Vault 7 and Shadow Brokers are simply the thefts that have gone public.

It hints at a much larger problem of nation-states probably taking these exploits from each other and sitting on them, to analyze them and use them defensively, says Drew Mitnick, policy counsel at digital rights group Access Now. If there were an encryption backdoor tool that was compromised by nation-states, we might not know. It might not become public in the way these recent attacks did.

It would certainly provide a high-profile target. Any sort of publicized encryption backdoormandated, say, through legislationwould draw the immediate attention of foreign powers, bad actors, and basically any hacker looking for the keys to kingdoms that are, in some cases, billions of users strong. If they acquired them, well, game over.

Emily Dreyfuss

Blaming the Internet For Terrorism Misses The Point

Kate Krauss

Time for Journalists to Encrypt Everything

Brian Barrett

The Apple-FBI Fight Isn't About Privacy vs. Security. Don't Be Misled

The dangers posed by leak or theft of keys used in a key escrow system, for example, are potentially catastrophic, says Crocker, referring to a potential method by which the government could access an encryption backdoor.

If a hacker were to compromise a significant encryption platform, we could see something much worse than the WannaCry ransomware attack, says Mitnick. WannaCry froze up hundreds of thousands of computers; WhatsApp, which uses Open Whisper Systems Signal Protocol, has well over a billion users with default, end-to-end encrypted chat. The implications come into even sharper relief when you consider countries where access to encrypted chat provides the best defense against oppressive regimes.

The NSA and the CIAs recent misadventures in securing their wares is just one among many points in favor of encryption. After months of spy agency tools gone rogue, though, the only argument needed should be a lesson you probably learned in junior high: Dont share secrets with people who cant keep them.

See the article here:
The Encryption Debate Should End Right Now - WIRED

Joint Letter to Five Eyes Intelligence Agencies Regarding Encryption – Human Rights Watch (press release)

To: Senator the Hon. George Brandis Attorney General of Australi

Hon. Christopher Finlayson Attorney General of New Zealand

Hon. Ralph Goodale Minister of Public Safety and Emergency Preparedness of Canada

Hon. John Kelly United States Secretary of Homeland Security

Rt. Hon. Amber Rudd Secretary of State for the Home Department, United Kingdom

CC: Hon. Peter Dutton, Minister for Immigration and Border Protection, Australia;

Hon. Ahmed Hussen, Minister of Immigration, Refugees, and Citizenship, Canada;

Hon. Jeff Sessions, Attorney General for the United States;

Hon. Jody Wilson-Raybould, Minister of Justice and Attorney General, Canada;

Hon. Michael Woodhouse, Minister of Immigration, New Zealand

To Ministers Responsible for the Five Eyes Security Community

In light of public reports about this weeks meeting between officials from your agencies, the undersigned individuals and organizations write to emphasize the importance of national policies that encourage and facilitate the development and use of strong encryption. We call on you to respect the right to use and develop strong encryption and commit to pursuing any additional dialogue in a transparent forum with meaningful public participation.

This weeks Five Eyes meeting (comprised of Ministers from the United States, United Kingdom, New Zealand, Canada, and Australia) discussed plans to press technology firms to share encrypted data with security agencies and hopes to achieve a common position on the extent of ... legally imposed obligations on device-makers and social media companies to co-operate.[1] In a Joint Communiqu following the meeting, participants committed to exploring shared solutions to the perceived impediment posed by encryption to investigative objectives.[2]

While the challenges of modern day security are real, such proposals threaten the integrity and security of general purpose communications tools relied upon by international commerce, the free press, governments, human rights advocates, and individuals around the world.

Last year, many of us joined several hundred leading civil society organizations, companies, and prominent individuals calling on world leaders to protect the development of strong cryptography. This protection demands an unequivocal rejection of laws, policies, or other mandates or practicesincluding secret agreements with companiesthat limit access to or undermine encryption and other secure communications tools and technologies.[3]

Today, we reiterate that call with renewed urgency. We ask you to protect the security of your citizens, your economies, and your governments by supporting the development and use of secure communications tools and technologies, by rejecting policies that would prevent or undermine the use of strong encryption, and by urging other world leaders to do the same.

Attempts to engineer backdoors or other deliberate weaknesses into commercially available encryption software, to require that companies preserve the ability to decrypt user data, or to force service providers to design communications tools in ways that allow government interception are both shortsighted and counterproductive. The reality is that there will always be some data sets that are relatively secure from state access. On the other hand, leaders must not lose sight of the fact that even if measures to restrict access to strong encryption are adopted within Five Eyes countries, criminals, terrorists, and malicious government adversaries will simply switch to tools crafted in foreign jurisdictions or accessed through black markets.[4] Meanwhile, innocent individuals will be exposed to needless risk.[5] Law-abiding companies and government agencies will also suffer serious consequences.[6] Ultimately, while legally discouraging encryption might make some useful data available in some instances, it has by no means been established that such steps are necessary or appropriate to achieve modern intelligence objectives.

Notably, government entities around the world, including Europol and representatives in the U.S. Congress, have started to recognize the benefits of encryption and the futility of mandates that would undermine it.[7]

We urge you, as leaders in the global community, to remember that encryption is a critical tool of general use. It is neither the cause nor the enabler of crime or terrorism. As a technology, encryption does far more good than harm. We therefore ask you to prioritize the safety and security of individuals by working to strengthen the integrity of communications and systems. As an initial step we ask that you continue any engagement on this topic in a multi-stakeholder forum that promotes public participation and affirms the protection of human rights.

We look forward to working together toward a more secure future.

Sincerely, 83 civil society organizations and eminent individuals (Listed Below)

Access Now

Advocacy for Principled Action in Government

Amnesty International

Amnesty UK

ARTICLE 19

Australian Privacy Foundation

Big Brother Watch

Blueprint for Free Speech

British Columbia Civil Liberties Association (BCCLA)

Canadian Civil Liberties Association (CCLA)

Canadian Journalists for Free Expression (CJFE)

Center for Democracy and Techology

Centre for Free Expression, Ryerson University

Chaos Computer Club (CCC)

Constitutional Alliance

Consumer Action

CryptoAustralia

Crypto.Quebec

Defending Rights and Dissent

Demand Progress

Digital Rights Watch

Electronic Frontier Foundation

Electronic Frontiers Australia

Electronic Privacy Information Center

Engine

Equalit.ie

Freedom of the Press Foundation

Friends of Privacy USA

Future Wise

Government Accountability Project

Human Rights Watch

i2Coalition

Index on Censorship

International Civil Liberties Monitoring Group (ICLMG)

Internet NZ

Liberty

Liberty Coalition

Liberty Victoria

Library Freedom Project

My Private Network

New Americas Open Technology Institute

NZ Council for Civil Liberties

OpenMedia

Open Rights Group (ORG)

NEXTLEAP

Niskanen Center

Patient Privacy Rights

PEN International

Privacy International

Privacy Times

Private Internet Access

Restore the Fourth

Reporters Without Borders

Rights Watch (UK)

Riseup Networks

R Street Institute

Samuelson-Glushko Canadian Internet Policy & Public Interest

Clinic (CIPPIC)

Scottish PEN

Subgraph

Sunlight Foundation

TechFreedom

Tech Liberty

The Tor Project

Voices-Voix

World Privacy Forum

Brian Behlendorf | Executive Director, Hyperledger, at the Linux Foundation

Dr. Paul Bernal | Lecturer in IT, IP and Media Law, UEA Law School

Owen Blacker | Founder and director, Open Rights Group; founder, NO2ID

Thorsten Busch | Lecturer & Senior Research Fellow, University of St. Gallen

Gabriella Coleman | Wolfe Chair in Scientific and Technological Literacy at McGill University

Sasha Costanza-Chock | Associate Professor of Civic Media, MIT

Dave Cox | CEO, Liquid VPN

Ron Deibert | The Citizen Lab, Munk School of Global Affairs

Nathan Freitas | Guardian Project

Dan Gillmor | Professor of Practice, Walter Cronkite School of

Follow this link:
Joint Letter to Five Eyes Intelligence Agencies Regarding Encryption - Human Rights Watch (press release)