MultiChoice welcomes judgement on digital TV encryption – MyBroadband

MultiChoice has welcomed the Constitutional Courts order in favour of the decision made by former communications minister Faith Muthambi regarding no encryption in government set-top boxes.

We trust this will pave the way for the long-awaited migration to digital terrestrial television, said MultiChoice.

The set-top boxes in question will be manufactured locally and distributed to low-incomehouseholds which cannotafford the converter needed to receive a digital TV signal.

South Africas digital migration calls for old analogueTV signals to be switched off, which means these families may have been left without access to TV channels.

The policy of non-encryption will ensure that poor households benefit from and are included in the migration from analogue to digital terrestrial television and that taxpayers are spared millions of rand in unnecessary costs.

MultiChoice said Chief Justice Mogoeng Mogoengs statement on the caseallays any fears raised regarding the implications of the non-encryption policy.

None of the broadcasters, including free-to-air broadcasters, would be required to do any more than they have previously been required to do. Nor would any be deprived of any advantage or privilege currently enjoyed in relation to access to their viewership and profit-making opportunities.

Here is the original post:
MultiChoice welcomes judgement on digital TV encryption - MyBroadband

Free Online Cryptography Training Class – Cybrary

What is Cryptography and how does it work? These are the questions we will be examining in our cryptography introductory series below. Though this course is a compilation of videos from our other courses, we put together this study for those who want to cut out some of the other content and focus directly on cryptography. Get started learning Cryptography online, for free, now!

In this online course we will be examining how cryptography is the cornerstone of security technologies, and how through its use of different encryption methods, such as ciphers, and public or private keys, you can protect private or sensitive information from unauthorized access. Often associated with privacy, Cryptography offers four basic services: Confidentiality, Integrity, Authenticity / Availability, and Non-Repudiation. This course offers practical examples for everyday use, to provide better understanding of these concepts.

In our brief online Cryptography course, youll learn about the difference between clear text and cypher text, compare different encryption types, how encryption works, and how to secure and compare data through the use of hashing.

We hope you enjoy this class taught by a couple of our many knowledgeable Subject Matter Experts, Leo Dregier and Kelly Handerhan.

Feel free to view our CompTIA CASP or Penetration Testing and Ethical Hacking courses for more information surrounding Cryptography.

What is a Course Badge? Whenever you feel that you have mastered the content of a course, get yourself a nifty course badge to show off your profile.

You need more Cybytes to earn this Course Badge

Read more:
Free Online Cryptography Training Class - Cybrary

Quantum-powered random numbers could provide key to better cryptography – SC Magazine UK

Entropy is not usually considered desirable, except in cryptography

Usually when the subject of quantum computing comes up, it's all rather future-gazing stuff. However, during the Infosecurity Europe 2017 show, one company launched a quantum technology derived product that's very much here and now: Entropy-as-a-Service.

Whitewood, which is developing crypto-security solutions based on advanced quantum technology, says that the cloud-based service "delivers pure quantum entropy, the foundation of randomness, to generate truly random numbers for creating cryptographic keys that are impossible to guess".

So how does this work, and do we actually need a quantum random number generator anyway?

The press release talks of the Whitewood Entropy Engine being at the heart of the service, something born out a decade long research program at Los Alamos National Laboratory. "Random number generation is critical for security but is often poorly understood," says Richard Moulds, general manager of Whitewood, "and it's a point of attack and vulnerability."

SC Media UK asked Moulds if he was saying existing random number generators (RNG) are actually that bad, to the point of being dangerous to use in real world scenarios?

"It's not so much that all random number generators are bad, it's that some are bad but you can't tell which ones they are!" Moulds insists. "As security applications use more and more crypto encryption is becoming ubiquitous and GDPR will only accelerate this they consume more and more keys, which requires more and more randomness."

The trouble being, according to Moulds, that we are increasingly hosting our applications in places where there is little or no randomness the cloud or IoT devices for example.

"We've seen recent patches by Siemens of its IoT building controllers because they had no randomness and hence were generating the same keys," Moulds warns. "Edward Snowden's leaks indicated that a newly standardised RNG had been weakened specifically to enable government eavesdropping. It's effectively impossible to spot the difference between a truly random and non-random RNG."

SC Media put the same question to Dr Zulfikar Ramzan, CTO at RSA. "While research into novel sources of entropy for cryptographic applications is interesting," he admitted, "many of the existing approaches for generating random numbers are quite sound."

In fact, Dr Ramzan went on to insist that when issues do typically occur, "they have less to do with the source of randomness, but rather with the implementation of the approach or when the results are used in downstream applications".

Which leads us to wonder what the real world argument for diverting budgets, that are already squeezed, to a quantum powered random number generator might look like?

Richard Moulds responded: "If we could test the keys that are generated and keep the good ones and throw away the non-random ones there would be no problem." But he added, "There is no official test or standard for doing so, although NIST is actually working on one." This means efforts to ensure keys are truly random have to be proactive not reactive.

"Randomness has to be architected into the system up front," Moulds insists. "Once a key is exposed the game is over."

Dr Ramzan still has concerns though. "In cryptography, novelty is a negative," he explains. "When a new idea is introduced, it needs to withstand the test of time and be adequately analysed before it is safe to use within commercial applications."

He compares cryptography to baking: you not only need to ensure that you use the right ingredients in the right ways at the right times to prepare the batter, but you must make sure that it is cooked for the appropriate amount of time.

"Otherwise, the results can vary from being unpredictable to being lethal, Dr Ramzan concludes.

Here is the original post:
Quantum-powered random numbers could provide key to better cryptography - SC Magazine UK

Blockchain technology and cryptography provider Stratumn raises 7m – CryptoNinjas

Stratumn, a provider of network solutions securing processes between enterprises and their stakeholders through blockchain technology and advanced cryptography, announced today the raising of 7 million in a Series A funding from Open CNP, the Corporate Venture arm of CNP Assurances, Otium Venture, Nasdaq and Digital Currency Group.

Stratumn helps companies securing and streamlining regulatory and compliance procedures

As companies become ever more connected to one another, and the security and integrity of their data are challenged, centrally managed information systems have proved their limitations. StratumnsProof of Process Technologysolves a core dilemma for organizations: streamlining regulatory and compliance procedures, improving customer privacy and data protection while reducing operational and back office costs. Stratumns suite of network solutions provides organizations with an efficient and reliable way to streamline and secure the exchange of data between partners, customers, and regulators. Enterprises who adopt this technology benefit from better accountability, traceability, and integrity of their records, while regulators may audit process data in real-time.

Stratumn has already developed more than 10 projects with large companies such as CNP Assurances, Allianz France, Nasdaq, Thales, Bureau Veritas or Bouygues Immobilier, and is currently Frances leading company using the blockchain technology in terms of staff and projects development.

We are very pleased to have successfully closed this series A round, which represents a major milestone for Stratumn. Our new investors will enable Stratumn to continue and accelerate its development and more effectively address growing needs in our markets. We are especially happy with the continued and increased support from Otium Venture, who have accompanied us for a year, and excited to welcome CNP Assurances, Nasdaq, and Digital Currency Group, who will help us reinforce Stratumns presence in the insurance and capital markets sectors. We are very confident about Stratumns development prospects in the upcoming months and years. The successful closing of this round, as well as our investors commitment as strategic partners, is rocket fuel which will power the development and launch of Proof of Process Technology.

The funding will accelerate Stratumns development and expansion into the U.S.

This funding round constitutes a major step for Stratumn, as it will allow the company to accelerate its development, notably by focusing on research, product design, and business development, as well as by continuing to attract talented individuals to join its 15-person strong international team the company aims to double its size by the end of 2018. Stratumn also intends to develop its international activities through a planned expansion into the United States by the end of the year. This would allow the company to become closer to key stakeholders and decision centers in their core market segments.

This round, led by Open CNP, the Corporate Venture arm of CNP Assurances, with the participation of Nasdaq, Digital Currency Group, and existing investor Otium Venture, combines major corporate and financial investors from France and the United States. In addition to enabling Stratumns development through additional funding, these investors will support Stratumns growth in their respective fields and geographies through partnerships and knowledge sharing, which will help the company reinforce its existing links with the insurance, capital markets, and digital currency ecosystems.

Stratumn and Nasdaq have also entered into a co-research and development partnership, which aims at leveragingProof of Process Technologyto enhance the software solutions and products for the capital markets, particularly in Nasdaqs Market Technology business and its own enterprise technology unit.

Magali No, CDO of CNP Assurancessaid:

Blockchain technology makes processes more reliable and streamlines information flows for consortiums. We would like to promote this technology to our partners and to insurance industry players using the Proof of Process Technology developed by Stratumn. This investment is part of the 100 million that CNP Assurances allocates to start-ups over a five-year period through its Open CNP program and is the fourth Open CNP investment to date.

Nasdaq Head of Corporate Strategy Jean-Jacques Louissaid:

An investment in Stratumn was a natural development for us given the experimentation projects we have successfully executed with Richard and his team over the past year. We look forward to furthering our relationship between Stratumn and our technology team by collaborating on developing and applying unique financial technology that will bolster and strengthen the current and next generation products for our customers and ourselves. This approach fits with the mission of Nasdaq and, in particularly, our newly formedNasdaq Ventures.

Digital Currency Group CEO Barry Silbertsaid:

We are eager to have Stratumn join the DCG family, which now includes 100 companies across 28 countries. Stratumns Proof of Process Technology solves critical challenges around verifying and auditing the integrity of data used to make critical business decisions, and we look forward to helping the team build partnerships across our network of blockchain service providers and enterprises.

Here is the original post:
Blockchain technology and cryptography provider Stratumn raises 7m - CryptoNinjas

Julian Assange: Alleged NSA leaker ‘must be supported’ – The Hill

WikiLeaks founder Julian Assange says that a 25-year-old government contractor accused of sharing National Security Agency (NSA) documents with a media outlet must be supported.

Alleged NSA whistleblower Reality Leigh Winner must be supported, he tweeted Monday alongside a picture of Winner. She is a young woman accused of courage in trying to help us know.

Alleged NSA whistleblower Reality Leigh Winner must be supported. She is a young women accused of courage in trying to help us know. pic.twitter.com/B4aIdt7qz6

It doesnt matter why she did it or the quality [of] the report, Assange added in a separate tweet. Acts of non-elite sources communicating knowledge should be strongly encouraged.

It doesn't matter why she did it or the quality the report. Acts of non-elite sources communicating knowledge should be strongly encouraged.

Court documents filed by the government did not specify which outlet received the material, but NBC News reported Monday that the information went to The Intercept online news outlet.

The Intercept published a top-secret NSA report Monday that alleged Russian military intelligence launched a 2016 cyberattack on a voting software company.

Details on The Intercepts report suggest that it was created May 5, 2017 the same day prosecutors say the materials Winner is charged with sharing were created.

Prosecutors said Winner allegedly printed and improperly removed classified intelligence reporting, which contained classified national defense information last month.

They added that the FBI obtained a warrant to probe Winners home last weekend, where she admitted to intentionally removing classified materials, retaining them and then mailing them to the news outlet.

The FBI then arrested Winner for being in violation of 18 U.S.C. Section 793(e), which states that it is illegal to willfully deliver or transmit information relating to the national defense which the possessor has reason to believe could be used to the injury of the United States or to the advantage of any foreign nation.

Winner, a contractor with Pluribus International Corporation, reportedly began working for a government agency in Georgia in February.

Read the original here:
Julian Assange: Alleged NSA leaker 'must be supported' - The Hill

These Companies Stand to Gain the Most From the Cryptocurrency Rush – Bloomberg

Mining references generally evoke images of picks and shovels.

For advocates of bitcoin and the other cryptocurrencies surging in value, the gold may be in the shares of the companies that produce the computer processors and chips used to create the digital currencies in the process thats become known as mining.

Digital coins can only be created by using computers to solve complex mathematical problems. The difficulty increases as more of the problems get solved, prompting the miners to require even more powerful hardware.With digital coin prices soaring, demand for the components is surging as miners are able to recoup their initial investment quicker.

A complete mining rig, which is made up of graphics cards, a processor, power supply, memory, cabling and a fan, costs between $2,400 to $3,800 on Amazon.com. The Antminer S9, which is estimated to mine 0.29 bitcoin per month, and retails for $2,795, which means you can break even in about four months with bitcoin at $2,700, without taking into account electricity costs. Miners typically buy complete rigs or build them themselves.

The following are some of the companies that make the parts.

Exclusive insights on technology around the world.

Get Fully Charged, from Bloomberg Technology.

The Santa Clara, California-based company manufactures graphic processing units used by gamers and increasingly, by digital-currency miners. GPUs listed in Nvidias website can cost as much as $1,200. The rig-mining market can grow to about $1.3 billion, and with GPUs making up approximately 2/3 of coin mining costs, the demand for GPUs can increase to $875 million, according to a RBC Capital Markets report on June 6. If Nvidia gets half of that, it represents a 10 percent increase on its GPU sales, RBC analyst Mitch Steves said in an interview. The company currently has about 75 percent of the GPU market, according to a Jon Peddie Research report.

The complexity of mining bitcoin has increased to the point that GPUs arent powerful enough, and miners are mostly using application-specific integrated circuits, or ASICs, which Nvidia and competitor Advanced Micro Devices dont make. Tech news website Digitimes reported Nvidia and AMD are planning to release GPUs specifically designed to mine bitcoin.

Shares of Nvidia have climbed 45 percent this year, and have more then tripled in the past year.

AMD, as the company is known, also makes graphics cards used for mining ethereum and other coins. The Sunyvale, California-based companys shares have rallied the most in the Philadelphia Semiconductor Index in the past week, in part thanks to a PCWorld article that said its almost impossible to get AMDs Radeon graphics cards after a surge in demand from ethereum miners.

The company also builds the processors typically used to build mining rigs, and itsChief Technology Officer Mark Papermaster said at a Bank of America Merrill Lynch conference its product compete with bigger rival Intel Corp.

The shares are up 27 percent in the past month, and have almost tripled over 12 months.

Digital currency mining has the potential to boost demand for Intels processors, said Kevin Cassidy, an analyst at Stifel Nicolaus. While AMD CPUs are popular among miners, Intel is the traditional leader in the sector and is taking steps to counter its fledgling rival.

The companys shares have lagged rivals, with a gain of 17 percent in the past year.

Boise, Idaho-based Micron is the largest U.S. maker of memory chips, one of the components of a mining rig, so it also stands to benefit, Cassidy said.

Micron shares have surged almost 50 percent this year, and have more then doubled in the past 12 months.

Read the original here:
These Companies Stand to Gain the Most From the Cryptocurrency Rush - Bloomberg

Bolenum’s Project to Widen Cryptocurrency Adoption – The Merkle

It is always nice to see projects attempting to better the world they live in. This is especially nice because of the low adoption rate of cryptocurrencies and Blockchain technologies on a global scale. A recent CryptoCoinNews interview went over the lack of Blockchain adoption in Africa, while pointing out the massive opportunities that reside on the continent because of that fact. One new project, Bolenum, is looking to start off there.

Though Bolenum has sights on an intercontinental project, the majority of their initial efforts appear to be in Africa. Their Whitepaper outlines the two main issues they feel have caused cryptocurrencies to see lower scale adoption than other parts of the world.

The first obstacle is one known all too well by all cryptocurrencies: lack of public awareness. Many just do not know about cryptocurrency, the Blockchain, or what it can provide. This could be because of a lack of cryptocurrency and blockchain evangelists, but also can be blamed on the lack of readily translated literature into local dialects.

The second problem is one that many in the western world have not really had to deal with: convertibility of funds. While every exchange takes Euros, United States Dollars, and Chinese Yuan, it is way less likely that these exchanges will take the Egyptian Pound, the Nigerian Naira, or the Moroccan Dirham. Without access to fiat exchanges to convert to more readily accepted currencies for crypto, individuals may be out of luck.

They hope to provide solution to these issues at the first ethereum based token and exchange platform that aims to engender more participation in the cryptocurrency on the African continent.

The projects token, BLN, aims to serve as a secure payment method, and also be able to protect wealth. These are Ether based tokens so they benefit from the speed and security of the Ethereum Blockchain.

The main perk that may help the project accomplish its goal is the fact that they will also be opening an exchange that will allow for BLN tokens to be traded for local currencies. This means that someone will be able to not only withdraw the value of their tokens into local currencies, but could give better access to the cryptosphere as a whole. If someone buys BLN with a local currency, they should in theory be able to trade those BLNs on a different exchange for any other digital asset they were interested in. It not only is an asset by itself, but a gateway asset to others previously denied by fiat binding.

They will be holding an ICO for this project starting July 15, and it will span for 30 days. 10,000,000 BLN tokens will be made, with 50% of those being open to the public in an ICO with the other 50% behind held by the Bolenum team as capital to support their future exchange.

Disclaimer: This is a paid press release, the product / service mentioned is not endorsed by The Merkle, always do your own independent research. This is not investment or trading advice.

See the original post:
Bolenum's Project to Widen Cryptocurrency Adoption - The Merkle

Linux malware enslaves Raspberry Pi to mine cryptocurrency | ZDNet – ZDNet

Older Raspberry Pi devices, such as this Raspberry Pi 2, may be more vulnerable to the malware if they haven't been updated in a while.

Someone has developed a simple Linux trojan designed to harness the meager power of Raspberry Pi devices to mine cryptocurrency.

Raspberry Pi users may need to consider applying a recent Raspbian OS update to their devices, particularly if they are currently configured to allow external SSH connections.

According to Russian security firm Dr Web, the malware Linux.MulDrop.14 exclusively targets Raspberry Pi devices to use their processing power to mine a cryptocurrency.

Dr Web discovered the Raspberry Pi mining malware after its Linux honeypot machine became infected with it. The malware uses a simple Bash script to attempt to connect to Raspberry Pi devices configured to accept external SSH connections. It targets Raspberry Pi boards with the default login and password, which are 'pi' and 'raspberry', respectively.

It then changes 'pi' to '$6$U1Nu9qCp$FhPuo8s5PsQlH6lwUdTwFcAUPNzmr0pWCdNJj.p6l4Mzi8S867YLmc7BspmEH95POvxPQ3PzP029yT1L3yi6K1'.

From there it installs the internet-scanning tool ZMap and the sshpass utility, and searches the network for other devices with an open port 22 to infect them.

Older Raspberry Pi devices may be more vulnerable to this malware if they haven't been updated in a while. The Raspberry Pi Foundation told ZDNet sister site TechRepublic that a Raspbian OS update released late last year turned off SSH by default and forced users to change the default password.

However, it warned that there could still be millions of Raspberry Pi boards that haven't been updated. Some 12.5 million of the single-board computers have been sold over the past five years, according to the official Raspberry Pi Magazine.

The malware doesn't try to mine for Bitcoin, whose 'difficulty level' is too high to mine cost-effectively, even for a massive network of PCs let alone Raspberry Pi devices.

However, there are numerous other cryptocurrencies that can be mined with less computational power. In 2014, malware writers experimented with Android malware to mine Dogecoins and Litecoins. Dr Web's virus analysts said the Raspberry Pi malware mines Monero, a lesser-known, but increasingly popular cryptocurrency for dark-web drug markets.

Researchers in May discovered that a network of several hundred thousand PCs infected with the Adylkuzz mining malware, which used the same Windows exploit behind the WannaCry ransomware epidemic, had been toiling away on Monero blocks. At the time, Adylkuzz had generated about $43,000 over several months of mining activity.

The rest is here:
Linux malware enslaves Raspberry Pi to mine cryptocurrency | ZDNet - ZDNet

Cryptocurrency CopyFund Launched By eToro – ETHNews

News wallets and exchanges

eToro, a social investment and trading network, has announced the launch of its Cryptocurrency CopyFund. This comes shortly after the total market cap of cryptocurrencies surpassed $100 billion.

On June 6, eToro announced the launch of its Cryptocurrency CopyFund, which will allow customers to invest in Ether and bitcoin. Over the last year, the number of eToro users trading cryptocurrencies has grown by a factor of four. Co-founder and CEO of eToro, Yoni Assia, said:

We have been seeing an increasing number of our clients looking for a simpler way to access investments in cryptocurrencies with a view to building a portfolio in the future. They were asking how to allocate their investments between the two largest cryptocurrencies that are traded on eToro, so we have launched an automatically rebalanced investment strategy to simplify their investments into this new exciting asset class.

eToro customers have previously accessed the cryptocurrency markets through CFDs (contracts for difference).

More and more traders and investors are learning about the potential of this market and getting involved. Now they will be able to access a long-term investment strategy that is constantly reviewed and rebalanced, Assia added.

In the Cryptocurrency CopyFund, holdings will be proportional to the market caps of individual cryptocurrencies. Once a month, the fund will automatically be analyzed and rebalanced. Structured as medium-to-long-term investments, CopyFunds require a minimum pay-in of $5,000. While there are no management fees associated with CopyFund investment, eToro does charge transaction fees.

eToro will expand its offerings of cryptocurrencies in the near future to encompass Ripple and Dash among others.

Based in Tel Aviv, Israel, eToro has millions of users in more than 170 countries. In December 2014, eToro raised $27 million from Chinas Ping An Insurance Company and Russias state-owned Sberbank. At the St. Petersburg International Economic Forum, eToro recently presented a pilot blockchain wallet in partnership with coloredcoins.org.

Matthew is a writer living in Los Angeles. He studied international economics at Georgetown University. Matthew is a full time staff writer for ETHNews and holds value in Ether.

See original here:
Cryptocurrency CopyFund Launched By eToro - ETHNews

The Perils of Whistleblowing: My Interview With Edward Snowden – Entrepreneur

In 2013, Edward Snowdens life -- and the world -- changed forever. This former NSA contractor blew the whistle on the agencys practice of collecting private information and conducting mass surveillance on citizens when he brought evidence to the press and then left the country.

In a video chat moderated by Secret Knock conference organizerGreg S. Reid, I was able to ask him a question directly. "Do you have any regrets?" I asked.

My mission was never to change the world, he said.My mission was to return public information to public hands so you could determine whether things should change.... I regret only that I did not do more -- sooner and bolder."

In part, Snowden hoped his actions would embolden others to step forward when they saw wrongdoing. While the majority of us will never be called on to report anything of comparable national or global scale, you may be one day called on to speak up. In a 2011 poll, 45 percent of American workers stated that they had observed wrongdoing in the workplace. Whether you're a business owner or an employee, here are my suggestions, coupled with Snowden's experience, on how to stop being a passive observer and become a safe whistleblower.

Related:Why You Should EncourageWhistleblowingin Your Organization

The line between a whistleblower and a leaker is fine and hotly debated. The general distinguishing mark tends to be the avenues taken to release information to the public. Whistleblowers are those who follow legally established procedures for exposing wrongdoing; they work within the system, reporting to the proper authorities so that matters can be handled internally. The leaker is one who bypasses the system altogether and goes directly to the press. The former is protected and guided by law; the latter is not.

To this day, Snowden maintains he did everything he could to work within the system. I still made tremendous efforts to report these programs to co-workers, supervisors, and anyone with the proper clearance who would listen, he said in a 2014 live Q&A. The reactions of those I told about the scale of the constitutional violations ranged from deeply concerned to appalled, but no one was willing to risk their jobs, families, and possibly even freedom to go to through what [Thomas] Drake did.

It was only after facing this internal resistance that he turned to journalists to help get his message out. Even then, he was careful. As a condition of access to archive, I required journalists to go to the government in advance and tell them what they were going to be writing so the government had a chance for rebuttal, he said. In every case, process has been followed.

Related:Uber CEO Travis Kalanick Launches Investigation Into Sexual Harassment Claims

For those who would follow Snowdens example, the single greatest obstacle is fear. Snowdens colleagues were intimidated by the example of Thomas Drake, former NSA executive who revealed unethical acts committed by the NSA and subsequently endured raids by the FBI and prolonged prosecution. Similar examples are often enough to deter any would-be whistleblower.

The greatest threat to fear is knowledge. Take time to investigate whistleblower protection programs. Research and understand your rights. Identify those groups that can support you while working.

Related:When the CEO Goes Bad, the Whole Company Needs a Fresh Look

Protection aside, once youve blown the whistle, youre in for a rough ride. Snowden had no misunderstandings. Though he never intended to end up in Russia, he did expect to end up in a jumpsuit in Guantanamo Bay. He understood that calling attention would mean an end of his life as hed been living it. I realized I had to come forward, light a match, burn my life to the ground if this was really going to work.

As Snowdens case has demonstrated, whistleblowing isnt as simple as identifying a problem and accepting a reward. Be ready for backlash from within and without your organization as you stand by your principles. Since 2009, retaliation has increased 83 percent, while whistleblowing incidents have only increased by 12 percent.

If youre not willing to be called bad names, . . . you dont really believe in anything that much, he says. Being criticized is the price of admission for achieving change. The most common thing in the world of politics is that change is never comfortable.

Intimidation isnt the only route that businesses and governments will take to silence whistleblowers. Many will offer hush money, effectively turning you from an opponent into an accomplice. Dont take that risk. Too many examples show when the coverup is revealed, both the company and the silenced party are worse off.

On the one hand, hotlines are a powerful asset. Calls are made and recorded are proof the employee has performed their due diligence in reporting wrongdoing.

On the other hand, the hotline is a conflict of interest on the companys part. In his book, The Whistleblowers Handbook, Stephen Kohn advises caution. Hotline programs are under no duty to help whistleblowers, Kohn writes. They are voluntary programs, and the nature and extent of their investigations are outside of the control of the employee. There is no requirement that these programs offer employees complete or accurate information about their legal rights. In other words, the programs exist for the benefit of the government/corporation; they are not legal service programs for whistleblowers.

Related:Radical Inclusion: How Burning Man is Helping Create a New Breed of Entrepreneur

When asked, Snowden said he only regrets how long it took him to come forward.

I would do it again, he said. Despite everything that has happened to him, he believes firmly that the good in the world outweighs the bad. Investigation incited by Snowdens revelations revealed that the NSAs mass surveillance tactics had done nothing to stop terror attacks. Despite condemning Snowdens actions in his State of the Union address, President Obama called for reform within the NSA and Congress. None of that would have happened if Snowden hadnt taken the risk and come forward.

Amy Osmond Cook, Ph.D., is the CEO of Osmond Marketing. She enjoys reading business books, playing the violin and trying new restaurants with her husband and five children. Follow her at @amyocook.

Originally posted here:
The Perils of Whistleblowing: My Interview With Edward Snowden - Entrepreneur