Russian President Says Edward Snowden Did Not Leak US Intelligence to Moscow – Newsweek

Russian President Vladimir Putin has denied that U.S. fugitive Edward Snowden, who is currently living in Russia, ever offered to hand Moscow sensitive information in exchange for asylum.

We made first contact with Mr. Snowden in China, Putin said, reflecting on Snowdens departure from the U.S. following his leak of tens of thousands of National Security Agency and British Government Communications Headquartersdocuments in 2013. The Russian president was speaking to U.S. filmmaker Oliver Stone for his four-part documentary series for Showtime called The Putin Interviews.

Related: Putin answers questions about cloning himself, marijuana and sex

Subscribe to Newsweek from $1 per week

Thats when we were told that there is this person who wants to fight for human rights and against their violation. And we need to give credit to Mr. Snowden. He never took it upon himself to give us any kind of information, Putin said.

However, Putin told Stone that Russia was not prepared to welcome Snowden at first. We have such complicated relations with the U.S., and we dont need additional complications, the Russian president explained.

According to Putin, Snowdens arrival in Moscow came as a surprise to the Kremlin, as it was initially only intended as a transit flight to Latin America.

To Cuba or to Ecuador? Stone asked Putin, though the president did not answer. He only revealed that Russia was not fully prepared to accept Snowden at first and that once the information about his protracted trip around the world made it to the press, he would not be allowed to fly anywhere.

And he was stranded in the transit passenger zone, Putin said. He is a personthat it is brave, if not a little reckless. He sat for a while in the transit passenger zone, and then we even gave him temporary asylum.

Of course the American side asked us to hand him over. Clearly we could not do that, Putin said. When asked why, he said it was because Russia did not feel it would have the same treatment in response if it asked for an extradition.

Equally, Snowden has denied taking any files to Russia, telling TheNew York Times in 2013 it would not serve the public interest to do so.

See the article here:
Russian President Says Edward Snowden Did Not Leak US Intelligence to Moscow - Newsweek

Snowden needs to face the music – Belleville News-Democrat

Snowden needs to face the music
Belleville News-Democrat
The denials now by Vladimir Putin have no merit; if he had said these denials six months ago they could have been believable, but not now. This whole story smells of a rat turncoat by the name of Edward Snowden. He would have had the knowledge and ...

Read the original here:
Snowden needs to face the music - Belleville News-Democrat

Justice Department requests $21.6M to tackle ‘Going Dark’ encryption problem – Washington Times

The Justice Department is requesting more than $20 million in federal funding to bankroll efforts related to resolving the governments continuing Going Dark problem, Deputy Attorney General Rod Rosenstein said Tuesday, signaling one of the Trump administrations first attempts at tackling the issue of ubiquitous, hard-to-crack encryption amid growing concerns involving its impact on criminal investigations.

While federal investigators have fought for years to counter the so-called Going Dark phenomenon the governments growing inability to access and decipher digitally encrypted communications Mr. Rosenstein said during a Justice Department budget-request hearing Tuesday that resources needed to reverse the trend are required now more than ever.

The seriousness of this threat cannot be overstated, Mr. Rosenstein told the Senate Subcommittee on Commerce, Justice, Science and Related Agencies. This phenomenon is severely impairing our ability to conduct investigations and bring criminals to justice.

The Justice Department is requesting $21.6 million specifically towards countering its Going Dark program, Mr. Rosenstein testified in his prepared remarks.

The FBI will use this funding to develop and acquire tools for electronic device analysis, cryptanalytic capability and forensic tools, he added, in turn enabling the Justice Department to continues its leading role in enhancing the capabilities of the law enforcement and national security communities.

Mr. Rosenstein was not initially slated to testify Tuesday, but appeared after the hearings previously scheduled witness, Attorney General Jeff Sessions, canceled in lieu of speaking before the Senate Intelligence Committee with respect to the Trump administration and its purported ties to Russia, as well the presidents abrupt firing last month of former FBI Director James Comey.

Days before leaving office on May 9, Mr. Comey said federal investigators had legally seized more than 6,000 smartphones and electronic devices during a recent six-month span but found that 46 percent couldnt be opened with any technique.

That means half of the devices that we encounter in terrorism cases, in counterintelligence cases, in gang cases, in child pornography cases, cannot be opened with any technique, Mr. Comey told the Senate Judiciary Committee on May 3. That is a big problem. And so the shadow continues to fall.

The vast majority of smartphones currently sold in the U.S. run either Apples iOS or Googles Android operating systems, the likes of which allow customers the ability to protect their digital contents and communications from eavesdroppers with security-minded technology including strong encryption. While hailed by privacy and security proponents, however, the issue became a hot-button issue last year after federal authorities found themselves unable at first to access the contents of an Apple iPhone recovered from the scene of a December 2015 mass shooting in San Bernardino, California.

If Apple doesnt give info to authorities on the terrorists Ill only be using Samsung until they give info, President Trump tweeted from the campaign trail February. Boycott all Apple products until such time as Apple gives cellphone info to authorities regarding radical Islamic terrorist couple from Cal.

The Obama administration was not in a position where they were seeking legislation, Mr. Comey told lawmakers last month when asked about the possibility of establishing a legal statue to resolve the Going Dark dilemma. I dont know yet how President Trump intends to approach this. I know he spoke about it during the campaign, I know he cares about it, but its premature for me to say.

Read more:
Justice Department requests $21.6M to tackle 'Going Dark' encryption problem - Washington Times

When is ‘not a backdoor’ just a backdoor? Australia’s struggle with encryption – GCN.com

COMMENTARY

This article first appeared on The Conversation.

The Australian government wants the ability to read messages kept secret by encryption in the name of aiding criminal investigations. But just how it proposes to do this is unclear.

As Australian Attorney-General George Brandis recentlytold Fairfax Media, "[a]t one point or more of that process, access to the encrypted communication is essential for intelligence and law enforcement."

Inan interviewwith Sky News, he spoke favorably of controversial U.K.legal powersthat seek to impose on device makers and social media companies a greater obligation to work with authorities where a notice is given to them to assist in breaking a communication.

Brandis has insisted the government doesnt want a backdoor in secure messaging apps. How, then, he expects companies to break them is unclear.

As many havepointed out, its hard to see any tool that gives law enforcement privileged access to otherwise encrypted messages as anything else but a backdoor.

How end-to-end encryption works

Backdoor or not, its worth being skeptical of any mechanism aimed at accessing encrypted messages on platforms like WhatsApp. To explain why, you need to understand how end-to-end encrypted messaging services work.

Encrypted messaging servers scramble the original message, the plaintext, into something that looks like random gibberish, the cyphertext.

Translating it back to plaintext on the receivers phone depends on a key -- a short string of text or numbers. Without access to the key, it isnt feasible to get the plaintext back.

Keys are generated in pairs, a public key and a private key, of which only the private key must be kept secure. The sender of the secure message has the receivers public key, which is used to encrypt the plaintext. The public key cannot be used to unscramble the cyphertext, nor does possessing the public key help in obtaining the private key.

End-to-end encryption simply keeps the private key securely stored on the phones themselves, and converts the cyphertext to plaintext directly on the phone. Neither the private keys nor the plaintext are ever available to the operator of the messaging service.

Compromising security

An encrypted messaging app could hypothetically be modified in a number of ways to make it easier for authorities to access.

One would be to restrict the range of keys that the app can generate. That would make it possible for the government to check all possibilities.

The U.S. government, which imposedregulations to this effectfor a brief period in the 1990s, may have once had computing resources far in excess of any other entity, but this is no longer the case. In fact, these old rules are themselves still causing security problems, as some applications can be tricked into reverting to the insecure export mode encryption that is trivially crackable today.

Other national governments and well-funded private bodies would find brute force checking of all the possible keys well within their capabilities, compromising the security of legitimate users.

And while governments might believe they can keep their backdoor secure, such secrets have a nasty habit of leaking out, as did hacking techniques used by theCIAandNSA.

Nor can governments simply make possessing encryption software a criminal offence.

Take the application Pretty Good Privacy (PGP) -- or, more precisely, its open-source equivalent GNU Privacy Guard (GPG).

Once used for securing email messages, its now more often used to ensure software updates on Linux systems are from the original authors and have not been tampered with. For instance, thesystem update tool in Ubuntu Linuxuses the GPG machinery for this. Without it, the Linux servers that run much of the internet would become much more vulnerable to hackers.

Similar mechanisms are used in Windows, iOS and Android to prevent tampered applications from being installed. As such, banning or undermining end-to-end encryption would seriously affect internet security.

Endless workarounds

In any case, creating backdoors in end-to-end encrypted messaging services would not achieve its goals. Once messaging app backdoors became known, savvy users would simply switch to another service, or make their own.

Originally posted here:
When is 'not a backdoor' just a backdoor? Australia's struggle with encryption - GCN.com

FBI Seeks $21M to Counter Encryption – On the Wire (blog)

The FBI is asking for more than $20 million in the 2018 fiscal year budget to counter what the bureau sees as the threat of encryption, both in devices and in real-time communications tools such as text or voice apps.

The request is part of the Department of Justices proposed budget for the next fiscal year, and Deputy Attorney General Rod Rosenstein said during a Senate hearing Tuesday that the FBI would use the money for a wide variety of things. In his testimony, Rosenstein said that the increased use of encryption, which the FBI and other law enforcement agencies refer to as the problem of going dark, is a growing challengeand needs funding support.

The seriousness of this threat cannot be overstated. Going Dark refers to law enforcements increasing inability to lawfully access, collect, and intercept real-time communications and stored data, even with a warrant, due to fundamental shifts in communications services and technologies, Rosenstein said.

This phenomenon is severely impairing our ability to conduct investigations and bring criminals to justice. The FBI will use this funding to develop and acquire tools for electronic device analysis, cryptanalytic capability, and forensic tools.

In the proposed budget, the FBI asked for $21.6 million to address the encryption issue. As Rosenstein said in his testimony, the money may be used for developing or buying tools and techniques to analyze encrypted devices, perform forensic analysis, or cryptanalytic analysis, all of which are time consuming and expensive. While the FBI has been raising concerns about the use of encrypted communications for years, much of the current concern comes from the proliferation of encrypted communications apps and devices that store user data in encrypted form by default.

Most currentiPhones and Android devices have encrypted data storage enabled by default, and law enforcement agencies have struggled to bypass the protections. During the tense showdown between Apple and the FBI last year over an encrypted iPhone used by a terrorist, the bureau sought a court order to getApple to build a backdoored version of iOS specifically to bypass the devices encryption. Apple officials called the request offensive and fought it. Eventually the FBI bought a technique from a third party to unlock the phone.

But that case was just one of many involving encrypted devices, and FBI officials and others in the law enforcement community have continued to push for methods to bypass or weaken encryption systems, both in transit and at rest. Privacy advocates and security experts have pushed back, saying that any backdoored or intentionally weakened encryption system would put all users at risk.

Read more:
FBI Seeks $21M to Counter Encryption - On the Wire (blog)

ITPA slams Turnbull Government over proposed encryption laws – iTWire

A lobby group for IT workers has slammed the Coalition government over its proposal to introduce laws to gain access to encrypted communications, saying such moves were completely unworkable.

IT Professionals Association president Robert Hudson said though the government was saying it did not want a backdoor into encrypted communication applications, such a method was the only way that it could achieve what it had stated it wanted to do.

In the wake of the terrorist incidents in London, both Prime Minister Malcolm Turnbull and Attorney-General George Brandis have proposed that curbs be imposed on encryption.

But Hudson said just making such statements could be interpreted as "political opportunism" because anyone who had an understanding of how encryption worked would know that such proposals could not be implemented.

"With modern encryption processes, this is only possible if you have access to the key required to decrypt the message, as 'cracking' the encryption is largely not possible otherwise due to the mathematical complexity of the algorithms used."

Hudson said this meant that despite the government's protests that it did not want backdoors, "that's the only way to achieve what they want and if they have backdoors into the encryption, then two things will happen:

"The backdoor will be leaked/exposed. This basically means that the encryption process can no longer be trusted.

"People will stop using encryption processes they cannot trust."

He said this would have little effect on the "bad guys" because those who were competent would switch to communications protocols they trusted or else manage the encryption keys themselves.

"By some reports, less than half of all communications between 'bad guys' is estimated to be encrypted today and these are likely already the competent ones. Such a knee-jerk reaction will, however, have a horrific impact on innocent use of encryption. Legitimate users will be forced to find other methods of encryption," Hudson said.

"If SSL certificate vendors are forced to bake 'backdoors' into their certificates, the impact on eCommerce alone (currently a $32 billion business in Australia in 2017) will be immense.

"This government appears to have not learnt anything from past technology initiatives that were implemented on the run. In typical fashion, there appears to have been no serious consultation with experts and disregard for (or no understanding of) the complexities involved."

Read this article:
ITPA slams Turnbull Government over proposed encryption laws - iTWire

Healthcare Data Encryption not ‘Required,’ but Very Necessary – HealthITSecurity.com

Source: Thinkstock

June 14, 2017 -Healthcare cybersecurity is essential for covered entities of all sizes, especially as ransomware attacks and other types of malware become more common. Healthcare data encryption is often discussed in these situations as well, with many in the industry underlining its importance.

HIPAA regulations do not specifically require data encryption, and instead qualify it as an addressable aspect. However, it is a very necessary piece to the larger data security puzzle.

In this primer, HealthITSecurity.com will review the basics of healthcare data encryption and explain why it is so critical in the current healthcare cybersecurity landscape.

Encrypting data means an organization converts the original form of the information into encoded text. Data is unreadable unless an individual has the necessary key or code to decrypt it.

With healthcare data, this involves securing ePHI and keeping it confidential so unauthorized individuals cannot access or use the information, even if they are able to find the information in a database or network.

READ MORE: Implementing HIPAA Technical Safeguards for Data Security

The Security Rule defines confidentiality to mean that e-PHI is not available or disclosed to unauthorized persons, HHS states on its website. The Security Rule's confidentiality requirements support the Privacy Rule's prohibitions against improper uses and disclosures of PHI.

Furthermore, the Security Rule also emphasizes the importance of ePHI integrity and availability. Covered entities maintain integrity by ensuringePHI is not altered or destroyed in an unauthorized manner, while availability relates to the data is only accessible and usable by authorized individuals.

There are also two kinds of two kinds of data that can be encrypted: data in motion and data at rest.

Data in motion is information that is being sent from one individual or device to another. For example, this can be done through secure direct message or email. Data at rest is when the information is being stored.

Encryption and decryption fall under the Access Control aspect of HIPAA technical safeguards. The Security Rule does not require specific technical solutions, and instead maintains that there are many technical security tools, products, and solutions that a covered entity may select to maintain PHI security.

READ MORE: How Data Encryption Benefits Data Security

Determining which security measure to implement is a decision that covered entities must make based on what is reasonable and appropriate for their specific organization, given their own unique characteristics, as specified in 164.306(b) the Security Standards: General Rules, Flexibility of Approach, states the HIPAA Security Series from HHS.

Access Control will give users the necessary rights or privileges to access certain areas containing information, including information systems, applications, programs, or files. These rights and/or privileges should be granted based on an individuals necessary job function, and the minimum necessary must be followed.

Essentially, individuals should only be given the minimum necessary access to properly perform their job. This is especially critical when PHI access is taken into account.

For encryption and decryption specifically, HHS explains that healthcare organizations must determine if this measure will be necessary and benefit workflow.

it permits covered entities to determine whether the addressable implementation specification is reasonable and appropriate for that covered entity, HHSstated. If it is not, the Security Rule allows the covered entity to adopt an alternative measure that achieves the purpose of the standard, if the alternative measure is reasonable and appropriate.

READ MORE: HIPAA Data Breaches: What Covered Entities Must Know

HHS added that covered entities should consider which ePHI should be encrypted and decrypted to prevent unauthorized access by persons or software programs. Additionally, organizations can consider reasonable and appropriate mechanisms to prevent access to ePHI by persons or software programs that have not been granted access rights.

Healthcare organizations can use their risk analysis to better determine whether or not something is addressable or required. This is another key aspect of HIPAA regulations, and all entities should be performing regular risk analyses.

Davis, Wright, Tremaine LLP associate Anna Watterson explained in a previous interview with HealthITSecurity.com that the risk analysis is the foundation of the security role for an organization.

The addressable ones need to be implemented if reasonable and appropriate, Watterson said. So the risk analysis can be the basis for determining whether a particular addressable implementation specification is reasonable and appropriate to implement in a particular circumstance.

The National Institutes for Standards and Technology (NIST) explained in a storage encryption guide that organizations should implement encryption solutions that use existing system features, such as operating system features.

It can be more difficult when solutions require extensive changes to the infrastructure. Furthermore, end user devices should generally be used only when other solutions are not sufficient.

Organizations should carefully consider how key management practices can support the recovery of encrypted data if a key is inadvertently destroyed or otherwise becomes unavailable, NIST wrote. Organizations planning on encrypting removable media also need to consider how changing keys will affect access to encrypted storage on removable media and develop feasible solutions, such as retaining the previous keys in case they are needed.

NIST also establishedthe Cryptographic Module Validation Program (CMVP) to analyze, test, and validate that crypto modules are functioning properly and deploying approved algorithms. All algorithms and modules are tested for conformance with the Federal Information Processing Standard (FIPS) 140-2.

Many federal agencies require FIPS 140-2 validation, noted HealthITSecurity.com contributor Ray Potter.

Essentially this means that crypto is useless until proven otherwise, a blunt but accurate sentiment, Potter wrote. Other sectors have adopted the standard as their own, as well, with increasingly strict adherence in state and local government, finance, and utilities. Either encryption is validated or it is not. Its very black-and-white.

With healthcare data encryption, NIST also released NIST SP 800-66:An Introductory Resource Guide for Implementing the HIPAA Security Rule.

NIST security standards and guidelines (Federal Information Processing Standards [FIPS], Special Publications in the 800 series), which can be used to support the requirements of both HIPAA and FISMA, may be used by organizations to help provide a structured, yet flexible framework for selecting, specifying, employing, and evaluating the security controls in information systems, the guides executive summary explained.

Overall, healthcare organizations need to take the time to understand all available options to properly maintain ePHI security. Technology will only continue to evolve, and covered entities and their business associates are becoming more digital and connected both to other organizations and in utilizing internet connected devices.

A ransomware attack could lead to data becoming compromised, but what if it was already encrypted in the first place and was inaccessible? A laptop containing ePHI might be stolen, but what if that data is unreadable without an access key?

HHS even notes in its ransomware guidance that if the ePHI was properly encrypted before an incident occurs, then it is not considered unsecured PHI and the entity is not required to conduct a risk assessment to determine if there is a low probability of compromise, and breach notification is not required.

Healthcare organizations should conduct thorough and regular risk analyses to properly determine how and where data encryption would be beneficial. Staying educated on all available options and any federal or state requirements will also help entities ensure ePHI security. While not technically required, data encryption is quickly evolving into a very necessary part of data security.

More here:
Healthcare Data Encryption not 'Required,' but Very Necessary - HealthITSecurity.com

New Open Source Software Strengthens Satellite Geodesy Capability – GIM International (press release) (subscription) (blog)

Scientists from Geoscience Australia have released new software that will improve the ability to process big remotely-sensed satellite datasets. The new "PyRate" software is open source Python software for collating and analysing Interferometric Synthetic Aperture Radar (InSAR) displacement time series data.

InSAR is a non-invasive geodetic method that detects changes in the height of the Earth's surface using remotely-sensed satellite imagery. This is a highly accurate satellite monitoring technique that uses two or more Synthetic Aperture Radar (SAR) images of an area to identify patterns of surface movement over time.

By monitoring movements of the Earth's surface, scientists can improve their understanding of how the Earth's crust changes over time, including changes in elevation caused by larger earthquakes and potential land subsidence caused by human activities such as groundwater and resource extraction.

The new software builds upon a Python-language translation of the University of -RATE software. This provides a portable and free solution that is scalable from desktop machines for small area processing to large multi-node super computers for conducting regional or continental-scale analyses.

The new software will enable Geoscience Australia to scale up its InSAR processing capability to run on the Australian National University's National Computational Infrastructure facility super computer. It will also support other scientists to make use of the ever expanding Australian national archive of Sentinel-1 SAR data available via the Copernicus Australia data hub, particularly for InSAR time series analysis.

The new PyRate software will be applied to data obtained for a number of existing Geoscience Australia projects, including InSAR monitoring in Queensland's Surat Basin and in the Macarthur region, south of Sydney.

The PyRate version 0.2.0 software is available through Github and via PyPI, the python package index, with additional supporting documentation provided.

Link:
New Open Source Software Strengthens Satellite Geodesy Capability - GIM International (press release) (subscription) (blog)

MIA Had Julian Assange as a Guest at Her Meltdown Festival Panel – Paste Magazine

Rapper M.I.A. seems to surround herself with controversy. Last fall, she took shots at Beyonc and Rihanna, two of the music industrys most respected women, for stealing her style and not crediting her for it, which really had people scratching their heads, not to mention a lot of angry Beyhive and Navy members in M.I.A.s mentions.

The release of M.I.A.s fifth album, which was expected to perform well on the charts and even had a guest vocal from ex-boybander Zayn Malik, was clouded last fall thanks to the Beyonce/Rihanna controversy. Since then, shes been gaining back her goodwill by supporting Jeremy Corbyn in the U.K. election and curating U.K.s Meltdown Festival, joining the likes of David Bowie and David Byrne.

The rapper brought out philosopher Slavoj iek and Srecko Horvat to join her for a panel in which they discussed the state of the world and general humanitarian affairs. The main star of the panel was Julian Assange, who beamed in from a remote location to discuss the complexities of global activism and art in a changing world. M.I.A.who has been hands-on and DIY throughout her careeralso brought a number of underground artists into the spotlight. Performers at the weeklong event included Young M.A., Mykki Blanco and Yung Lean.

You can watch a clip of the iek interview below and read more about the Meltdown Festival here.

Read the rest here:
MIA Had Julian Assange as a Guest at Her Meltdown Festival Panel - Paste Magazine

A Mysterious New Cryptocurrency Is Surging After Being Endorsed by Putin – Vanity Fair

Ethereum founder Vitalik Buterin speaks at TechCrunch in December of 2015.

By John Phillips/Getty Images.

After catching the eye of both the Singapore government and Russian President Vladimir Putin, Ethereumthe second-biggest cryptocurrency in the world, after Bitcoincontinues to skyrocket. On Monday morning, the cryptocurrency was trading at a record-high level of $407.10, more than a 5,000 percent rise since the beginning of 2017, when it was trading at $7.98.

Ethereums founder, Vitalik Buterin, recently met with Putin during the St. Petersburg International Economic Forum, a signal that the country may be interested in using digital currency to move its economy beyond gas and oil. The digital economy isnt a separate industry, its essentially the foundation for creating brand-new business models, Putin said at the forum. (Russian entities, like the state development bank VEB, have agreed to use Ethereum to help implement blockchain technology in the country). As investors look for a place to put their assets amid mounting geopolitical instability, some are turning to cryptocurrency. Singapores government has released a report saying it has carried out a test using ethereum blockchain technology to create a national digital currency. Regulators in Japan are issuing new rules that make cryptocurrencies like Ethereum a valid form of payment. And companies such as Toyota and Microsoft, which are members of an organization called the Enterprise Ethereum Alliance, are throwing their weight behind the cryptocurrency, too.

Ethereum, which has a total valuation of $36 billion, trails only Bitcoin (valued at $49 billion) in terms of market capitalization. Bitcoin has been rallying all year, reaching a high of above $3,000 for the first time on Sunday as a growing number of people turn to virtual currencies as a safer, faster way to exchange money. But Ethereums rally may still have a ways to go: Pavel Matveev, the co-founder of banking start-up Wirex, tells CNBC that Ethereums price could reach $600 by the end of the year.

Read more here:
A Mysterious New Cryptocurrency Is Surging After Being Endorsed by Putin - Vanity Fair