Prior to Snowden, NSA Had No Clue How Many Were Approved to … – Washington Free Beacon

Edward Snowden / Getty Images

BY: Natalie Johnson June 24, 2017 5:00 am

The National Security Agency did not know how manyofficials were authorized to download and transfer top secret data from its servers prior tothe high-profile leaks by former contractor Edward Snowden, according to a recently declassified government report.

The NSA was also unsuccessful in attempts to meaningfully cut the number of officials with "privileged" access to its most sensitive databases, the Department of Defense's inspector general determined in the 2016 investigation. The heavily redacted report was obtained by the New York Times through a Freedom of Information Act lawsuit.

The agency struggled to achieve the mandated reductions because it had no idea how many employees or contractors were designated data transfer agents or privileged access users prior to the leaks.

NSA officials told the inspector general they lost a "manually kept spreadsheet" that tracked the number of privileged users after receiving multiple requests from the inspector general to provide documents identifying the initial number. The lapse made it impossible for the agency to determine its baseline of privileged users from which reductions would be made.

The report said the NSA then "arbitrarily removed" privileged access from users, who were told to reapply for the authorization. While this enabled the agency to determine how many personnel were granted special access, the NSA still had no way of measuring how many privileged users had lost the clearance.

The inspector general said the NSA should have used this new baseline as a "starting point" to reduce privileged users instead of using the number to declare a reduction in those personnel.

In the case of data transfer agents, the NSA's "manually kept list" tracking the number of officials authorized to use removable devices, such as thumb drives, to transfer data to and from the agency's servers was "corrupted" in the months leading up to the Snowden leaks, the report said.

Without a baseline to measure potential reductions, the NSA then mandated data transfer agents to reapply for the authorization. Again, though this allowed the agency to determine how many personnel were given the authority, the NSA still had no way of gauging how many reductions were made, if any.

The threat proved ongoing earlier this month when former contractor Reality Winner was charged with removing classified information from NSA facilities regarding the Russian election hacks and leaking it to the press.

The initiatives to cut the number of people with access to classified data were part of a broader post-Snowden measure, called "Secure the Net," to strengthen protections of its sensitive surveillance and hacking methods.

The report determined that while the NSA made some progress in achieving reform, the agency "did not fully meet the intent of decreasing the risk of insider threats to its operations and the ability of insiders to exfiltrate data."

NSA spokeswoman Vanee Vines acknowledged the report's conclusions in a statement issued to the New York Times last week.

"We welcome the observations and opportunities for improvement offered by the U.S. Defense Department's Inspector General," she said. "NSA has never stopped seeking and implementing ways to strengthen both security policies and internal controls."

It is unclear what steps the NSA has taken since the report was finalized in August 2016 to reduce the number of employees and contractors with access to its top-secret databases.

More here:
Prior to Snowden, NSA Had No Clue How Many Were Approved to ... - Washington Free Beacon

Top Encryption Software for 2016 – PCMag

Symantec Endpoint Encryption provides encryption and centralized management to protect sensitive information while ensuring regulatory compliance.

Bottom Line Symantec Endpoint Encryption protects sensitive information and ensures regulatory compliance with both full-disk and removable-data encryption. It encrypts each drive, sector by sector, ensuring all files are encrypted. It also supports various types of removable media. It also allows removable data users to access their data on any machine, even if its not encrypted.

BitLocker Drive Encryption is an encryption feature that works to provide your operating system and any other drives with increased protection.

Bottom Line BitLocker Drive Encryption is an encryption feature available for recent Windows operating systems and intended to increase the security surrounding your computers drives. Offering increased functionality with a Trusted Platform Module (TPM), BitLocker can generate comprehensive protection for your operating system itself or for any drives that are attached to your computer. BitLocker uses encryption techniques, alongside any additional security measures you choose, to protect sensitive data from hackers.

East-tec InvisibleSecrets is a steganography and file-encryption tool that encrypts confidential file and folder structures and allows users to hide files from other users.

Bottom Line InvisibleSecrets encrypts data and files and keeps them safe for secure transfer in emails or across the internet. The file encryption lets users encrypt and hide files directly from Windows Explorer and automatically transfer them by email or via the internet. Users can also hide files in places that appear innocent, such as pictures, sound files, or webpages.

Cypherix Cryptainer is a data-encryption solution that allows users to encrypt files and protect sensitive data on their hard drives, memory sticks, or other storage media.

Bottom Line Cypherix Cryptainer is an encryption solution for Windows PCs. The software encrypts files and folders, and allows for the creation of multiple encrypted virtual hard drives. Cryptainer is offered in several versions, including the free Cryptainer LE version and a premium Cryptainer SE.

Voltage HPE SecureData Enterprise is a data-protection platform that provides end-to-end encryption for sensitive company data.

Bottom Line Voltage HPE SecureData Enterprise is a data-protection solution that allows companies to ensure that all of their sensitive data is encrypted and kept out of the hands of potentially malicious entities. The software works by continually encrypting and protecting data even as the data is being captured, processed, and stored, so that no vulnerabilities can be exploited. Voltage HPE SecureData Enterprise provides stateless key management, an extremely flexible application programming interface (API) that can integrate with nearly any application, and support for various operating systems and devices.

DriveCrypt data encryption provides secure 1344-bit disk encryption for desktop computers and laptops.

Bottom Line DriveCrypt is a disk encryption product that automatically encrypts data on desktop and laptop personal computers (PCs), as well as universal serial bus (USB) storage devices. The secure 1344-bit encryption is done automatically on the fly, so users do not have to change their workflow.

CipherShed is a free, open-source program that can be used to create encrypted files or to encrypt entire drives including universal serial bus (USB) flash drives and external hard disk drives (HDDs).

Bottom Line CipherShed is a free, open-source program intended to be used to create encrypted files or to encrypt entire drives. This includes being able to encrypt thumb/flash drives and external removable (and back-up) hard disk drives (HDDs). The program is designed to be simple to use and includes a wizard that provides simple step-by-step instructions for users to follow.

MiniLock is simple file-encryption and transfer tool that makes it easier and more convenient to securely send files from one person to another.

Bottom Line MiniLock is a miniature file-encryption and transfer solution that works toward simplifying the process of sending encrypted files from one person to another. By generating unique MiniLock identities for each user and requiring strong passphrases, MiniLock establishes multiple layers of protection to guarantee the security of your files. MiniLock makes it easy to send an encrypted file to someone through a process as simple as sharing a tweet.

Kryptel encryption software allows Windows personal computer (PC) users to encrypt and decrypt one to thousands of files and folders with a single click for secure file storage.

Bottom Line Kryptel encryption software for Windows allows users to encrypt and decrypt files and folders with just a click of the mouse. All editions also include right-click-integration with Explorers browser to look inside encrypted containers and include a data shredder with a variety of settings to increase data-wiping security during encryption and decryption. Upgraded versions add encrypted backups, script-driven encryption, and a command-line interface.

Vormetric Transparent Encryption encrypts data, enables privileged user access control, and creates activity logs.

Bottom Line Vormetric Transparent Encryption encrypts databases and files and removes data access rights from administrators. When integrated with a security information and event management system, it can generate extremely detailed reports.

Gpg4win is open-source solution that encrypts and digitally signs files and emails.

Bottom Line Gpg4win encrypts emails and files with military-grade security. You can also use it to digitally sign your messages and files. The software is open source and free to use even commercially.

Boxcryptor provides encryption for files stored within various platforms the cloud.

Bottom Line With Boxcryptor, users can encrypt any files they plan to store in a cloud-based repository (i.e., Dropbox, Google Drive, Microsoft OneDrive, or any other common cloud-storage provider). Boxcryptor provides applications for all major operating systems and mobile platforms, allowing users to access their encrypted files anywhere at any time regardless of where the files are stored.

VeraCrypt is open-source disk-encryption software (from IDRIX) that protects files and systems and prevents data leaks and data theft.

Bottom Line VeraCrypt open-source disk-encryption software adds enhanced security to the encryption algorithms used for systems and partitions. It makes systems and partitions immune to the latest developments in brute-force attacks and solves many of the security issues and vulnerabilities found in TrueCrypt.

Jeticos BestCrypt products offer comprehensive military-standard data protection for sensitive information in files and/or on hard drives.

Bottom Line Jeticos BestCrypt software products deliver military-standard data protection for active computers, shared workstations, or network storage and for lost or stolen computers and laptops.

Digital Guardian is data-centric encryption and protection software, with a wide array of tools and system coverage.

Bottom Line Digital Guardian is data-centric encryption and protection software, with a wide array of tools and system coverage. Its protection extends to your sensitive files no matter where they are on the network, endpoints, and cloud. With detailed reports on data activity and user policy enforcement, Digital Guardian will provide you with the tools and means to protect your valuable data.

Original post:
Top Encryption Software for 2016 - PCMag

CIS researchers receive $2.5M NSF grant for cybersecurity – Cornell Chronicle

June 23, 2017

Four Cornell computer science researchers will receive $2.5 million from the National Science Foundation to develop software tools that will improve cybersecurity. The project is exploring a new approach that will make it easier to use cryptography to build more-secure systems. Computing and Information Science researchers on the project are Andrew Myers, Elaine Shi, Greg Morrisett and Rafael Pass (Cornell Tech).

Cryptography, which involves complex mathematical manipulations of data, demands high-level expertise. It's easy to make security-critical mistakes when using cryptography to build systems, Myers said. The new secure chips must be programmed almost at the level of the computers machine language of ones and zeros, and also require expertise in cryptography.

If we are serious about remaining globally competitive, we must continue to invest in research to develop new computer engineering techniques that will stop hackers in their tracks, said Sen. Charles Schumer, D-New York. The work coming out of Cornell will improve our nations cybersecurity and help foster technological innovations that will make us safer and more productive. This funding will allow our brightest minds to find solutions to current and future challenges.

Research funds will be used to develop a high-level programming language called Viaduct.

The Viaduct system will automatically translate this high-level code into provably secure implementations that use sophisticated cryptography, said Myers, lead principal investigator.

Its clear that our society desperately needs new approaches to security and privacy, said researcher and CIS Dean Morrisett. The approach we are exploring should shift the burden of the security details from the programmer to the language environment.

Leslie Morris is director of communications for Computing and Information Science.

View original post here:
CIS researchers receive $2.5M NSF grant for cybersecurity - Cornell Chronicle

Pamela Anderson Is Using Vegan Food to Help Free Boyfriend Julian Assange – Eater

This one is a doozy, and kind of reads like Mad Libs: 2017 Edition, so let me break it down for you:

Got all that? Anderson made the appeal in an announcement on her blog this week, along with multiple photos of her posing with her golden retriever. Yes, all of this is true.

If youve ever wanted to sip a whisky shot with a salt-cured human toe floating in it, the Downtown Hotel in Canadas Dawson City is a destination to mark on your map.

The bar made headlines this week when the toe it serves (which is reused from shot to shot, presumably because sourcing new toes for each drink sold would be a Sweeney-Todd-esque logistical nightmare) was stolen. This story has a happy ending, though the anonymous thief returned the appendage a few days later, with apologies.

Way back in 2013, ER heartthrob and casino-heist-savant George Clooney made the announcement that he and his buddies had created their own brand of tequila. The response from many (this author included) was who the hell wants to buy tequila from George Clooney?. This week we got the answer, which was a lot of people like $1 billion worth of them. Business is hard.

Before Mario Batali was a household name, he was just another kid behind the counter of a New Jersey sandwich shop. This week on The Tonight Show, the mega-chef revealed that he still goes back to Stuff Yer Face in New Brunswick, NJ, at least once a year for a stromboli sandwich. Its good to remember where you started.

How are you going to make a Sno Ball thats not ball-shaped? Its madness.

Here is the original post:
Pamela Anderson Is Using Vegan Food to Help Free Boyfriend Julian Assange - Eater

B.C.’s Pamela Anderson to launch vegan restaurant in France to … – Straight.com (blog)

While British Columbian star Pamela Anderson is enjoying some screentime thanks to her cameo in the movie version of Baywatch, she's also using her star power to help out two causes she's passionate about.

Anderson, who rose to international fame on the TV version of Baywatch, will launch a pop-up vegan restaurant in southern France.

Starting on July 4, Le Table du March will run for 50 nights in Saint-Tropez.

Anderson is collaborating with chef Christophe Leroy, organizer of Nuit Blanche. The menu consists of prix fixe options as well as sharing plates such as Pissaladire, risotto with asparagus, tomato tartare with goji berries, and a vegan burger.

On June 17, she wrote on her foundation's website that she is also doing so as a means to invite political leaders to help free Australian computer programmer and WikiLeaks founder Julian Assange. She has invited French president Emmanuel Macron and his wife Brigitte Trogneux to the restaurant to discuss asylum for Assange.

Assange has lived at the Ecuardorian Embassy in London for over four years after Swedish prosecutors issued a warrant for him due to sexual-assault allegations made by two WikiLeaks volunteers.

She went to say that finds Assange sexy because "surely the sexiest qualities in a man are bravery and courage. Sexiness in a man is showing strength. Having convictions and having the courage to stand by them."

She added that he is "standing up for the oppressed, for the weak, for the forgotten". That's something that Anderson herself has been doing with her devotion to animal-welfare activism and awareness efforts, which is reflected in the vegan pop-up restaurant.

A vegan cookbook entitled C'est Bizarre will follow.

Anderson was born in Ladysmith, B.C., and grew up in Comox, B.C.

Read the original:
B.C.'s Pamela Anderson to launch vegan restaurant in France to ... - Straight.com (blog)

Cryptocurrency Craze Sends GPU Prices … – extremetech.com

Back in 2013, during the height of the GPU bitcoin mining craze and before ASICs had taken over the market, prices forvideo cards reached absurd levels. This primarily impacted AMD, since GCN-based cards were vastly better at Bitcoin and Litecoin mining than their Nvidia counterparts, but the end result was awful for enthusiast gamers. GPUs that normally wouldve sold for $200 to $300 were, in some cases, commanding $600 to $800 price tags. Eventually the market cooled down as more customers shifted to ASICs, which both outperformed GPUs and offered a performance-per-watt metric no graphics card could match.

Now were seeing the same thing happen again only this time, its hitting both AMD and Nvidia cards. The GTX 1070 should be selling for around $330, and I can confirm Ive seen it around this price in the not-so-distant past. Today, Newegg shows the cheapest GTX 1070 at $459, as shown below:

But this isnt just an Nvidia problem; AMD is taking a beating as well. UpgradeYourTech keeps track of product SKUs over time, and maps how they change over weeks and months. Check out whats happened to the RX 580 since that card launched just a few months ago.

On June 6 of this year, the Asus ROG Strix RX 580 topped out at a whopping $849.99. Today, its a steal at just $658.90. At first glance, this might seem like a great thing for both AMD and Nvidia, since after all, higher GPU prices means more money, right?

Wrong.

Back in 2013 when Hawaii launched, cryptocurrency miners sent the price of AMDs entire GCN family into the stratosphere. AMD, however, hadnt changed its prices, which means AMD wasnt making a cent of the additional revenue that OEMs like Asus, MSI, Gigabyte, and Zotac were raking in. Now, if you were a serious cryptocurrency miner at the time, buying an expensive AMD GPU instead of an NV card might have made sense, given the enormous performance disparity between the two. One difference between then and now is that people are mining Etherium, not Bitcoin. My admittedly rough understanding is that NV cards are far more competitive now than they were at BTC mining back in 2013.

It may have made sense for miners to pay huge cost. But it made no sense at all for gamers. At the time, I theorized this could cause AMD trouble down the road. While it took several years to get concrete data on what happened to AMDs GPU sales, I was absolutely right.

AMDs graphics sales have begun to rebound, but the company has fallen hard the past five years. Figures like these made a deal with Intel easier to imagine.

If you go back and compare the peaks in AMDs saleswith the companys product launches, youll find theres a relationship between the two. (Higher sales figures sometimes lag product launch dates, depending on when a GPU debuted within the quarter.) But look at what happened in Q3 2013. The launch of Hawaii and the excellent R9 290 and R9 290X barely budged AMDs sales. In fact, sales went into a steep decline thereafter.

True, Nvidia responded with the GTX 780 Ti to counter the R9 290X, and yes, the reference R9 200 cards had loud default blowers. But third-party fan designs later solved that problem. It didnt matter. The cryptocurrency market had blown out AMDs addressable market, and by the time BTC mining had moved to ASICs, Nvidia had launched its GTX 900 series (Maxwell).

If you want to strike it rich mining Etherium, new GPUs may be a great investment but neither Nvidia nor AMD is likely to be happy about the long-term impact on their own businesses.

The rest is here:
Cryptocurrency Craze Sends GPU Prices ... - extremetech.com

China Becomes First Country in the World to Test a National Cryptocurrency – Futurism

In Brief China's central bank has developed its own cryptocurrency, which is now being tested. Cryptocurrencies have the potential to not only benefit China, but the rest of the world, due to their basis in blockchain. Benefits of Digital Currency

Chinas central bank thePeoples Bank of China has developed a prototype of a cryptocurrencythat it could end up in circulation in the nearfuture.It would beintroduced alongside the Chinas primary currency the renminbi (also called the yuan).Chinawill besimulating possible scenarios and running mock transactions using the cryptocurrency with some commercial Chinese banks. Click to View Full Infographic

The potential benefits of developing a digital currency are significant, particularly in China. First, it would decrease the cost of transactions, and therefore make financial services more accessible, which would be a big help tothe millions of people in the country who are unconnected to conventional banks. Second, as it would be supported by blockchain, it has the potential to decrease the rates of fraud and counterfeiting, which would be of service to thegovernments attempts to reduce corruption a key concern. Third, it would make the currency easier to obtain, which would increase the rate of international transactions, allowing for more trades and faster economic growth.

Since Bitcoins humble beginnings back in 2009 (when it was only valued at around 0.0007 USD) the digital currency, and the very idea of cryptocurrencies in fact,has grown monumentally. The total market cap of cryptocurrencies on April 1st of this year was over $25 Billion. A singleBitcoin is now worth more than $2,500. Now many national economies, as Chinas plan shows,areconsidering the idea of developing their own variant.

Although Chinas experimental approach to simulate a self-developed cryptocurrencys usage is the first of its kind, other countries and institutions have made strides in that direction as well. The Deputy of Russias central bank has emphatically statedthatregulators of all countries agree that its time to develop national cryptocurrencies. Over 260,000 stores in Japan will begin accepting Bitcoin as legal tender this summer, and big banks like Santander have announced plans to develop their ownversion.

Cryptocurrencies have the potential of revolutionizing not only the business world, but manymethods of transaction.There has already been talk of using cryptocurrencies to administer Universal Basic Incomesdue to their traceability, as well as for thedelivery of human aid; the potential for which was demonstrated bya recent experiment to help refugees in Jordan by the UN.

View original post here:
China Becomes First Country in the World to Test a National Cryptocurrency - Futurism

Shortage of Graphics Cards Intensifies in Russia as Cryptocurrency … – newsBTC

It is rather interesting to see this trend extend to Russia. The country has always had an uneasy relationship with cryptocurrency.

There is still a large shortage of graphics cards in various parts of the world. Things are getting out of hand in Russia, that much is evident. A new article shows how cryptocurrency mining in the country is picking up. As a result, the shortage of video cards becomes a lot more apparent. It is unclear if this situation will grow worse over time. For the manufacturers, this is good news, though.

About two weeks ago, it became apparent cryptocurrency mining is intensifying all over the world. Given the recent price surges of Bitcoin, Ethereum, and Litecoin, that is to be expected. Not everyone wants to buy specific hard to mine cryptocurrency. Instead, a lot of people are reverting to using graphics cards. This has become somewhat of a problem for the global supply of these products, though. Russia seems to be affected the most by this development right now.

As we have seen over the past few weeks, prices for graphics cards are skyrocketing. That is only normal, as demand is intensifying as well. In Russia, GPUs are up by as much as 80% in price. This affects both retail and second-hand prices. Some people are buying hundreds of graphics cards at once, which puts a lot of strain on the available supply. Manufacturers such as AMD and NVIDIA will not be too bothered about this sudden demand, though.

A lot of media outlets still think people buy graphics cards to mine Bitcoin. That is not the case, as GPUs have been incredibly inefficient for some time now. Instead, users will mine Ethereum, Litecoin, ZCash, or even Monero. All of these currencies can be mined easily with graphics cards. Users will still need a proper motherboard which supports as many graphics cards as possible, though. Setting up a GPU mining farm is not as easy as most people would think.

It is rather interesting to see this trend extend to Russia. The country has always had an uneasy relationship with cryptocurrency. Now that the country is keeping an open mind toward Bitcoin and consorts, mining is growing in popularity. It is good to see graphics cards getting more love, as they were rendered nearly obsolete not too long ago. Thanks to popular alternative currencies, this hardware gets a second lease on life.

See the article here:
Shortage of Graphics Cards Intensifies in Russia as Cryptocurrency ... - newsBTC

Wikileaks fights to suppress documentary – Fudzilla

It has to be positive or we will not allow it

The so-called open government, whistleblowing site Wikileaks, is doing its level best to censor a documentary on the outfit because it fails to praise the outfit to the skies and put a positive spin on its leaderJulian Assange.

The documentary is called Risk and the makers are complaining that the outfit is so obsessed with its image it is prepared to wield legal threats and lawyers in a way that is almost absurdly hypocritical.

The documentary makers, Brenda Coughlin, Yoni Golijov And Laura Poitras have told Newsweek that they were making a positive documentary film about Julian Assange and WikiLeaks and it unequivocally defend WikiLeaks journalistic right to publish true and newsworthy information.

However they were surprised when Julian Assange and WikiLeaks sent cease and desist letters to its distributors demanding they stop the release of Risk.

The filmmakers go into what lengths they went to work directly with Wikileaks and Assange on the film starting back in 2011. Assange himself gave consent to the film and even signed a licensing agreement to use Wikileaks footage for it.

Some people involved with Wikileaks requested not to be in the film, and the filmmakers complied. People from the site and their lawyers have been shown screenings of the film before every regional release, including as recently as April of this year. There is no claim made thus far that any of the content of the film is false.

But things turned sour in 2016. Assange and his lawyers insisted that the documentary remove scenes from the film where he speaks about the two women who made sexual assault allegations against him in 2010.

WikiLeaks comments have consistently been about image management, including: demands to remove scenes from the film where Assange discusses sexual assault allegations against him; requests to remove images of alcohol bottles in the embassy because Ecuador is a Catholic country and it looks bad; requests to include mentions of WikiLeaks in the 2016 U.S. presidential debates; and, requests to add more scenes with attorney Amal Clooney because she makes WikiLeaks look good, the documentary makers said.

The film makers statement says that all this seems to support the claims that Assange is an egomaniac.

But that charge aside, what should be abundantly clear is that the ideals of the site appear to have fallen by the wayside when it comes to a simple documentary that has refused to cinematically stroke Wikileaks to the degree it wishes. That's not a good look for a site that survives on people's belief that it is committed to open and honest information, the statement said.

Go here to see the original:
Wikileaks fights to suppress documentary - Fudzilla

The long, lonely road of Chelsea Manning – Irish Examiner

Her disclosure of classified documents in 2010 ushered in the age of leaks. Now, freed from prison, she talks about why she did it - and the isolation that followed.

On a gray morning this spring, Chelsea Manning climbed into the back seat of a black SUV and directed her security guard to drive her to the nearest Starbucks.

A storm was settling over Manhattan, and Manning was prepared for the weather, in chunky black Doc Martens with an umbrella and a form-fitting black dress.

Her legs were bare, her eyes gray blue. She wore little makeup: a spot of eyeliner, a smudge of pink lip gloss.

At Starbucks, she ordered a white chocolate mocha and retreated to a nearby stool. Manning has always been small (she is 5 feet 4 inches tall), but in her last few months at the United States Disciplinary Barracks at Fort Leavenworth, Kansas, she jogged religiously, outside in the prison yard and around the track of the prison gym, and her body had taken on a lithe sharpness, apparent in the definition of her arms and cheekbones.

She looked healthy and fit, if a little uneasy, as people who have served long spells in prison often do.

She had been released only eight days earlier, after serving seven years of a 35-year sentence. Her crime, even in hindsight, was an astonishing one: handing WikiLeaks approximately 250,000 American diplomatic cables and roughly 480,000 Army reports from the wars in Afghanistan and Iraq.

Collectively the largest leak of classified records in American history, the disclosures cleared a path for Edward Snowden and elevated the profile of Julian Assange, then little-known outside hacker circles. Without Chelsea Manning, P.J.

Crowley, an assistant secretary of state from 2009 to 2011, told me recently, Julian Assange is just another fringe actor who resents what he sees as American hegemonic hubris.

To an extraordinary extent, Mannings actions, in the words of Denver Nicks, the author of a book on her case, represented the beginning of the information age exploding upon itself, a new era in which leaks were a weapon, data security was of paramount importance and privacy felt illusory.

In January 2017, after being locked up at five different facilities, in conditions a United Nations expert called cruel and inhumane, Manning had received a surprise commutation by President Barack Obama.

Four months later, she was free, trying to adjust to life in a world she helped shape. Finishing her coffee, she fished her iPhone out of her purse and asked her security guard for a lift back to the apartment where she was staying while in Manhattan.

The one-bedroom was furnished sparsely, with a wide glass table and a tan couch, opposite which Manning had set up an Xbox One video game console.

The art was of the anodyne motel variety an old masters-esque tableau, a canvas of a zebra standing in a forest. We were many floors up, suspended in the storm clouds, and through the window I could see the spires of the skyscrapers on the other side of the Hudson River.

Manning, who is 29, tapped an unplugged microwave next to the door and asked me to place my laptop inside: The Faraday cage in the microwave would block radio waves, she explained.

But the unplugged microwave was already full of devices, including two Xbox controllers. You can put it in the kitchen microwave, Manning said; then, intuiting the strangeness of the request, she added with a shrug, You cant be too careful.

She recalled that she last gave an in-person, on-the-record interview to a journalist in 2008, on the occasion of a marriage equality march in New York.

For almost a decade after that, barred by prison officials from communicating directly with the public, she remained silent as her story was told in books, an opera, an off-Broadway play and countless magazine articles, almost all of them written before Manning had come out as transgender.

It wasnt the whole story, she told me, my whole story.

Absent her own voice, a pair of dueling narratives had emerged.

One had Manning, in the words of President Donald Trump, as an ungrateful traitor. The other positioned her as transgender icon and champion of transparency a secular martyr, as Chase Madar, a former attorney and the author of a book on her case, recently put it to me.

But in Mannings presence, both narratives feel like impossible simplifications, not least because Manning herself is clearly still grappling with the meaning of what she did seven years ago. When I asked her to draw lessons from her journey, she grew uneasy. I dont have. ... " she started. Like, Ive been so busy trying to survive for the past seven years that I havent focused on that at all.

But surely, I pressed, she must have some sense of the impact she had on the world. From my perspective, she responded, the worlds shaped me more than anything else. Its a feedback loop.

As far back as Manning can remember, to her earliest days in Crescent, on the far edge of the Oklahoma City metro area, she suffered from a feeling of intense dislocation, something constant and psychic that she struggled to define to herself, much less to her older sister, Casey, or her parents, Brian and Susan.

During one of our interviews, I mentioned that I heard a clinical psychologist compare gender dysphoria to a giant, cosmic toothache. Manning flushed. That was it exactly, she agreed: Morning, evening, breakfast, lunch, dinner, wherever you are. Its everywhere you go.

At the age of 5, Manning recalled, she approached her father, an information technology manager for Hertz, and confessed that she wanted to be a girl, to do girl things. Brian responded with a lengthy and awkward speech on the essential differences in plumbing.

But Manning told me, I didnt understand how that had anything to do with what you wore or how you behaved.

Soon she was sneaking into her sisters bedroom and donning Caseys acid-washed jeans and denim jackets. Seated at the mirror, she would apply lipstick and blush, frantically scrubbing off the makeup at the slightest stirring from downstairs.

I wanted to be like [Casey] and live like her, Manning said.

When she was still in elementary school, she came out as gay to a straight male friend. The friend was understanding; the other kids at school, less so. Manning tried, unsuccessfully, to retract her confession, but the teasing continued. I would come home crying some days, and if my dad was there, hed say: Just quit crying and man up.

Like, go back there and punch that kid in the face,' she said. It was the late 1990s, when the trans movement was very much on the fringes of American society.

The closest I came to knowing anything was from the portrayal of drag queen-style cross-dressing on sensational TV shows like Jerry Springers, Manning told me.

She spent more time inside, on the computers that her father was always bringing home, playing video games and dabbling in basic code.

Her parents had issues of their own. When Manning was about 12, Susan swallowed an entire bottle of Valium. Casey called 911, only to be told that the nearest ambulance was a half-hour away.

Casey loaded her mother into the car; Brian, who Manning says was too drunk to drive, sat shotgun, leaving a terrified Chelsea in the back to make sure her mother kept breathing. She told me the incident was formational.

I grew up very quickly after that, she said. (Brian could not be reached for comment.)

In Susans native Wales, where Manning moved with her in 2001 after her parents split, Chelsea says she took over full control of the household, paying bills and handling much of the shopping.

There was freedom there, too: She could buy her own makeup at the convenience store, wear it for a few hours in public and jam it into a waste bin on her way home.

She passed many evenings on her computer, in LGBT chatrooms. Her worldview shifted. While in Crescent, Manning had imbibed her fathers conservative politics I questioned nothing, she told me.

But at Tasker Milward, a school in the town of Haverfordwest, she studied the civil rights movement, the Red Scare, the internment of Japanese-Americans during World War II. In a term paper for a history class, she expressed skepticism about the rationale for the American invasion of Iraq.

When Manning returned to the United States in 2005 to live with Brian and his new wife in Oklahoma City, she was a changed person, if not a wholly transformed one: She wore eyeliner and grew out her hair and dyed it black.

I thought, Maybe I want to just eradicate this gender thing and be gender neutral, like androgynous, she told me.

"She found a job at an internet startup and, through a matchmaking site, met her first boyfriend, who lived 70 miles away in the town of Duncan. But her stepmother, Manning said, forbade her from setting foot in the kitchen: She felt that I was unclean.

Manning confided to no one what she was increasingly coming to understand: that she wasnt gay, wasnt a cross-dresser. She was a woman.

In the summer of 2006, she and her boyfriend parted ways, and she lit out from Oklahoma for good, all her belongings piled high in the cab of her red Nissan pickup truck.

A spell of itinerancy followed out to Tulsa, Oklahoma, to work at a pizza parlor; up to Chicago to work at Guitar Center; east to the suburbs of Washington to live with her aunt, with whom she enjoyed a connection she never shared with her parents.

She did four sessions with a psychologist, but got no closer to unburdening herself than she had with friends or family members. I was scared, Manning said. I didnt know that life could be better.

Brian Manning had often fondly recounted for Chelsea his days in the military: It had given him structure and grounding, he said.

Manning hadnt been ready to listen then. Now she was. Enlisting might be the thing to man her up, to rid her of the ache. Besides, while her ideas about American foreign policy had become more nuanced, she still considered herself a patriot in the Army, she could use her analytical skills to help her country.

I remember sitting in the summer of 2007 and just every single day turning on the TV and seeing the news from Iraq, she told me. The surge, the surge, the surge. Terrorist attacks. Insurgents. ... I just felt like maybe I could make a difference.

That fall, Manning reported for basic training at Fort Leonard Wood in the Missouri Ozarks; within a few days, she had suffered injuries to her arm. The drill sergeants were acting like I was malingering or something, she said.

But I was like: No, Im not trying to get out of anything. I just really cant feel my right hand.' A soldier who spent time with Manning in Missouri later recalled for The Guardian that Manning was routinely called a faggot. The guy took it from every side. He couldnt please anyone. And he tried. He really did, the soldier said.

The Army, in need of more bodies to fight the insurgencies in Afghanistan and Iraq, allowed Manning another shot at boot camp. In 2008, she graduated to intelligence school at Fort Huachuca in Arizona, which to her felt like a kind of community college.

There, she was trained to sort what the military terms SigActs, or significant actions the written reports, photos and videos of the confrontations, explosions and firefights that form the mosaic of modern war. Manning told me she fit in well with the intelligence types at Fort Huachuca, who shared her intrinsic geekiness.

There were more like-minded people there, she said, adding, It wasnt Rah, rah, you need to do this. They encouraged us to speak up. They encouraged us to have opinions, to make our own decisions.

At her first official duty station, Fort Drum in upstate New York, Manning was charged in part with helping to build a digital tool that would automatically track and sort SigActs from Afghanistan, where Mannings unit initially expected to be deployed.

For hours a day, she watched spectral night-vision video and read reports from distant battlefields. Already, she was being exposed to the bloodshed that would serve as inspiration for her leaks.

But she was handling the material at a spatial and emotional reserve: She remained, she told me, eager to get to the front lines. I was hungry."

Through a gay dating site, she met a bookish Brandeis student named Tyler Watkins. She started driving to visit Watkins in the Boston area, where she became a regular at Pika, a Massachusetts Institute of Technology co-op, and visited Boston Universitys Builds, a hub of the local hacking community.

At the Pika gatherings, she found friends that approached coding the same way she did: as outlet, pastime and calling. She often stayed up late into the night talking. Yan Zhu, then an undergraduate student at MIT, remembers Manning as obviously intelligent, if nervous.

It was clear to Zhu that Manning was haunted by something. But she never had a chance to find out what: That fall, Mannings unit was deployed to Iraq.

In October 2009, Manning hopped a Black Hawk from Baghdad to Forward Operating Base Hammer, 30 miles east of the city.

In the cabin, strapped into the choppers jump seats, she began putting names to places that had long been digital abstractions.

I had seen imagery for nine or 10 months prior, Manning recalled, I knew the landscape so well from the air that I recognized these neighborhoods, and it woke me up to see people walking around and to see people driving and to see the buildings and the trees below.

Ringed by desert, the low-slung buildings of FOB Hammer baked in the summer and coursed with mud in the fall.

Every night, Manning rose from her bunk at 9 p.m., dressed in standard-issue visual camouflage and grabbed her rifle. After quickly eating dinner for breakfast, she walked to a Sensitive Compartmented Information Facility, or SCIF, to report for duty.

Mannings SCIF was a glorified plywood box with lousy airflow, situated on a basketball court. She sat at the free-throw line, in a reclining office chair, where she spent her overnight shift facing three laptop computers.

Mannings isolation took on a new form: Hidden away in the darkened SCIF, she would work for eight hours at a stretch, sifting through reports filed securely by American troops in the field, making sense of the raw data for senior-level intelligence officers. She remained sealed off from actual conflict, though she could hear the shudder of car bombs and sometimes ran into soldiers, dazed and dusty, on their way back from a firefight.

At that early juncture, Manning told me, she was too busy to give much thought to the larger import of what she was seeing. Doing my job, you couldnt even really read all the files, she said. You have to skim, get a sense of whats relevant and whats not.

Still, to an extraordinary extent, she had a more comprehensive view of Americas role in Iraq than the infantry in the field did often, literally, a sky-level view and as October ground into November, she found herself increasingly dismayed by a lack of public awareness about what seemed to be a futile, ceaselessly bloody war.

At a certain point, she told me, I stopped seeing records and started seeing people: bloody American soldiers, bullet-ridden Iraqi civilians.

On rare reprieves from the SCIF, Manning accompanied senior officers to meetings with the Iraqi military and the Iraqi federal police, sit-downs that further entrenched her disillusionment.

There would be these tea sessions, where youve got the Iraqi federal police in their blue uniforms, youve got Iraqi Army in, like, the old chocolate-chip camouflage and the Americans in our smeared green digital camouflage, Manning said everyone speaking in different languages, frequently at cross-purposes. Id come in thinking things would be black and white. They werent.

Manning told me she heard the name WikiLeaks for the first time in 2008, at a computer security training course at Fort Huachuca.

By the end of 2009, she had started logging on to internet relay chat conversations devoted to the site. (IRC, a semisecure protocol, was then the preferred method of communication for hackers.)

Initially, she was an observer: She was intrigued by the work that Assange and his team were doing, if not quite ready to endorse their argument for total transparency. She told me that she believed then, and believes now, that there are plenty of things that should be kept secret.

Lets protect sensitive sources. Lets protect troop movements. Lets protect nuclear information. Lets not hide missteps. Lets not hide misguided policies. Lets not hide history. Lets not hide who we are and what we are doing.

She was edging closer to acting but said nothing about the IRC channel to her friends at FOB Hammer, nor about her own personal tumult.

She was now fighting to keep what amounted to two life-altering secrets. She couldnt discuss her identity openly: The dont ask, dont tell policy was still in effect, and it would be years before transgender people were allowed to openly enlist. I binge watched TV shows on the internet, she said.

I was smoking heavily. I was drinking an enormous amount of caffeine. I was going to the dining facility and eating as much as I could. Just any little tiny escape or way to feel like Im not there anymore. Her boyfriend was little help: Manning could feel him slipping away. I was in denial about it, but I had a sense ... that I was being forgotten, she told me.

Manning had a two-week leave coming up. She planned to spend time in Boston, trying to patch things up with Watkins, and in the suburbs of Washington with her aunt.

She dreamed about using the occasion to come out to her family and friends as trans. I kept having this moment in my head, she told me, where I just yell it at the top of my lungs. But she knew, in her heart, that shed never be able to go through with it.

Before leaving FOB Hammer, Manning downloaded, from the governments Combined Information Data Network Exchange, almost every SigActs report from the wars in Afghanistan and Iraq and burned a compressed version of the data onto CD-RW discs, one of which was labeled Lady Gaga.

She did it in full view of her fellow soldiers. But what she did next violated the most important precepts she was taught at Fort Huachuca, along with the oath of enlistment she swore in 2007: She uploaded the contents of the discs onto the personal laptop she planned to take home to the United States. She had not decided what she would do with the data.

Days later, Manning put on a blond wig and ran in a low crouch from the side door of her aunts house, out of view of the neighbors, and drove to the train station.

She wore a dark coat and, under it, business-casual womanswear she bought at a local department store; she claimed it was for her friend who needed it for a job interview.

In Washington, she went to a Starbucks, ate lunch at a busy restaurant and wandered through the aisles of a bookstore; later, she climbed back on the Metro and rode it aimlessly around.

She took great pleasure in being seen as she knew she was and comfort in how easily she passed rarely did anyone give her a second glance.

Before I deployed, I didnt have the guts, Manning, who was then privately referring to herself as Brianna, told me. But her time in Iraq was changing her. Being exposed to so much death on a daily basis makes you grapple with your own mortality, she went on. She no longer wanted to hide.

The expedition was the high point of a disappointing two-week leave. The Army had bumped up her departure from FOB Hammer, and her family hadnt had time to readjust their schedules: Mannings aunt was on a trip abroad, and her sister had just had her first child it would be tricky to carve out time for Chelsea.

Manning took a train up to see Watkins at his home in Waltham, in Massachusetts, but she couldnt shake the feeling that he didnt really want her there, so she cut her stay short by three days.

At that point, it would have been possible for Manning to return to Iraq with the files unshared her actions had been illegal, if reversible. But Manning told me that being in the United States had prompted an epiphany.

At home, she says, she realized how invisible the wars had become to most civilians, whose awareness of Iraq extended as far as the occasional newspaper article or chyron on cable news. There were two worlds, she said.

The world in America, and the world I was seeing [in Iraq], She went on, I wanted people to see what I was seeing.

A blizzard hit Washington. Mannings aunt still wasnt back from vacation. Alone, Manning transferred parts of the files to a small memory card and prepared an anonymous text file she wanted to accompany the information.

This is possibly one of the more significant documents of our time removing the fog of war and revealing the true nature of 21st-century asymmetric warfare, she wrote. Have a good day.

Manning told me her decision to provide the information to WikiLeaks was a practical one.

She originally planned to deliver the data to The New York Times or The Washington Post, and for the last week of her leave, she dodged from public phone to public phone, calling the main office lines for both papers, leaving a message for the public editor at The Times and engaging in a frustrating conversation with a Post writer, who said she would have to know more about the files before her editor would sign off on an article.

A hastily arranged meeting with Politico, where she hoped to introduce herself to the sites security bloggers, was scrapped because of bad weather.

Original post:
The long, lonely road of Chelsea Manning - Irish Examiner