‘WhatsApp encryption helps terrorists communicate safely’ – pppFocus

The battle over encryption, and the role tech companies should play in criminal investigations, has re-emerged after United Kingdom investigators discovered that Khalid Masood, the alleged perpetrator of last weeks terror attack in London, used WhatsApp before the attack.

Four people were killed and 50 others were injured before the attacker was shot and killed by police.

In a Sunday appearance on BBCs Andrew Marr show, U.K. Secretary of State Amber Rudd said the end-to-end encryption capabilities of messaging tools like WhatsApp are completely unacceptable. There should be no place for terrorists to hide, Rudd said, explaining how she believes national security supersedes concerns over privacy.

End-to-end encryption ensures that data is encrypted on one end and can only be deciphered by the recipient, with no third party, including Internet providers, able to intercept the messages. Apple found itself ensnarled in the debate previous year as authorities sought to unlock the phones of the San Bernardino shooters, who killed 14 people at a center for adults with disabilities in December 2015. Eventually, the Federal Bureau of Investigation accessed the devices without Apples assistance.

The tech industry will most likely resist Rudds request for a back door system to allow authorities to retrieve information, as it has in the face of previous law enforcement demands for access to data after major attacks.

And encrypted messaging is becoming a more popular feature, with other services opting to roll out new features. We need to make sure organisations like WhatsApp, and there are plenty of others like that, dont provide a secret place for terrorists to communicate with each other. [.] We need to make sure our intelligent services have the ability to get into situations like encrypted WhatsApp.Earlier today, MP Nadine Dorries also joined the chorus, tweeting that to keep our streets safe, we need to rise up against companies like Apple and WhatsApp who provide space and comfort to terrorists. They are not, she noted.

There is a fine line here, Maltese Interior Minister Carmelo Abela said Monday.

Police made another arrest in Birmingham, where Masood had lived. The 30-year-old is one of two men now being held over possible connection to the attack.

This report contains material from the Associated Press.

View original post here:
'WhatsApp encryption helps terrorists communicate safely' - pppFocus

Free at last! D language’s official compiler is open source – InfoWorld

Informed news analysis every weekday

Your message has been sent.

There was an error emailing this page.

The D language, long an underdog among programmers, got a significant boost this past week when its developers received permission to relicense its reference compiler as an open source project.

DMD, the reference compiler for D, has been encumbered by legacy licensing, courtesy of Symantec. The license made it problematic to distribute the compiler in conjunction with other open source software -- for instance, in a Linux distribution -- and often sparked confusion about what it permitted.

All that changed when Symantec finally gave permission to allow DMD to be relicensed under the highly permissive Boost License.

Two other open source D compilers exist, GDC and LDC, but both have typically lagged in terms of their feature support for the language.

DMD's licensing is one likely reason why the D language, originally created as an evolutionary expansion of C/C++, has not enjoyed wider adoption. Most other recently created languages, such as Go and Rust, have their reference implementations available as open source projects.

Supporters of D cite many features that put it in the same class as Rust and Go in terms of convenience and safety: fast compilation times, garbage-collected memory management (with manual memory management also available), and strong interoperation with C/C++. But it stands out thanks to its static introspection functions and code-generation features, which allow compile-time optimizations that would be difficult in other languages.

Freeing up DMD means one fewer obstacle to wider acceptance of D, but not automatically so. D co-creator Andrei Alexandrescu has cited three key obstacles D would need to overcome: How its use of garbage collection by default alienated many C/C++ programmers, its "historical lack of vision," and the fact that it remains minimally used though it's been around for years. Relicensing DMD can address the first of those by allowing a broader base of developers to build more standard-library additions that don't depend exclusively on D's garbage-collected memory management.

But D also faces strong competition from other languages. Much of the potential user base for D may already have made commitments to Rust and Go, and newcomer languages like Nim are seeking their own comfort zones between security, speed, and convenience. Still,D can potentially make a case for itself in the face of those odds, and it has now added one more way to do so.

Sponsored Links

Continue reading here:
Free at last! D language's official compiler is open source - InfoWorld

Encryption bills pose challenges for Congress | Computerworld

Breaking encryption technology used by terrorists and criminals poses a frustrating dilemma for intelligence agencies and, most recently, congressional lawmakers.

Bipartisan legislation to create a commission to study U.S. encryption policies and practices is still weeks away from being introduced as discussions continue, congressional aides familiar with the plan told Computerworld.

The commission approach, backed by Sen. Mark Warner (D-Va.) and House Homeland Security Committee Chairman Michael McCaul, (R-Texas) is intended to bring experts together to dive into the differing points of view, where tech companies want to protect privacy with encryption, while the FBI and other law enforcement agencies want to prevent acts of terrorism and crime by monitoring encrypted communications.

Meanwhile, Senate Intelligence Committee Chairman Richard Burr (R-N.C.) and Sen. Dianne Feinstein (D-Calif.) are working on a separate bill that would guarantee law enforcement access to encrypted data, aides said Thursday. The terror attacks in Paris and San Bernardino, Calif., have ignited the debate in Congress over encryption.

The Burr-Feinstein approach is seen as taking a harder line on breaking encryption tech, although policymakers appear to have moved away from language calling for mandating a "back door" to break encrypted apps and communications.

The McCaul-Warner commission approach, meanwhile, is not intended to delay, deflect or bury the planned Burr-Feinstein bill, as some critics have claimed, aides working on the commission legislation contended. Whatever work the commission eventually recommends is expected to have an impact for decades to come, so a deliberate approach is needed, they added.

Both McCaul and Warner and their aides have repeatedly said there's "no silver bullet" legislative approach for solving the encryption dilemma. The lawmakers have pointed out that any U.S. law would only apply to U.S. companies, while many encryption apps and technologies are designed by companies outside the U.S. For example, some terrorists in the Paris attacks used Telegram, a messaging app with end-to-end encryption that was built by a Belgian-based company.

In addition, tech companies have argued that third-party access to decryption keys or other means of breaking encryption could only create a hole for criminals and terrorists to sneak through.

The debate over encryption policy in Washington was addressed by two other top officials speaking before think tanks in recent days.

On Thursday, Senate Homeland Security Chairman Ron Johnson (R-Wis.), said that legislating encryption standards might "do more harm than good" in the fight against terrorism, according to The Hill website.

"Is it really going to solve any problems if we force our companies to do something here in the U.S.?" he asked at a presentation at the American Enterprise Institute, a conservative think tank. "It's just going to move offshore."

Johnson also said that encryption helps protect personal information, a position strongly backed by Apple CEO Tim Cook and other tech companies. Apple has been among the most vocal in defending its privacy policies with end-to-end encryption.

On Jan. 21, National Security Agency Director Adm. Michael Rogers told an audience that "encryption is foundational to the future." In remarks at the Atlantic Council, an international affairs think tank, Rogers said that spending time arguing that encryption is bad and should be done away with is a "waste of time." Rogers' comments are recorded in video at The Intercept.

Professor Darren Hayes, director of cybersecurity at Pace University, said he supports the idea of a congressional commission to review encryption laws and policies.

"The whole idea of government access to communications is nothing new," Hayes said in an interview. "Every telecom company has to set up their infrastructure so that law enforcement can set up a wiretap" subject to a court order.

He also said that some type of legal step may be needed to gain greater access. "The vast majority of companies will never hand over data without any kind of warrant or subpoena. The idea that companies will help out law enforcement is not true at all."

Hayes has served as a forensics encryption specialist in more than two dozen criminal cases in the New York area since 2008 to help prosecutors bring cases against people accused of being pedophiles and other crimes who have resorted to hiding criminal activity with encrypted data.

Hayes is well aware that any U.S. law on encryption wouldn't apply to other countries, but said a broad-based discussion "is a good discussion to have The list is growing of potential prosecutions held up by [not having] a full disclosure of encrypted data." In any event, he added, "I'm a big proponent that you have to have a warrant to gain access."

Two representatives for tech companies based in Silicon Valley said recently in interviews that they were open to the idea of creating a congressional commission, but would want to review the final legislation before signing on.

Conversely, Kevin Bocek, vice president of cybersecurity for Venafi, called the idea of creating an encryption commission "very concerning." Venafi works with 250 large banks and retailers in setting up encryption and authorization software to protect their data.

In an interview, Bocek said he is worried that creating the commission could turn into an entity that is powerful and ominous. "I don't understand how an encryption commission is going to deal with encryption already being widely used," he said. "It's counterproductive and more productive to talk about how to live in a world with encryption and how to safeguard national security."

Bocek said there was a broad national discussion about cryptography policy that was fought in the 1990s. "The crypto wars of the 1990s won freedom and there's no sense in moving backwards," he said. "Encryption controls were very painful years ago and here we are again, facing the same problem which can harm American business. Encryption, keys and certificates must be free Blanket legislation will do nothing but cause more problems."

In 1996, the National Academy of Sciences published a 688-page document entitled Crytography's Role in Securing the Information Society. In the executive summary, the authors wrote a preamble that seems to summarize the ongoing encryption debate in 2016: "U.S. policy should be changed to promote and encourage the widespread use of cryptography for the protection of the information interests of individuals, businesses, government agencies and the nation as a whole, while respecting legitimate national needs of law enforcement and intelligence for national security and foreign policy purposes to the extent consistent with good information protection."

Go here to see the original:
Encryption bills pose challenges for Congress | Computerworld

Julian Assange is in arbitrary detention, UN panel finds …

Julian Assange argued he was illegally confined to the embassy because he risked arrest if he left. Photograph: Pool/Reuters

A United Nations panel has decided that Julian Assanges three-and-a-half years in the Ecuadorian embassy amount to arbitrary detention, the Guardian understands, leading his lawyers to call for the Swedish extradition request to be dropped immediately.

The WikiLeaks founder sought asylum from Ecuador in June 2012 to avoid extradition to Sweden to face questioning over rape and sexual assault allegations, which he denies.

The panels findings were disclosed to the Swedish and British governments on 22 January, and will be published on Friday morning. Their judgment is not legally binding but can be used to apply pressure on states in human rights cases.

Related: Julian Assange's embassy showdown: what it means and what happens next

Assanges Swedish lawyer, Per Samuelson, said if the working group found in his favour, there is only one solution for Marianne Ny [the Swedish prosecutor seeking Assanges extradition], and that is to immediately release him and drop the case. Samuelson added: If he is regarded as detained, that means he has served his time, so I see no other option for Sweden but to close the case.

Assanges lawyers also demanded assurances from the UK that he would not be arrested and subjected to potential extradition to face potential prosecution over WikiLeaks publishing activities.

The British Foreign Office said it would not pre-empt the panels findings, but said in a statement: We have been consistently clear that Mr Assange has never been arbitrarily detained by the UK but is, in fact, voluntarily avoiding lawful arrest by choosing to remain in the Ecuadorian embassy.

An allegation of rape is still outstanding and a European arrest warrant in place, so the UK continues to have a legal obligation to extradite Mr Assange to Sweden.

Anna Ekberg, a spokesperson for the Swedish foreign ministry, said it would not comment before the formal publication on Friday. The Swedish prosecutor is currently on holiday and unavailable for comment, a spokesman said.

In a statement issued by WikiLeaks on Twitter, Assange said he would voluntarily walk out of the embassy on Friday and accept arrest as there is no meaningful prospect of further appeal.

However, should I prevail and the state parties be found to have acted unlawfully, I expect the immediate return of my passport and the termination of further attempts to arrest me.

Neither Sweden nor the UK will be compelled to take any action, but a source familiar with the working group said that if the governments choose to ignore the decision, it could make it difficult for them in future to bring pressure on other countries over human rights violations.

Assange had appealed to the UN panel claiming that his stay in the embassy was arbitrary because he had been unable to exercise his right to asylum, arguing: The only way for Mr Assange to enjoy is right to asylum is to be in detention. This is not a legally acceptable choice.

He also argued that UK law had been changed since 2012, which meant if arrested today he would no longer be liable to extradition under the European Arrest Warrant.

Melinda Taylor, an Assange legal spokeswoman, said the Australian had not yet been formally informed by the panel of its findings, but if it finds that the standard for arbitrary detention is met, we would expect his release and compensation.

In addition to Sweden dropping the extradition request, she called for the UK to return Assanges passport and give him assurances that he would not be subject to arrest for a potential further extradition request by the US.

Assange and WikiLeaks have been the subject of a secret grand jury investigation in Virginia that has been looking into whether to prosecute them over the US cable disclosures, and the Australian fears that he could become immediately subject to a second extradition process even if Sweden drops its inquiry.

If one of the orders is that he should be released and his liberty should be assured, we would obviously look to the UK to make sure that it is effective and not illusory, that its not just liberty for five seconds, but liberty that is meaningful, Taylor said.

British police ended the costly 24-hour guard of the Knightsbridge embassy last October, but the building remains under covert surveillance. A Metropolitan police spokesman said on Thursday: The operation to arrest Julian Assange does continue and should he leave the embassy the MPS will make every effort to arrest him.

Sweden and Ecuador have been locked in lengthy negotiations over arrangements to allow Swedish prosecutors to interview Assange in the embassy. Ecuadors foreign minister said last month that the country would allow access for questioning, but Sweden later said its request had been rejected on formal grounds. It is considering whether to submit a fresh request.

Samuelson said his client still hoped to clear his name. This does not mean that the question of interrogation will be over. We still want an interrogation to take place so that Mr Assange can clear his name and show everyone that he is innocent.

The difference is that he will no longer be in custody in absentia and thus be able to use his asylum outside of the embassy. If Assange is regarded as detained he has already served the time so to speak so Marianne Ny should drop the case altogether.

Last August Sweden dropped part of its investigation into Assange after the statute of limitations on allegations of sexual assault expired. It is still seeking to interview him on one outstanding allegation of rape. The accusations were made by two women in Sweden in 2010, but no charges have been brought.

Related: Timeline: Julian Assange and Sweden's prosecutors

Read more:
Julian Assange is in arbitrary detention, UN panel finds ...

WikiLeaks Wikipedia ting Vit

Wikileaks (c pht m l /wkiliks/, cu to t ting Anh: wiki v leak - s r r) l mt t chc phi li nhun quc t[4] chuyn ng ti cc ni dung c gi n v danh v cc thng tin r r ca cc loi ti liu cha cng b khc nhng vn gi gn tnh nc danh ca ngun tin. Website ca t chc ra mt vo nm 2006, do The Sunshine Press iu hnh.[5] T chc ny t m t l c thnh lp bi nhng ngi Trung Quc bt ng quan im, cng nh cc nh bo, nh ton hc, v nhng nh cng ngh ca cc cng ty mi thnh lp t Hoa K, i Loan, chu u, chu v Nam Phi. Bo ch v tp ch The New Yorker vo thng 7 nm 2010 ni rng Julian Assange, mt nh bo ngi c v l mt nh hot ng Internet, l ngi iu hnh t chc.[6] Ch trong vng mt nm sau khi ra mt, website tuyn b c s d liu ca h c hn 1,2 triu ti liu.[7]

Cc trang web WikiLeaks u tin xut hin trn Internet vo thng 12 nm 2006. Ngi sng lp WikiLeaks l Julian Assange, mt nh bo ngi c. Theo li ca Julian Assange trong bi tr li phng vn trn trang Medien-Okonomie-Blog: "khng th bit chnh xc cc thnh vin ban qun tr trang wikileaks. Ch bit rng, mt s trong l nhng ngi t nn t Trung Quc (nhng ngi vn duy tr quan h vi gia nh h ti qu nh), nh bo, nh ton hc, chuyn gia k thut t M, i Loan, chu u, c v Nam Phi. Lc lng tnh nguyn vin nng ct ca WikiLeaks ch c 40 ngi. "

T The New Yorker (Hoa K) a ra nhn xt: "WikiLeaks khng hn l mt t chc, m nn c gi l s ni lon truyn thng. WikiLeaks khng c i ng nhn vin lm vic c tr lng, khng c vn phng. Ngi sng lp Assange thm ch khng c nh. ng i t nc ny sang nc khc, nh s gip ca nhng ngi ng h, hoc bn ca bn. C th ni, WikiLeaks tn ti bt k ni no Assange lm vic. " [8]

T khi ra i trang website t nm 2006, WikiLeaks cng b nhiu loi ti liu mt ca nhiu nc trn th gii. Ring nm 2010, trang web WikiLeaks cng b gn 500.000 ti liu mt ca Hoa K v chin tranh ti Afghanistan v Iraq, cng vi 250.000 th tn ngoi giao ca Hoa K,...[8]

Vo ngy 5 thng 4 nm 2010, mt on video c ng ti trn website c tn gi V git ngi ngoi d kin (Collateral Murder) c cung cp bi mt binh nht tn Bradley Manning (22 tui).

on video c quay, vo nm 2007, trn mt trc thng Apache, miu t li cnh git ngi ba bi hn mt chc ngi ngoi New Baghdad trong c 2 nhn vin ca hng tin Reuters.

on video a Wikileaks tr thnh cng thng tin chnh cho cc bo co ti liu v video nc danh v chnh xc t cc chin trng xa xi.[9][10] Vo thng 7 nm 2010, Wikileaks cng b Nht k Chin tranh Afghanistan, mt b hn 90.000 ti liu v cuc chin ti Afghanistan trc y cha tng c bit n.[11][12]

Ngy 25/7/2010, WikiLeaks theo nh thng bo t trc chnh thc cng b hn 92.000 bo co mt v cuc chin Afghanistan c vit t thng 1-2004 n thng 12-2009, bt chp sc p t chnh ph M. Wikileaks chia s s ti liu mt ny cho ba t bo ln l New York Times (M), Guardian (Anh) v tp ch Der Spiegel (c) vi iu kin ba t bo ny cng ng ti vo ngy 25-7. Cui thng 8 nm , WikiLeaks tip tc tung ra s cn li gm 15000 ti liu lin quan n cuc chin Afghanistan. Cc ti liu cho thy c v s ln lin qun M - NATO x sng v ti v vo cc thng dn Afghanistan v tng h l nhng k nh bom liu cht ca Taliban. Qun i M thnh lp mt nhm st th mang tn "St Th 773" c nhim v bt gi hoc m st cc nh lnh o Taliban v Al-Qaeda - vi s lng mc tiu ln n khong 2000 ngi. Lc lng Taliban s dng cc v kh nh tn la tm nhit t i khng, sng phng lu tn cng lc lng khng qun ca M - NATO, m s v kh c cho l ly t s cc v kh m CIA chuyn giao cho Afghanistan chng Lin X vo nhng nm 1980. [13]

Ngy 22/10/2010 mt lot 391.831 ti liu v cuc chin Iraq v c th gii m t l "qu bom s tht". Mc d chnh quyn M thng bo rng h khng th c tnh c s dn thng thit mng nhng theo ti liu c cng b th 285.000 nn nhn trong t nht 109.000 ngi thit mng t thng 3-2003 n cui nm 2009 - l hu qu ca "nhng cuc tm mu" (Julian Assange). [14]

Ngy 28/11/2010, 251.287 ti liu mt ca B Ngoi giao M c tit l trn wikileaks v cn c gi n 5 trang bo ni ting nht ca M, c, Php, Anh v Ty Ban Nha. y c coi l mt v " tn cng 11/9 " vo nn ngoi giao M. V d kin n s cn nh hng lu di n quan h ngoi giao ca M v cc nc khc.

Danh sch 5 t bo c WikiLeaks cung cp ti liu:[15]

Ngy 8/4/2013, WikiLeaks tung kho lu tr tm kim, cha 1,7 triu ti liu ca B Ngoi giao M t nm 1973-1976, trong c nhiu ti liu ca cu ngoi trng Henry Kissinger.[16]

Ngy 06/12/2010, WikiLeaks tip tc cng b danh sch cc c s h tng v ngun lc quan trng trn th gii m "nu mt mt c th tc ng nghim trng n sc khe ngi dn, an ninh kinh t v an ninh quc gia M". Danh sch bao gm cc tuyn cp ngm di y bin, cc h thng vin thng, hi cng, ng ng du kh, cc cng ty kinh doanh... nhiu quc gia trn khp th gii. iu ng ni y l danh sch ny c ngoi trng M yu cu cc nh ngoi giao ca mnh thu thp. [17]

Vo ngy 1 thng 12 nm 2010, Amazon.com di sc p ca chnh quyn Hoa K quyt nh khng cho Wikileaks thu my ch na. Hin WikiLeaks ch cn duy tr trn my ch ca Bahnhof ti Thy in.[18] Theo CNN, trung tm d liu ca Bahnhof t trong mt ngn ni gn Stockholm. Cc my ch c t di su 30 mt, trong mt cn hm ngm chng bom ht nhn c xy dng t thi Chin tranh lnh. Ch c mt li duy nht dn vo khu cha my ch v cnh ca c lm bng kim loi dy ti na mt.[19]

Wau Holland Foundation l t chc phi li nhun c tr s ti Berlin qun l hu ht ngun qu ca WikiLeaks. Nm 2009, Wau Holland Foundation nhn c hn mt triu USD tin ng gp cho Wikileaks t cc t chc v c nhn.[19]

Read the original:
WikiLeaks Wikipedia ting Vit

What Is Encryption? | Surveillance Self-Defense

Encryption is the mathematical science of codes, ciphers, and secret messages. Throughout history, people have used encryption to send messages to each other that (hopefully) couldn't be read by anyone besides the intended recipient.

Today, we have computers that are capable of performing encryption for us. Digital encryption technology has expanded beyond simple secret messages; today, encryption can be used for more elaborate purposes, for example to verify the author of messages or to browse the Web anonymously with Tor.

Under some circumstances, encryption can be fairly automatic and simple. But there are ways encryption can go wrong, and the more you understand it, the safer you will be against such situations.

One of the most important concepts to understand in encryption is a key. Common types of encryption include a private key, which is kept secret on your computer and lets you read messages that are intended only for you. A private key also lets you place unforgeable digital signatures on messages you send to other people. A public key is a file that you can give to others or publish that allows people to communicate with you in secret, and check signatures from you. Private and public keys come in matched pairs, like the halves of a rock that has been split into two perfectly matching pieces, but they are not the same.

Another extremely valuable concept to understand is a security certificate. The Web browser on your computer can make encrypted connections to sites using HTTPS. When they do that, they examine certificates to check the public keys of domain names(like http://www.google.com, http://www.amazon.com, or ssd.eff.org). Certificates are one way of trying to determine if you know the right public key for a person or website, so that you can communicate securely with them.

From time to time, you will see certificate-related error messages on the Web. Most commonly, this is because a hotel or cafe network is trying to break your secret communications with the website. It is also common to see an error because of a bureaucratic mistake in the system of certificates. But occasionally, it is because a hacker, thief, police agency, or spy agency is breaking the encrypted connection.

Unfortunately, it is extremely difficult to tell the difference between these cases. This means you should never click past a certificate warning if it relates to a site where you have an account, or are reading any sensitive information.

The word "fingerprint" means lots of different things in the field of computer security. One use of the term is a "key fingerprint," a string of characters like "342e 2309 bd20 0912 ff10 6c63 2192 1928" that should allow you to uniquely and securely check that someone on the Internet is using the right private key. If you check that someone's key fingerprint is correct, that gives you a higher degree of certainty that it's really them. But it's not perfect, because if the keys are copied or stolen someone else would be able to use the same fingerprint.

Read more:
What Is Encryption? | Surveillance Self-Defense

Julian Assange says he’ll ‘accept arrest’ if U.N. panel …

But even though he may leave with the support of a United Nations working group, he is still likely to be arrested in Britain on sex crime charges for alleged crimes in Sweden that date back several years.

The U.N. working group is believed to have decided Assange is being unlawfully detained, according to the Press Association, a British news organization. The decision is scheduled to be published Friday.

Assange had said he would surrender to British police for arrest Friday if the U.N. group ruled he had not been unlawfully detained.

However, any judgment by the U.N. Working Group on Arbitrary Detention would be only a "moral recommendation" and would not be legally binding. And British police are still expected to arrest Assange if he leaves the Ecuadorian Embassy, where he has been holed up since June 2012.

CNN has not confirmed the decision by the U.N. working group. When asked Thursday, a U.N. spokesperson said: "Tomorrow morning we will release the official opinion of the working group and we cannot comment until the decision is made public tomorrow. Whatever is seen in reports today is not official."

Assange said he submitted a complaint to the U.N. Working Group on Arbitrary Detention about his case in 2014. Justice For Assange, a site set up to fight for his release, said the panel is expected to rule this week on whether Assange's detention arbitrarily deprived him of his liberty -- in other words, whether it is illegal.

"Should the UN announce tomorrow that I have lost my case against the United Kingdom and Sweden I shall exit the embassy at noon on Friday to accept arrest by British police," Assange said in a statement posted by WikiLeaks.

But, Assange added that if the panel ruled in his favor, "I expect the immediate return of my passport and the termination of further attempts to arrest me."

London police ended their 24-hour guard of the embassy in October, saying it was no longer "proportionate." But a London Metropolitan Police representative told CNN that the department's position on Assange has not changed, and he would be arrested if he left the embassy, with police considering the use of "covert tactics."

Assange, an Australian, has not been charged and has denied the rape claim. He says it is retaliation for WikiLeaks having released thousands of pages of government secrets.

He has said he fears Sweden would extradite him to the United States, where he could face the death penalty if he is charged and convicted of publishing those documents.

The Swedes, who want to question him for sex crime allegations unrelated to WikiLeaks, issued an arrest warrant in 2010. Assange was in London at the time.

As he fought to have the warrant dismissed, Ecuador granted him political asylum, and he's been living in its London embassy ever since.

In his appeal to the U.N. Working Group on Arbitrary Detention, Assange said his confinement has deprived him of access to fresh air, sunlight and adequate medical care. He says he is subject to round-the-clock surveillance and remains in a constant state of insecurity.

"This is an application framed by political events," he wrote. "(I)t could be distilled to the simple and irrefutable fact that a political refugee, who has never been charged, has been deprived of their liberty for nearly four years, and confined in a very small space for over two years."

In other instances of detention, the U.N. working group called for the release of Aung San Suu Kyi in Myanmar after years of house arrest. The group has also ruled for the release of former Egyptian President Mohamed Morsy, but he remains in prison.

Don Melvin is a newsdesk editor for CNN in London

CNN's Pierre Meilhan contributed to this report.

Link:
Julian Assange says he'll 'accept arrest' if U.N. panel ...

Encryption – technet.microsoft.com

Traditionally, ciphers have used information contained in secret decoding keys to code and decode messages. The process of coding plaintext to create ciphertext is called encryption and the process of decoding ciphertext to produce the plaintext is called decryption. Modern systems of electronic cryptography use digital keys (bit strings) and mathematical algorithms ( encryption algorithms ) to encrypt and decrypt information.

There are two types of encryption: symmetric key encryption and public (asymmetric) key encryption. Symmetric key and public key encryption are used, often in conjunction, to provide a variety of security functions for network and information security.

Encryption algorithms that use the same key for encrypting and for decrypting information are called symmetric-key algorithms. The symmetric key is also called a secret key because it is kept as a shared secret between the sender and receiver of information. Otherwise, the confidentiality of the encrypted information is compromised. Figure14.1 shows basic symmetric key encryption and decryption.

Figure14.1 Encryption and Decryption with a Symmetric Key

Symmetric key encryption is much faster than public key encryption, often by 100 to 1,000 times. Because public key encryption places a much heavier computational load on computer processors than symmetric key encryption, symmetric key technology is generally used to provide secrecy for the bulk encryption and decryption of information.

Symmetric keys are commonly used by security protocols as session keys for confidential online communications. For example, the Transport Layer Security (TLS) and Internet Protocol security (IPSec) protocols use symmetric session keys with standard encryption algorithms to encrypt and decrypt confidential communications between parties. Different session keys are used for each confidential communication session and session keys are sometimes renewed at specified intervals.

Symmetric keys also are commonly used by technologies that provide bulk encryption of persistent data, such as e-mail messages and document files. For example, Secure/Multipurpose Internet Mail Extensions (S/MIME) uses symmetric keys to encrypt messages for confidential mail, and Encrypting File System (EFS) uses symmetric keys to encrypt files for confidentiality.

Cryptography-based security technologies use a variety of symmetric key encryption algorithms to provide confidentiality. For more information about the specific encryption algorithms that are used by security technologies, see the applicable documentation for each technology. For more information about how the various symmetric key algorithms differ, see the cryptography literature that is referenced under "Additional Resources" at the end of this chapter.

Encryption algorithms that use different keys for encrypting and decrypting information are most often called public-key algorithms but are sometimes also called asymmetric key algorithms . Public key encryption requires the use of both a private key (a key that is known only to its owner) and a public key (a key that is available to and known to other entities on the network). A user's public key, for example, can be published in the directory so that it is accessible to other people in the organization. The two keys are different but complementary in function. Information that is encrypted with the public key can be decrypted only with the corresponding private key of the set. Figure14.2 shows basic encryption and decryption with asymmetric keys.

Figure14.2 Encryption and Decryption with Asymmetric Keys

The RSA digital signature process also uses private keys to encrypt information to form digital signatures. For RSA digital signatures, only the public key can decrypt information encrypted by the corresponding private key of the set.

Today, public key encryption plays an increasingly important role in providing strong, scalable security on intranets and the Internet. Public key encryption is commonly used to perform the following functions:

Encrypt symmetric secret keys to protect the symmetric keys during exchange over the network or while being used, stored, or cached by operating systems.

Create digital signatures to provide authentication and nonrepudiation for online entities.

Create digital signatures to provide data integrity for electronic files and documents.

See more here:
Encryption - technet.microsoft.com

Julian Assange: WikiLeaks founder ‘arbitrarily … – cnn.com

But does this decision mean Assange will become a free man? Or that anything about his status has changed?

Not if you ask Sweden and the United Kingdom. And Assange doesn't appear ready to test them, remaining at the Ecuadorian Embassy in London, where he first sought refuge in 2012.

Assange is wanted in Sweden on rape allegations, and the UK arrested him in 2010. He has said he's afraid that if he leaves the embassy, he could end up being extradited and facing the death penalty in the United States over allegations of revealing government secrets through his site, WikiLeaks.

Speaking to reporters Friday via video, Assange called the decision "legally binding."

He warned that failure to act on the ruling would undermine "the U.N. system, and there are consequences of doing that." He said Sweden and the UK would not be "treated seriously as international players" and possibly could be taken off key committees or even face sanctions.

"That's, of course, a matter for the U.N. to decide about how it's going to enforce its decision," Assange said, "and a matter for Sweden and the UK to think do they really want to go down that path."

The U.N. Working Group on Arbitrary Detention concedes it is up to member states to act on its decisions, explaining it can only investigate and "recommend remedies such as release from detention and compensation."

And Britain's top diplomat indicated Friday that nothing has changed for the Australian national.

"Assange is a fugitive from justice, voluntarily hiding in the Ecuadorian Embassy," UK Foreign Minister Philip Hammond tweeted. "I reject the report from #UNWGAD."

Attorney Melinda Taylor, who led Assange's case before the U.N. panel, called the ruling "a damning indictment of the manner in which this case has been handled (and) affirms that Mr. Assange is a victim of a significant miscarriage of justice."

"Now finally with today's decision," Taylor said, "there's light at the end of the tunnel."

Yet regardless of what the U.N. panel said, the WikiLeaks founder remains in legal trouble.

WikiLeaks rose to fame posting confidential items such as the U.S. military manual on handling prisoners at Guantanamo Bay, documents from the Church of Scientology, emails from Sarah Palin and pager messages in New York from 9/11. But the website really gained attention in 2010, publishing hundreds of thousands of pages of classified documents related to U.S. wars in Afghanistan and Iraq.

Also in 2010, Sweden revealed Assange was wanted there over a sex crime allegation. Stockholm police questioned him that August and told him about the charges, which he dismissed as part of a smear campaign. Four months later, he turned himself into police in London.

According to Assange, he hasn't been free since.

He was released, with celebrity supporters helping pay his bail and giving him a mansion to live in under house arrest. Still, Sweden fought to have him extradited from the UK.

On June 19, 2012, Assange fled to the Ecuadorian Embassy to escape both British and Swedish authorities.

Ecuador granted him political asylum and, as with other diplomatic missions around the world, its embassy is considered sovereign territory. Assange couldn't be arrested as long as he stayed inside the embassy.

But British authorities were waiting for him outside.

The UK Foreign and Commonwealth Office said Friday that Assange is still subject to a European Arrest Warrant "so the UK continues to have a legal obligation to extradite him to Sweden."

Sweden still wants him back. It also rejected the U.N. panel's judgment, asserting that Assange wasn't forced to go to the Ecuadorian Embassy -- he went there "voluntarily ... and Swedish authorities have no control over his decision to stay there."

"Mr. Assange is free to leave the embassy at any point," the Swedish government said. "Thus, he is not being deprived of his liberty there due to any decision or action taken by the Swedish authorities."

Yet facing justice in Sweden is just one of Assange's concerns. A bigger one may be whether Sweden might extradite him to the United States, where he could theoretically be sentenced to the death penalty if he is charged and convicted of publishing government secrets.

On Friday, Assange's legal team reiterated its fear he'll be moved to the United States. It cast him as a champion of transparency and democracy as well as an unfair, shameful target of Western governments.

"For years, Julian and WikiLeaks fought to expose abuses committed by governments and violations of rights and victims everywhere," said Taylor, Assange's attorney.

"It is now completely unfair that Julian himself has become a victim due to his whistleblowing activities and as a result has suffered uncharged indefinite detention for over five years."

Ecuador's foreign minister, Ricardo Patino, called Assange on Friday to congratulate him on the U.N. judgment and slammed his British counterparts. He told CNN en Espaol that UK authorities should now let Assange travel on to Ecuador.

Patino also expressed concerns about the Australian's health issues, which his attorneys say have been exacerbated by the inability to get outside medical care.

"We are not even sure what's the problem because he needs tests to be done," Patino said. "The UK refuses to allow him to go to a hospital."

Addressing supporters later Friday from the embassy's balcony, Assange reveled in what he called a "sweet ... victory that cannot be denied." But his triumph may be of limited value since he still remains in the embassy.

"It doesn't come as a shock to see the type of injustice that you've been in the business of exposing be inflicted on yourself. That's part of my work," he said. "I am tough and hardened by this process. And I can take it.

"However, what right does this government, or the U.S. government or the Swedish government have to deny my children their father for 5 years?"

CNN's Don Melvin, Josh Berlinger, Jack Maddox, Salma Abdelaziz and Pierre Meilhan contributed to this report.

Continued here:
Julian Assange: WikiLeaks founder 'arbitrarily ... - cnn.com

Listen: Chelsea Manning speaks to Amnesty International’s …

Chelsea Manning appears in the current episode of Amnesty International's "In Their Own Words" podcast, voiced by actor Michelle Hendley.

Chelsea tells us, "The awesome thing about this podcast is that Michelle Hendley speaks in my own voice, telling my story and memories in my own words and in my own style. It's the closest thing to actually interviewing me as we could possibly get, given the rules of the prison. I was able to listen to it on the phone by having it played from laptop speakers into a friend's cell phone, and I think she sounds like me."

At Amnesty, were calling on US authorities to free Chelsea immediately.

She is spending decades in prison because she shared information that she thought could shed a light on potential abuses and prompt meaningful public debate on the conflict. Prevented from using this in her defence at her tribunal and overcharged as a warning to others, Chelsea has been punished over the odds for actions.

Meanwhile, the US government has not investigated the abuses she exposed while Chelsea has paid a high price for putting that information in the public realm.

Chelsea Manning, in her own words [Amnesty International]

Another amazing Shmoocon talk is Users Are People Too: How to Make Your Tools Not Suck for Humans, presented by two key people from Simply Secure, a nonprofit devoted to improving security tool usability (I am a volunteer advisor to Simply Secure).

Laura Poitras is the Macarthur-winning, Oscar-winning documentarian who made Citizenfour. Her life has been dogged by government surveillance and harassment, and she has had to become a paranoid OPSEC ninja just to survive.

Real engineers build things. Super cool engineers build things with their hands and fingers, like our engineering forefathers did. No idea where to even begin to do that? This step by step Arduino course is now 92% off and is going to get you up and running, from zero to hero, in no time. So []

How do Google and YouTube really work? It turns out, Python kind of runs things around those parts. And with this bootcamp, youll get whipped into shape and ready to start programming yourself. Whether youre a Python pro and just want to sharpen your skills, or a total tech newbie with little or no coding []

Take a deep breath. Now exhale. Wouldnt that whole breathing thing be a lot better with an amazing vape in your hands? How about a vape thats specifically engineered and designed for dry leaf and crazy easy to both use and clean? You can save 28% right now when you nab this new FEZ Vaporizer []

See the rest here:
Listen: Chelsea Manning speaks to Amnesty International's ...