Edward Snowden: Privacy can’t depend on corporations standing …

Edward Snowden addresses LibrePlanet via video conference

Your message has been sent.

There was an error emailing this page.

By Jon Gold

Network World | Mar 19, 2016 2:07 PM PT

NSA whistleblower Edward Snowden opened the Free Software Foundation's LibrePlanet 2016 conference on Saturday with a discussion of free software, privacy and security, speaking via video conference from Russia.

Snowden credited free software for his ability to help disclose the U.S. government's far-reaching surveillance projects drawing one of several enthusiastic rounds of applause from the crowd in an MIT lecture hall.

+ ALSO ON NETWORK WORLD: Pwn2Own contest highlights renewed hacker focus on kernel issues + Apple engineers could walk away from FBIs iPhone demands

"What happened in 2013 couldn't have happened without free software," he said, particularly citing projects like Tor, Tails (a highly secure Linux distribution) and Debian.

Snowden argued that free software's transparency and openness are cornerstones to preserving user privacy in the connected age. It isn't that all commercial products are bad, nor that all corporations are evil he singled out Apple's ongoing spat with the FBI as an example of a corporation trying to stand up for its users merely that citizens should not have to rely on them to uphold the right to privacy.

"I didn't use Microsoft machines when I was in my operational phase, because I couldn't trust them," Snowden stated. "Not because I knew that there was a particular back door or anything like that, but because I couldn't be sure."

Private data, these days, only stays private at the sufferance of the major tech companies that administer devices and services, he argued. Given the increasing centrality of smartphones and social networks and the myriad of other digital communication methods to modern life, simply trusting that those tech companies will protect their users' privacy is insufficient.

Relying on corporations to protect private data is bad enough in a vacuum but Snowden pointed out that many tech giants have already proven more than willing to hand over user data to a government they rely on for licensing and a favorable regulatory climate.

He particularly singled out service providers as being complicit in overreaching government surveillance.

"We can't control telecom partners," Snowden stated. "We're very vulnerable to them."

However, protecting privacy is gaining mindshare, he added. Increasingly, a digital

Sponsored Links

See the original post here:
Edward Snowden: Privacy can't depend on corporations standing ...

Sanders’ Snowden Response Proves He Doesn’t Want a "Revolution"

Last night at the Democratic presidential debate, leftist favorite Bernie Sanders clarified his feelings about National Security Agency whistleblower Edward Snowden.

"I think Snowden played a very important role in educating the American public ... he did break the law, and I think there should be a penalty to that," Sanders said. He went on to say that the role Snowden played in educating the public about violations of their civil liberties should be considered before he is sentenced, and that as president he would "absolutely" end the NSA spying programs in question.

To read between the lines: Bernie thinks Edward Snowden did the right thing, but hey, laws are laws. If elected, though, it sounds like he'll make sure Snowden gets a really nice jail cell.

Bernie was quick to point out that what Snowden did was illegal, and that he should face the consequences for it. Instead of calling for stronger legal protections for whistleblowers, or offering to pardon Snowden if elected, he called for the former NSA contractor to come home and face trial in a country with a dodgy record of imprisoning and prosecuting whistleblowers, dissidents, activists and journalists.

But notably absent from his law abiding approach was a call for criminal charges against NSA officials or his colleagues in Congress who repeatedly authorized the illegal mass surveillance programs he claims he would end as president. Programs that we would still know nothing about without Edward Snowden's "illegal" actions, which Bernie thinks he should face jail time for.

Where is Bernie's call for criminal sanctions against the web companies that betrayed their users' trust, violated their own privacy policies, and enabled the most sweeping violation of the Fourth Amendment in history?

Where is his apology to the rest of the world for the United States' decades of human rights abuses, economic espionage, and illegal torture programs?

I've learned over the years to no longer be shocked by politicians' ability to speak out of both sides of their mouths, but I can't help feeling that this quote from Sanders underscores a huge flaw in his thinking and the thinking of his supporters.

Sanders has based his campaign on the premise that the United States' political and economic systems are so flawed that we need a "revolution," but when a thorny question like Snowden comes up it becomes clear that what he's really calling for is a changing of the guard.

Civil disobedience, the idea that we have a moral responsibility to disobey unjust laws, should not be a foreign concept to a longtime activist like Sanders. As of right now, there is no Federal law that protects me from being fired from my job or denied housing as a transgender person. Not terribly long ago child labor was perfectly legal while women were denied the right to vote.

As those who #FeelTheBern were quick to point out (and then point out again, and again, and again) after Sanders was brilliantly trolled by Black Lives Matter protesters, Bernie marched with Dr. Martin Luther King Jr in 1963. He was even arrested for protesting school segregation.

So when did Bernie become such a stickler for law and order over justice and freedom? Probably when he decided he wanted to be president of the "Free World."

As someone who cares deeply about economic injustice and many of the other things that Sanders has made cornerstones of his campaign, I want to like him. I want to feel the same hope and inspiration that his starry-eyed supporters are spreading across social media.

But when I look at the major political progress we've made in recent years, it hasn't come from elected officials, no matter how well spoken. It's come primarily from brave, dedicated, people and movements, many of whom broke the law to achieve their goals. Wikileaks, protesters in Ferguson, the Arab Spring, and yes, whistleblowers like Chelsea Manning and Edward Snowden.

I agree with Bernie Sanders that mass surveillance programs are dangerous. But what's more dangerous is the type of thinking behind them. Thinking that says that laws, rules, and following authority matter more than what's right and wrong. It's an ideology that breeds conformity and strangles democracy.

Until Bernie's revolution recognizes and embraces the real struggle we have between us and a free and just society, and honors those who have taken risks to bring us closer to that day, I think I'll be writing in Edward Snowden on election day.

Also on HuffPost:

View post:
Sanders' Snowden Response Proves He Doesn't Want a "Revolution"

Badbitcoin.org – Helping you stay Safe in the World of …

Bitpyramid.ml "Don't trust us?" Er, no we don't actually. All ponzi's are scams. 3/19/16

Organica.fund They do like a different theme for these hyips, here's another one. 3/19/16

Bitcoinx10.yolasite.com Dirty deeds done cheap. Freehosted fraud. 3/19/16

Bitcloner.com A doubler fraud using this domain was inevitable. 3/19/16

Ultimabitcoin.com A very worn out style of hyip scam. 3/16/16

Instantgenuinepaying.com Instantgenuineloseyour.bitcoin 3/16/16

Double-btc.info What have we told you about btc multipliers? They are ALL scams and there are NO exceptions. 3/15/16

Envestrade.com Another hyip/fraud to add. 3/15/16

Bitmines.info Just another ponzi fraud. 3/15/16

Ads by Google

Topmine.io Yet another fake mining scheme. There are no special algorythms, just a ponzi. 3/15/16

Btcshares.org If you want btc shares, buy some btc, then you have a share. Simple. 3/15/16

Free-shares.com These may be the most expensive free shares you've ever (never) received. 3/15/16

Hyip.com But seriously, hyips are scams - pure and simple frauds, so this site takes the biscuit. 3/15/16

Mybtc.bid I'm starting to get double vision - probably the safest way to double my wealth. 3/12/16

Nelektronicy.pl Yet another attempt at a scam doubler. 3/12/16

Nexus-investments.com If these serial thieves had any sense, they'd stay away from bitcoin, then we wouldn't bother them. 3/10/16

Btcsinon.com Don't let this hyip/fraud fool you. Just lies and more lies. 3/10/16

Earntory.com What an odd site title, and that is the best part. 3/8/16

Investmega.com This scam looks like it was put together by an idiot, but we'd better list it in case a bigger idiot sees it. 3/7/16

X10multiplier.com Only in your dreams does bitcoin double. 3/7/16

Bitboom.info Boom, and your bits are gone. If Cillit did bitcoin scams.... 3/7/16

Btc-e.black The old worn out 'flaw in the blockchain' better known as the Bitatt scam. 3/7/16

Fxacc.com A hyip/scam from the usual offenders. 3/6/16

Rixosfinance.com Just another faker after your dosh. 3/6/16

Bitcoinside.com Don't risk it. You don't need to, there are plenty of legit exchanges 3/6/16

Bitcoin-ex.com Or Ex-bitcoin? 3/3/16

Mybitcoinmania.com Don't download that malware from these crooks. You will sorely regret it, Gen:Variant.Strictor.101663 3/3/16

Hourlytim.com He's a busy boy is young Tim, avoiding Jail. 3/3/16

Bitsdoubler.me.pn Seriously, does anybody still fall for these multiplier scams? 3/3/16

Fastcury.com If you want a fast curry, order one from your local takeaway. Dodgy doesn't even begin to describe this amateur fraudster. 3/3/16

Crypto-investment-experts.biz & Swiss-cryptocurrency-experts.com A free Cuckoo Clock for every sucker. 3/3/16 & 2/18/16

Slushcoin.com Your bitcoin may as well be slush if you send it to this faker. 3/1/16

Profitown.com Another hyip/fraud 3/1/16

These are just the most recent badsites. Click below for these and more Cryptocurrency badsites In alphabetical order.

** Important Announcement** The wife of our admin has just undergone a double organ transplant, and so updates and personal responses to emails will be a little erratic for a few weeks. Please bear with us during this unusual but amazing time. Thanks.

The Badbitcoin project was launched in Feb 2014. "The Badbitcoin Team" is made up of volunteers worldwide, and we welcome new contributors and sponsors.

You may read negative comments about this project, but this is the scammers only route to fight back, and a great many of these scammers are the same people who are Senior, and Gold members of forums. Forums relating to bitcoin are the best source of conflicting information ever invented, which is why we keep it plain and simple, we tell you it's a badsite, and thats all you need to know.

It's really easy to misunderstand the bitcoin environment when it's all new to you, and it will take you some time to grasp some of the rules and concepts. This leaves you vulnerable to the swathes of scams and ponzis that try to lure you into their promises of easy money, and doubling or even 100 times multiplying your new 'Magic Internet Money' It doesn't work like that. It isn't magic, it's just very efficient, very secure, and much sought after by thieves the world over. If you have bitcoin, you need to learn to look after it, or these crooks will soon take it from you.

Don't make it easy for them. Contribute by reporting suspect sites when you find them, and we'll do the rest. You can also help by donating bitcoin or litecoin to the project, and If you run a website or blog, you could add a link to this project and help spread the message. We have banners and logos to suit.

That's it - nothing to add, nada.

To report Internet Fraud to IC3 - Click Here To report Internet Fraud to the FBI anonymously - Click Here To report Internet Fraud to the UK Police - Click Here

Ads by Google

You can help us to help others by making a donation to this project. However modest, it will help us to continue. We spend nearly all of the donations on advertising in the same space as the scamsites, so we can reach and warn the most users. We also use some expensive investigation tools, but we all give our time for free.

A Ponzi is any scheme which pays interest to "Investors" from Bitcoin coming in from new Investors. A HYIP (high yield investment program) is just a Ponzi. All Ponzi/Hyips will fail The later Investors will lose everything when the scheme folds and leaves with the Bitcoin. Most HYIPS just steal it immediately - Due diligence is your own responsibility. There are plenty of good sites out there where your Bitcoin and your work are safe. You just need to do your homework, including checking here. If it isn't in our Badlist, email us, and we'll check it and get back to you.

Heres the psychology behind the typical ponzis & HYIP's run by the professional scammers. They know most people will do this.

You deposit a small amount, you want to be cautious, you cant quite figure out how they do this but they double it (or pay promised interest) and pay you. You think Ah thats great, so you either redeposit the entire amount, or just your profit. You get that back and think wow, it works, so you deposit a much larger amount and in the worst case, even get your friends involved in this wonderful money making scheme.

Then one day it doesnt get returned there is some issue with your account, or your withdrawal is stuck or something similar, so you keep emailing the site and gradually it dawns on you that youve been scammed.

Even if you just put your initial profit back in, the conman hasnt lost anything and the depositors who think they are playing the ponzi do try that, and most of them dont get it back either.

Some people empty their savings into these scams, and they are the ones the scammers are really after. Once they get that big depositor, they move on and create a new ponzi, just leaving the old one alive for a while to mop up any new mugs Some even return after a 3 or 6 month absence to catch a fresh load of hits, they will never run out of victims. Its what they do, and they are expert at it.

Declaration of Interests. We currently have personal and project investments in VIP and Mining shares at Miningsweden.se, and mining shares at Hashnest We would not invest in anything we considered to be a Ponzi or Scam. As a project, we are not directly funded by any organisation and depend on ad revenue, our own, and other donations, and our external investments. We also provide links including referral links to trusted 3rd party sites, not including advertisements beyond our control. Updated August 2015 PS - As a friendly tip, we probably aren't the people to generally ask about good bitcoin investments. We are pretty good at what we do, but so far, like yourselves no doubt, we aren't really that succesful when it comes to our own investments. Mintsy being our latest fail.

The high costs of running this site are helped by adverts. We also have to advertise in the same places as the scamsites. We have little control over the content, and consequently we do not directly endorse any advert. Some adverts will even appear in our Badlist. But at least the Bitcoin they spend on ads is coming back into the Bitcoin Industry.

Footnote. The evolution of society beyond the demise of the failed capitalist neo-liberal experiment, first needs the evolution of it's means of trade and exchange. The current financial system, and system of fiat currency, is not fit for present or future purpose, and for all intents and purposes is already obsolete. Bitcoin is our first financial step towards a fairer, more benefecial society for all. Bitcoin is incorruptible, decentralised, concensus led, and above the influence of conventional politics and economics. A parallel currency with which you can begin to trade, and no middleman to take their slice or to gamble with your asset. When you deposit money to a Bank, it becomes the Banks property to do with what they choose, bitcoin is different, and you are your own Bank. It is up to you to take care of your bitcoin, and also to use it, not hoard it, and to be an important part of helping to build this fair and open global society. Bitcoin is worth what somebody is prepared to exchange it for, be that USD, Yuan, PC-hardware, Webhosting or anything that 'money' might buy. You can even get a bitcoin Debit Card. However, the bitcoin Blockchain, and it's potential is a much much bigger subject.

Link:
Badbitcoin.org - Helping you stay Safe in the World of ...

The Encryption Debate – CBS News

The war on terror has created a privacy vs. security debate across the world including in Europe, where one thing investigators look into is a texting app favored by ISIS

The following script is from "Encryption" which aired on March 13, 2016. Lesley Stahl is the correspondent. Shachar Bar-On, producer.

The argument over encryption between Apple and the FBI reminds us that the world is facing a far more tech-savvy terror threat. While not that long ago al Qaeda often handled its communications by going back to the Stone Age relying on mules and couriers, the Islamic State, or ISIS, proved it can be done with just a push of a button using everyday tools of 21st century teenagers: the latest smartphones and messaging apps.

The encryption debate centers around an iPhone found in San Bernardino, where 14 men and women were killed in a terror attack last December. But before that, there was the massacre in Paris. We went there to meet the city's chief prosecutor who is confronting some of the same issues.

Paris, France

CBS News

Francois Molins: The terrorists are able to communicate with total impunity.

Francois Molins is the head prosecutor of Paris -- he's investigated all the big acts of terrorism here, including Charlie Hebdo, the kosher supermarket, and now the November 13 attacks where 130 people were killed, more than 350 wounded.

Lesley Stahl: Do you have phones in terrorist attacks that you have not been able to get into because of encryption?

Francois Molins: Oui oui. With all these encryption software programs, we can't penetrate into certain conversations and we're dealing with this gigantic black hole, a dark zone where there are just so many dangerous things going on.

Play Video

Rob Wainwright, the head of Europol, saysISIS has developed "an external command force" to carry Special Forces-style attacks on the West

It's not just phones. One of the things he's looking into is a texting app favored by ISIS called Telegram which, like the new Apple iPhone -- offers advanced encryption.

Lesley Stahl: How often have you run in, in all your investigations, into Telegram?

Francois Molins: Yes, very often. Telegram, we can't penetrate, we can't get into it.

Pavel Durov is the inventor of Telegram. He's a young man without a country. He's Russian born but wanders the world now, in exile. He created Telegram so he could communicate in complete secrecy. It has taken off, used by over 100 million people.

Lesley Stahl with Telegram inventor Pavel Durov

CBS News

Lesley Stahl: But it's also used by terrorists now. Is this a concern for you?

Pavel Durov: Oh definitely. And in our 100 million users, probably this illegal activity we're discussing are only a fraction of a fraction of a fraction of the potential usage. And still we're trying to, you know, prevent it.

Telegram has become a go-to site for ISIS. They use it to widely disseminate propaganda like this video of the Paris attackers training in Syria. But ISIS fighters can also use Telegram to send private messages to each other to covertly plan and coordinate attacks.

Lesley Stahl: Is there something on your site on Telegram that allows any messages, emails, to just disappear, vanish?

Pavel Durov: Yes. So in private messages we have this secret chat feature which provides you with a self-destruct timer.

Lesley Stahl: Self-destruct timer.

Pavel Durov: You could set a specific amount of time, like a few seconds, or a minute or a week, after which the message would disappear.

Durov's obsession with secrecy and security stems from his own personal history. Long before Telegram he was known as the Mark Zuckerberg of Russia because he built a popular equivalent of Facebook. But in 2011, when anti-Putin marchers filled Moscow's streets, the Kremlin demanded he take down the organizers' sites.

Play Video

Pavel Durov, the founder and CEO of Telegram, tells 60 Minutes that Snowden's revelations "shattered" his view of the West

Pavel Durov: And I refused to do that publicly. And the next day I had armed policemen at my doorstep...

Lesley Stahl: Wonder why.

Pavel Durov: ...and tried to break into my apartment.

There was continual pressure on him to hand over users' personal data culminating in 2014 when, under Kremlin duress, Durov was ousted from his own company.

Lesley Stahl: How long did you stay in Russia after that?

Pavel Durov: Not a single day.

Lesley Stahl: Oh, then you fled.

Pavel Durov: I certainly feel that I am not welcome at that country anymore.

That's when he created Telegram and encrypted it, he says, so activists could be assured that no government could ever access their personal data. He managed to leave Russia with a reported $300 million which he uses to singled-handedly fund Telegram, costing him, he says, over a million dollars a month.

Lesley Stahl: This was something that you created to allow democracy to flourish, to allow dissidents in Russia and in other countries to communicate with each other. And then all of a sudden you find out that this terrorist group uses your site for completely different reasons.

Pavel Durov: Yeah, we were horrified.

Lesley Stahl: There's an irony there.

Pavel Durov: There is. But you know there's little you can do because if you allow this tool to be used for good, there will always be some people who would misuse it.

Just hours after the terrorists hit Paris on the night of November 13, ISIS used Telegram to take credit for the attacks. It was a wake-up call for European authorities.

Rob Wainwright: It's the first time ever in Europe that we had terrorists rampaging through our streets. First time we had terrorists wearing suicide belts in heavily populated, public areas.

As head of Europol, Rob Wainwright gathers and analyzes information from over 600 law enforcement agencies. He has set up a new counter terrorism center to better coordinate all the intelligence.

Lesley Stahl: How much is encryption a problem generally in these investigations?

Rob Wainwright: In most of them. I mean, across the tens of thousands of investigations that Europol is supporting every year on terrorism and serious crime, at least three quarters of them have encryption at the heart of the challenge that law enforcement face.

Lesley Stahl: Now, what about the November 13th attack specifically?

Rob Wainwright: From what we see, encryption also played a role in that part and that's something that we we're digging into much deeper at the moment.

Lesley Stahl: Why is it still a mystery?

Rob Wainwright: It's not-- not so much of a mystery. It's not that I can share all the details about a very sensitive investigation in public.

We know that the ringleader of the attack, 28-year-old Abdelhamid Abaaoud, was a wanted fugitive who goaded authorities by bragging in this online ISIS magazine how easily he eluded them shuttling between Europe and Syria. He liked taking selfies of his exploits, often posting them online. In this gruesome video, he and his friends tie bodies to the back of a truck, Abaaoud in the driver's seat:

[Abdelhamid Abaaoud (translator): We used to tow jet skis - now we tow the infidels fighting us.]

Lesley Stahl: What is astonishing is that you knew who he was. He was on everybody's radar screen.

Francois Molins (translator): You're right. Abaaoud-- he has been one of the major targets for France and Belgium counterterrorism for many months.

Before Paris, Abaaoud was suspected of guiding European jihadis in attacks in France and Belgium, but the attempts were all foiled. In one of them an iPhone belonging to one of the jihadis was confiscated but it was not useful in finding Abaaoud, because it was encrypted.

Lesley Stahl: We've been told, and I want to confirm it, that the encrypted phone may have prevented you from getting information about the Paris attacks.

Francois Molins (translator): That's a theory that really needs to be looked into, but to do so, we really need to be able to get into that phone. You know, I say, all these smart phones make justice blind because they deprive us of a lot of information that could contribute to our investigations.

Abaaoud was on site in Paris on the night of November 13, coordinating three different teams over his phone: one group, at a soccer stadium, exploded their suicide vests outside. Abaaoud and two others went on a killing spree at bars and cafes... while a third team stormed a rock-concert at the Bataclan theater and started shooting.

Francois Molins (translator): I said to myself: "The thing that we'd been fearing was coming for months, was now happening."

The prosecutor rushed to the scene - first to the cafes where Abaaoud had already sprayed the sites with an assault rifle.

Francois Molins (translator): We know that he participated in the commando attacks at the cafes. Afterwards we see him in a video in the Paris subway. And we do believe that he went maybe just in front of the Bataclan.

The prosecutor also went from the cafes to the Bataclan. What he didn't know was that Abaaoud was outside the theater at the same time, amid throngs of police, standing there in his orange sneakers - apparently talking on the phone to the shooters inside. While police didn't spot him there, he was tracked down to an apartment in a Paris suburb five days later, and killed in a hail of gunfire and explosions.

In a stroke of luck police found a Samsung phone one of the attackers had tossed into a garbage can in front of the Bataclan, and it posed no encryption problems.

Francois Molins (translator): We were able to get information from phone communications that enabled us to retrace the terrorists movements: where they were, where they stayed, their itineraries.

Standard text messages were found on the phone including a final one saying, "Here we go. We're starting!" Also found, the app Telegram. It had been downloaded the day of the attack.

Lesley Stahl: But you personally don't know if the attackers actually communicated via Telegram to plot these coordinated attacks, or even if they used it during the attacks?

Pavel Durov: No, we have no information to prove that.

Lesley Stahl: Is there anything in your mind that says, "Gee, we have to have - to allow law enforcement to get in because what's going on is just unacceptable.

Pavel Durov: You know the interesting thing about encryption is that it cannot be secure just for some people.

Lesley Stahl: ISIS and other terrorist groups, they just push a button on an application like yours, specifically yours, an application... and it's gone around the world, like that.

Pavel Durov: Well again, this is the world of technology and it's impossible to stop them at this point. ISIS could come up with their own messaging solution within a month or so, if they wanted to because the--

Lesley Stahl: You mean create their own Telegram?

Pavel Durov: Exactly.

Since Paris, Durov has been purging ISIS propaganda from Telegram but says, if asked to unlock any private messages, he would tell the authorities that the encryption code makes it mathematically impossible, using a similar argument as Apple.

Lesley Stahl: So you're basically saying that even if you wanted to, your hands are tied.

Pavel Durov: Yes.

Lesley Stahl: You can't do it.

Pavel Durov: We cannot.

Lesley Stahl: So this is one of the great debates of our time. Which is more important? Is it more important to shut down this kind of terrorism or preserve privacy?

Pavel Durov: I'm personally for the privacy side. But one thing that should be clear is that you cannot make just one exception for law enforcement without endangering private communications of hundreds of millions of people because encryption is either secure or not.

Lesley Stahl: The founder of Telegram has told us, he thinks privacy is more important than security issues, and he wouldn't open it up even if you did ask him.

Francois Molins (translator): Fine, that's his personal choice. But I consider that there are limits in all societies. There are limits to freedom and privacy. Freedom doesn't mean you can just do anything and everything you want. And there's a duty of institutions -- police and judicial -- to ensure security. You can't have freedom without security.

2016 CBS Interactive Inc. All Rights Reserved.

Go here to see the original:
The Encryption Debate - CBS News

Chelsea Manning: government anti-leak program a ‘blank check …

The 31-page file obtained by Chelsea Manning lists eight traits that agents should look for when assessing government employees for telltale signs that they might reveal state secrets. Photograph: Patrick George/Alamy

Thousands of US government employees under permanent surveillance are being investigated for signs of greed, ego, money worries, disgruntlement or other flaws in the hope of intercepting the next big official leak, according to a document obtained by Chelsea Manning.

The extent of the governments internal surveillance system designed to prevent massive leaks of the sort linked to WikiLeaks and the former NSA contractor Edward Snowden is revealed in the document, published here by the Guardian for the first time. The US soldier, who is serving 35 years in military prison as the source of the 2010 WikiLeaks disclosure of secret state documents, requested her own intelligence file under freedom of information laws.

The file was compiled under the Insider Threat program that was set up by President Obama in the wake of Mannings disclosures. The file shows that officials have been using Mannings story as a case study from which they have built a profile of the modern official leaker in the hope of catching future disclosures before they happen.

At the start of the 31-page file, government officials list the eight characteristics that agents should look for in employees as telltale signs that they might be tempted to reveal state secrets. The character traits are called Insider Threat motives.

Those surveillance categories are themselves extracted from an analysis of Chelsea Mannings story. In the document Manning is referred to in male gender pronouns as the file was composed on 14 April 2014 nine days before the prisoner was legally allowed to change her name as part of her transition as a transgender woman.

The Insider Threat analysis claims that Manning displayed several of those eight core motives of the prototype leaker. Before she transmitted hundreds of thousands of secret documents to WikiLeaks, she showed signs of disgruntlement, the file states.

She also subscribed to the ideology that all information should be made public, which the officials suggested stemmed from her association with self-proclaimed hackers.

In an opinion article in the Guardian, Manning said that the use of subjective labels in her file such as greed, disgruntlement and ideology meant that virtually every government employee could be targeted under the Insider Threat program. The broad sweep of the program means officials have been given a blank check for surveillance.

Manning writes that the program works against innovation, creativity and the prevention of institutional corruption. Perhaps this is the real intent to instill fear and project dominance throughout the intelligence community, the military and among government employees and contractors at large.

The government has already put about 100,000 military and civilian employees and contractors under what it calls continuous evaluation, according to documents obtained by Steven Aftergood at the Federation of American Scientists. He told the Guardian that the character traits deployed in the Insider Threat file on Manning were strikingly similar to the formula used to detect traitors and spies during the cold war.

Back then they used the acronym Mice, standing for money, ideology, coercion or ego. Aftergood said that the cold war record showed that the focus on those characteristics were not all that successful in sniffing out vulnerabilities. They are not necessarily useful ways of predicting what an individual will do that remains difficult though not entirely impossible.

The expansion of the Insider Threat program has raised fears among whistleblower groups that it will spread paranoia among employees and make it increasingly difficult for workers who have concerns about corruption or other misconduct to sound the alarm. Thomas Drake, a former NSA senior executive who blew the whistle on problems and inefficiencies within the agency was prosecuted under the 1917 Espionage Act, said that the program was a form of mass surveillance of the governments own workers that he likened to a dystopia.

It puts employees under continuous evaluation interesting phrase for all their activities including their outside actions and financial accounts. Whistleblowers and those who speak truth to power, especially when its about national security, are going to get hammered.

In an Insider Threat presentation from last year, officials placed Drake and Snowden two whistleblowers who sounded the alarm about what they saw as government excesses for no financial gain within a gallery of those who have done us harm alongside Soviet spies Aldrich Ames and Robert Hannsen and Fort Hood mass shooter Nidal Hasan.

Jesselyn Radack, who heads the Whistleblower and Source Protection program at ExposeFacts and who represents both Drake and Snowden, called Insider Threat a modern-day McCarthyism that has friends and colleagues spy on and report each other. It effectively stifles workplace free speech, dissent and is openly trying to deter whistleblowers.

The Insider Threat file on Manning suggests that the soldiers gender dysphoria where her gender identity is out of sync with her gender at birth was also a character trait that could have been used to predict her desire to leak state secrets.

Chase Strangio, the ACLU lawyer who represents Manning in her legal disputes with the US military relating to her gender transition, said that the file was yet another example of the soldiers voice and identity being used against her. They are using her gender identity to suggest it fits into an offender profile.

Strangio said the implication of the document was that anyone who pushes back on injustice against LGBT people within the military should be considered an insider threat. We are seeing that argument used over and over again in Chelseas case.

See the original post here:
Chelsea Manning: government anti-leak program a 'blank check ...

UK seeks review of UN Julian Assange ‘arbitrary detention …

The international panel said it believed Assanges confinement was arbitrary because of the length of time in bringing his case to resolution. Photograph: Dominic Lipinski/PA

The British government has formally asked a United Nations panel to review its finding that Julian Assange is arbitrarily detained in the Ecuadorian embassy in London, calling the opinion deeply flawed.

In its first formal response to the finding of the UN working group on arbitrary detention, which published its opinion in February, the Foreign Office confirmed it would contest the finding, saying: The original conclusions of the UN working group are inaccurate and should be reviewed.

In a statement, the Foreign Office minister Hugo Swire said: We want to ensure the working group is in possession of the full facts. Our request for a review of the opinion sets those facts out clearly.

Related: Britain 'sets dangerous precedent' by defying UN report on Assange

Julian Assange has never been arbitrarily detained by the UK, and is in fact voluntarily avoiding lawful arrest by choosing to remain in the Ecuadorian embassy. The UK continues to have a legal obligation to extradite him to Sweden.

The WikiLeaks founder has been confined to the embassy in London since July 2012, when he sought asylum in a bid to avoid extradition to Sweden over sexual assault allegations, which he denies.

The international panel said on 4 February that it believed Assanges confinement was arbitrary because of the length of time in bringing his case to resolution, citing in particular a lack of diligence by the Swedish prosecutor in its investigations.

The government argues that the panel is not a judicial body and its findings are therefore not binding. The working groups opinion is deeply flawed and Mr Assange has never been the subject of arbitrary detention, it said. His human rights have been protected throughout the process and will continue to be protected if and when he is extradited to Sweden.

Speaking shortly after the working groups findings were published, Philip Hammond, the foreign secretary, described them as ridiculous and said Assange was hiding from justice.

Assange accused Hammond of insulting the UN, saying: This is the end of the road for the legal arguments that have been put forward by Sweden and the UK.

Responding to the government statement, Melinda Taylor, a legal adviser to Assange, told the Guardian: The fact that they have submitted this request for reconsideration undermines their previous assertion that they werent in any way bound to comply with its opinion.

She said that all the points made by the Foreign Office had been known to the working group before it gave its original opinion, and the UK had every opportunity to make its case and correct any factual errors before the opinion was published.

In the absence of any objective basis to seek reconsideration, this rebuttal appears to be an attempt to publicly undermine the working groups opinion, she said.

The panels decision on whether or not to review its opinion will be made during its next session, beginning 18 April, the Foreign Office said.

More here:
UK seeks review of UN Julian Assange 'arbitrary detention ...

Edward Snowden and The Wire creator David Simon had a …

Listen up, internet: This is how to respectfully debate someone you disagree with.

On Sunday (March 20), the NSA contractor-turned-whistleblower Edward Snowden and David Simon, the creator of the acclaimed HBO show The Wire, engaged in a thoughtful, polite debate about government surveillance. It started when Snowden, prompted by a New York Times article (paywall) about the arrest of a suspect in Novembers Paris attacks, jokingly suggested that The Wire had helped the terrorists.

The Times article revealed that the attackers had frequently used disposable burner cell phones to avoid detectionjust as the street-level drug dealers in Simons acclaimed show used such phones to thwart police (video) who were trying to listen in.

(The joke was probably partly self-referential: Authorities in the aftermath of the Paris attacks directly and indirectly blamed Snowdens revelations for teaching the terrorists how to avoid phone surveillance.)

Before making The Wire, Simon was a police reporter for the Baltimore Sun for 13 years. Many of the investigative techniques prominent in the show, including wiretapping and tracking public pay phones, were based on Simons experience observing how Baltimore police surveilled the drug kingpins and their low-level corner boys.

Snowden now lives in Russia, where he has asylum from US attempts to charge him with various crimes. He signed up for Twitter in September.

After catching wind of Snowdens tweet, Simon responded:

(The Greek refers to a character in The Wire who leads a crime syndicate that supplies heroin to drug dealers and deals in human trafficking.)

The discussion eventually evolved into a broader look at the United States National Security Agencys surveillance program, and Snowdens decision to blow the whistle on it.

(August 1914 likely refers to the beginning of World War I.)

Smith v. Maryland was a 1979 US Supreme Court case that determined that pen registers were not protected by the Fourth Amendment against illegal searches and seizures, and thus could be obtained without a warrantan argument that has been applied to phone metadata in 2016 (to the dismay of Snowden and others who say the government has overstepped).

While the conversationbetween two men from very different worlds, both well-versed in the jargon of and arguments around surveillanceis not always easy to follow, it offers a powerful illustration of how Twitter can enable interesting and important public discourse between high-profile people.

The exchange coincidentally happened just a day before Twitters 10th anniversary. The platform has come a long way since its first tweet.

Read the original here:
Edward Snowden and The Wire creator David Simon had a ...

WikiLeaks publishes searchable archive of Clinton emails …

The secret-sharing website WikiLeaks has published a searchable archive of more than 30,000 Hillary Clinton emails that have been released by the State Department.

Unveiled on Wednesday, the archive allows users to browse through 30,322 emails and attachments sent to or from Clinton's private email server while she was secretary of state. In all, the archive comprises 50,547 pages spanning from June 30, 2010, to Aug. 12, 2014. According to the site, Clinton authored 7,570 of those documents.

More from the Washington Examiner

The petition's author claims the Islamic State could launch a terrorist attack during the convention.

03/27/16 5:17 PM

The State Department began releasing the emails in May of last year pursuant to a Freedom of Information Act request, but it is the first time that the messages have been made easily available in a searchable format. The final PDFs of all the emails were just made available by the State Department last month.

Though the department has completed its publication of Clinton emails, it is now set to review 29,000 pages of emails sent or received by Huma Abedin, who served as Clinton's deputy chief of staff from 2009-13. The department has said it plans to review at least 400 pages of Abedin's emails every month. Completion is expected by April 2017.

While Wikileaks' Wednesday release involved publicly available documents, the site has gained a reputation for illegally leaking classified information, including from the State Department. Army Pvt. Bradley Manning, now known as Chelsea Manning, is serving a 35-year prison sentence for leaking documents to the site both from the State and Defense Departments.

Also from the Washington Examiner

"We need to have a more robust effort and we need to assemble that coalition," the Wisconsin Republican said.

03/27/16 4:08 PM

The site has also published files stolen from defense firm Stratfor, the Saudi Foreign Ministry and the National Security Agency, among others.

Top Story

55 dead and more than 100 wounded include many women and children.

03/27/16 1:34 PM

The rest is here:
WikiLeaks publishes searchable archive of Clinton emails ...

U.S. Intelligence Analyst Arrested in Wikileaks Video …

Skip Article Header. Skip to: Start of Article.

Federal officials have arrested an Army intelligence analyst who boasted of giving classified U.S. combat video and hundreds of thousands of classified State Department records to whistleblower site Wikileaks, Wired.com has learned.

PFC Bradley Manning, 22, of Potomac, Maryland, was stationed at Forward Operating Base Hammer, 40 miles east of Baghdad, where he was arrested nearly two weeks ago by the Armys Criminal Investigation Division. A family member says hes being held in custody in Kuwait, and has not been formally charged.

Manning was turned in late last month by a former computer hacker with whom he spoke online. In the course of their chats, Manning took credit forleaking a headline-makingvideo of a helicopter attack thatWikileaks posted online in April. The video showed a deadly 2007 U.S.helicopter air strike in Baghdad that claimed the lives of several innocentcivilians.

He said he also leaked three other items to Wikileaks: a separate videoshowing the notorious 2009 Garani air strike in Afghanistan that Wikileakshas previously acknowledged is in its possession; a classified Army document evaluatingWikileaks as a security threat, which the site posted in March; and apreviously unreported breach consisting of 260,000 classified U.S.diplomatic cables that Manning described as exposing almost criminal political back dealings.

Hillary Clinton, and several thousand diplomats around the world are going to have a heart attack when they wake up one morning, and find an entire repository of classified foreign policy is available, in searchable format, to the public, Manning wrote.

Wired.com could not confirm whether Wikileaks received the supposed 260,000 classified embassy dispatches. To date, a single classified diplomatic cable has appeared on the site: Released last February, it describes a U.S. embassy meeting with the government of Iceland. E-mail and a voicemail message left for Wikileaks founder Julian Assange on Sunday were not answered by the time this article was published.

The State Department said it was not aware of the arrest or the allegedly leaked cables. The FBI was not prepared to comment when asked about Manning.

Army spokesman Gary Tallman was unaware of the investigation but said, If you have a security clearance and wittingly or unwittingly provide classified info to anyone who doesnt have security clearance or a need to know, you have violated security regulations and potentially the law.

Mannings arrest comes as Wikileaks has ratcheted up pressure against various governments over the years with embarrassing documents acquired through a global whistleblower network that is seemingly impervious to threats from adversaries. Its operations are hosted on servers in several countries, and it uses high-level encryption for its document-submission process, providing secure anonymity for its sources and a safe haven from legal repercussions for itself. Since its launch in 2006, it has never outed a source through its own actions, either voluntarily or involuntarily.

Manning came to the attention of the FBI and Army investigators after he contacted former hacker Adrian Lamo late last month over instant messenger and e-mail. Lamo had just been the subject of a Wired.com article. Veryquickly in his exchange with the ex-hacker, Manning claimed to be the Wikileaks videoleaker.

If you had unprecedented access to classified networks 14 hours a day 7 days a week for 8+ months, what would you do? Manning asked.

From the chat logs provided by Lamo, and examined by Wired.com, it appears Manning senseda kindred spirit in the ex-hacker. He discussed personal issues that got himinto trouble with his superiors and left him socially isolated, and said hehad been demoted and was headed for an early discharge from the Army.

When Manning told Lamo that he leaked a quarter-million classified embassy cables, Lamo contacted the Army, and then met with Army CID investigators and the FBI at a Starbucks near his house in Carmichael, California, where he passed the agents a copy of the chat logs. At their second meeting with Lamo on May 27, FBI agents from the Oakland Field Office told the hacker that Manning had been arrested the day before in Iraq by Army CID investigators.

Lamo has contributed funds to Wikileaks in the past, and says he agonized over the decision to expose Manning he says hes frequently contacted by hackers who want to talk about their adventures, and he has never considered reporting anyone before. The supposed diplomatic cable leak, however, made him believe Mannings actions were genuinely dangerous to U.S. national security.

I wouldnt have done this if lives werent in danger, says Lamo, whodiscussed the details with Wired.com following Mannings arrest. He was in a war zone and basically trying to vacuum up as much classified information as he could, and just throwing it up into the air.

Manning told Lamo that he enlisted in the Army in 2007 and held a TopSecret/SCI clearance, details confirmed by his friends and family members. He claimed to have been rummaging through classified military and government networks for more than a year and said that the networks contained incredible things, awful things that belonged in the public domain, and not on some server stored in a dark room in Washington DC.

He first contacted Wikileaks Julian Assange sometime around late November last year, he claimed, after Wikileaks posted 500,000 pager messagescovering a 24-hour period surrounding the September 11, 2001 terror attacks.I immediately recognized that they were from an NSA database, and I feltcomfortable enough to come forward, he wrote toLamo. He said his role with Wikileaks was a source, not quite a volunteer.

Manning had already been sifting through the classified networks for monthswhen he discovered the Iraq video in late 2009, he said. The video, laterreleased by Wikileaks under the title Collateral Murder, shows a 2007Army helicopter attack on a group of men, someof whom were armed, that the soldiers believed were insurgents. The attackkilled two Reuters employees and an unarmed Baghdad man who stumbled on thescene afterward and tried to rescue one of the wounded by pulling him intohis van. The mans two children were in the van and suffered seriousinjuries in the hail of gunfire.

At first glance it was just a bunch of guys getting shot up by ahelicopter, Manning wrote of the video. No big deal about two dozenmore where that came from, right? But something struck me as odd with thevan thing, and also the fact it was being stored in a JAG officersdirectory. So I looked into it.

In January, while on leave in the United States, Manning visited a close friend inBoston and confessed hed gotten his hands on unspecified sensitiveinformation, and was weighing leaking it, according to the friend. Hewanted to do the right thing, says 20-year-old Tyler Watkins. That wassomething I think he was struggling with.

Manning passed the video to Wikileaks in February, he told Lamo. After April 5 when the video was released and made headlines Manning contacted Watkins from Iraq asking him about the reaction in the United States.

He would message me, Are people talking about it? Are the media saying anything? Watkins said. That was one of his major concerns, that once he had done this, was it really going to make a difference? He didnt want to do this just to cause a stir. He wanted people held accountable and wanted to see this didnt happen again.

Watkins doesnt know what else Manning might have sent to Wikileaks. But in his chats with Lamo, Manning took credit for a number of other disclosures.

The second video he claimed to have leaked shows a May 2009 air strike near Garani village in Afghanistan that the local government says killed nearly 100 civilians, most of them children. The Pentagon released a report about the incident last year, but backed down froma plan to show video of the attack to reporters.

As described by Manning in his chats with Lamo, his purported leaking was made possible by lax security online and off.

Manning had access to two classified networks from two separate securedlaptops: SIPRNET, the Secret-level network used by the Department of Defenseand the State Department, and the Joint Worldwide IntelligenceCommunications System which serves both agencies at the Top Secret/SCIlevel.

The networks, he said, were both air gapped from unclassified networks, but the environment at the base made it easy to smuggle data out.

I would come in with music on a CD-RW labeled with something like Lady Gaga, erase the music then write a compressed split file, he wrote. No one suspected a thing and, odds are, they never will.

[I] listened and lip-synced to Lady Gagas Telephone while exfiltratingpossibly the largest data spillage in American history, he added later.Weak servers, weak logging, weak physical security, weakcounter-intelligence, inattentive signal analysis a perfectstorm.

Manning told Lamo that the Garani video was leftaccessiblein a directoryon a U.S. Central Command server, centcom.smil.mil, by officers whoinvestigated the incident. The video, he said, was an encrypted AES-256 ZIPfile.

Mannings aunt, with whom he lived in the United States, had heard nothing about hisarrest when first contacted by Wired.com last week; Debra Van Alstyne said she last saw Manning during his leave in January and they had discussed his plans to enroll in college when his four-year stint in the Army was set to end in October 2011. She described him as smart and seemingly untroubled, with a natural talent for computers and a keen interest in global politics.

She said she became worried about her nephew recently after he disappeared from contact. Then Manning finally called Van Alstyne collect on Saturday. He told her that he was okay, but that he couldnt discuss what was going on, Van Alstyne said. He then gave her his Facebook password and asked her to post a message on his behalf.

The message reads: Some of you may have heard that I have been arrested for disclosure of classified information to unauthorized persons. SeeCollateralMurder.com.

An Army defense attorney then phoned Van Alstyne on Sunday and said Manningis being held in protective custody in Kuwait. He hasnt seen the case file, but he does understand that it does have to do with that CollateralMurder video, Van Alstyne said.

Mannings father said Sunday that hes shocked by his sons arrest.

I was in the military for five years, said Brian Manning, of Oklahoma. I had a Secret clearance, and I never divulged any information in 30 years since I got out about what I did. And Brad has always been very, very tight at adhering to the rules. Even talking to him after boot camp and stuff, he kept everything so close that he didnt open up to anything.

His son, he added, is a good kid. Never been in trouble. Never been on drugs, alcohol, nothing.

Lamo says he felt he had no choice but to turn in Manning, but that hes now concerned about the soldiers status and well-being. The FBI hasnt told Lamo what charges Manning may face, if any.

The agents did tell Lamo that he may be asked to testify against Manning. The Bureau was particularly interested in information that Manning gave Lamo about an apparently-sensitive military cybersecurity matter, Lamo said.

That seemed to be the least interesting information to Manning, however. What seemed to excite him most in his chats was his supposed leaking of the embassy cables. He anticipated returning to the states after his early discharge, and watching from the sidelines as his action bared the secret history of U.S. diplomacy around the world.

Everywhere theres a U.S. post, theres a diplomatic scandal that will be revealed, Manning wrote. Its open diplomacy. World-wide anarchy in CSV format. Its Climategate witha global scope, and breathtaking depth. Its beautiful, and horrifying.

Update: The Defense Department issued a statement Monday morning confirming Mannings arrest and his detention in Kuwait for allegedly leaking classified information.

United States Division-Center is currently conducting a joint investigation says the statement, which notes that Manning is deployed with 2nd Brigade 10th Mountain Division in Baghdad. The results of the investigation will be released upon completion of the investigation.

View post:
U.S. Intelligence Analyst Arrested in Wikileaks Video ...

Encryption FAQs – Bureau of Industry and Security

1. What is an encryption registration? How long does it take to receive a response from BIS for my encryption registration?

2. Who is required to submit an Encryption Registration, classification request or self-classification report?

3. What are my responsibilities for exporting or re-exporting encryption products where I am not the producer?

4. What should I do if I cannot obtain the encryption registration Number (ERN) or the Export Control Classification Number (ECCN) for the item from the producer or manufacturer?

5. Can a third-party applicant submit an encryption registration and self-classification report on my behalf?

6. How do I report exports and reexports of items with encryption?

7. Can I export encryption technology under License Exception ENC?

8. What is non-standard cryptography?

9. How do I complete Supplement No. 5 if I am a law firm or consultant filing on behalf of a producer of encryption items?

10. What if you are not the producer of the item or filing directly on behalf of the producer (e.g., law firm/consultant)?

11. What do I need to submit with an encryption commodity classification request in SNAP-R?

12. Is Supplement No. 6 to Part 742 required for obtaining paragraph 740.17(b)(1) authorization?

13. How do I submit a Supplement No. 8 Self-Classification Report for Encryption Items?

14. When do I file Supplement No. 8 Self-Classification Report for Encryption Items?

15. What is Note 4?

16. I have an item that was reviewed and classified by BIS and made eligible for export under paragraph (b)(3) of License Exception ENC in 2009. The encryption functionality of the item has not changed. This item is now eligible for self-classification under paragraph (b)(1) of License Exception ENC. What are my responsibilities under the new rule?

17. When do I need a deemed export license for encryption technology and source code?

18. Does the EAR definition of "OAM" include using encryption in performing network security monitoring functions?

1. What is an Encryption Registration? How long does it take to receive a response from BIS for my Encryption Registration?

Encryption registration is a prescribed set of information about a manufacturer and/or exporter of certain encryption items that must be submitted to the Bureau of Industry and Security as a condition of the authorization to export such items under License Exception ENC or as mass market items.

Advance encryption registration is required for exports and reexports of items described in paragraphs 740.17(b)(1), (b)(2), and (b)(3) and paragraphs 742.15(b)(1), and (b)(3) of the Export Administration Regulations (EAR). Registration is made through SNAP-R by submitting the questionnaire set forth in Supplement No. 5 to part 742 of the EAR (point of contact/company overview/types of products/ etc.). Registration of a manufacturer authorizes the manufacturer as well as other parties to export and reexport the manufacturers encryption products that the manufacturer has either self-classified or has had the items classified by BIS, pursuant to the provisions referenced above. A condition of the authorization is that the manufacturer must submit an annual self-classification report for relevant encryption items.

How long does it take to receive a response from BIS for my encryption registration?

Once you have properly registered with BIS, the SNAP-R system will automatically issue an Encryption Registration Number (ERN), e.g., R123456, upon submission of a request. BIS estimates that the entire registration procedure should take no more than 30 minutes.

2. Who is required to submit an encryption registration, classification request or self-classification report?

Any party who exports certain U.S.-origin encryption products may be required to submit an encryption registration, classification request and/or self-classification report; however, if a manufacturer has registered and has self-classified relevant items and/or had items classified by BIS, and has made the classifications available to other parties such as resellers and other exporters/reexporters, such other parties are not required to register, to submit a classification request, or to submit an annual self-classification report.

3. What are my responsibilities for exporting or re-exporting encryption products where I am not the product manufacturer?

Exporters or reexporters that are not producers of the encryption item can rely on the Encryption Registration Number (ERN), self-classification report or CCATS that is published by the producer when exporting or reexporting the registered and/or classified encryption item. Separate encryption registration, commodity classification request or self-classification report to BIS is NOT required.

Please continue to the next question if the information is not available from the producer or manufacturer.

4. What should I do if I cannot obtain the Encryption Registration Number (ERN) or the Export Control Classification Number (ECCN) for the item from the producer or manufacturer?

If you are not the producer and are unable to obtain the producers information or if the producer has not submitted an encryption registration, self-classification report or commodity classification for his/her products to BIS, then you must register with BIS. The registration process will require you to submit a properly completed Supplement No. 5 to part 742 and subsequent Supplement No. 8 Self Classification Report for the products. You will receive an ERN for the registered products or CCATSs as appropriate. BIS recognizes that non-producers who need to submit for encryption registration may not have all of the information necessary to complete Supplement No. 5 to part 742. Therefore, special instructions have been included in Supplement No. 5 to account for this situation.

For items described in Part 740.17(b)(2) and (b)(3) or Part 742.15(b)(3) that require the classification by BIS, the non-producer is required to submit as much of the technical information required in Supplement No. 6 to part 742 - Technical Questionnaire for Encryption Items as possible.

5. Can a third-party applicant submit an encryption registration and self-classification report on my behalf?

Yes, special instructions for this purpose are provided in paragraph (r) of Supplement No. 2 to part 748 of the EAR for this purpose. The information in block 14 (applicant) of the encryption registration screen and the information in Supplement No. 5 to part 742 must pertain to the company that seeks authorization to export and reexport encryption items that are within the scope of this rule. An agent for the exporter, such as a law firm, should not list his/her name in block 14. The agent however may submit the encryption registration and list himself/herself in block 15 (other party authorized to receive license) of the encryption registration screen in SNAP-R.

6. How do I report exports and reexports of items with encryption?

All reports (i.e., the semi-annual sales report and the annual self-classification report) must be submitted to both BIS and the ENC Encryption Request Coordinator.

An annual self-classification report is required for producers of encryption items described by paragraphs 740.17(b)(1) and 742.15(b)(1) of the EAR. The information required and instruction for this report is provided in Supplement No. 8 to Part 742-Self-Classification Report for Encryption Items. Reports are submitted to BIS and the Encryption Request Coordinator in February of each year for items exported or reexported during the previous calendar year (i.e., January 1 through December 31) pursuant to the encryption registration and applicable sections740.17(b)(1) or 742.15(b)(1) of the EAR. Annual self-classification reports are to be submitted to This email address is being protected from spambots. You need JavaScript enabled to view it. and This email address is being protected from spambots. You need JavaScript enabled to view it..

Semi-annual sales reporting is required for exports to all destinations other than Canada, and for reexports from Canada for items described under paragraphs (b)(2) and (b)(3)(iii) of section 740.17. Paragraph 740.17(e)(1(iii) contains certain exclusions from this reporting requirement. Paragraphs 740.17(e)(1)(i) and (e)(1)(ii) contains the information required and instructions for submitted the semi-annual sales reports. The first report is due no later than August 1 for sales occurring between January 1 and June 30 of the year, and the second report is due no later than February of the following year for sales occurring between July 1 and December 31 of the year. Semi-annual sales reports continue to be submitted to: This email address is being protected from spambots. You need JavaScript enabled to view it. and This email address is being protected from spambots. You need JavaScript enabled to view it..

7. Can I export encryption technology under License Exception ENC?

Yes, License Exception ENC is available for transfer of encryption technology. Specifically, paragraph 740.17(b)(2)(iv) has been amended to permit exports and reexports of encryption technology as follows:

(A) Technology for "non-standard cryptography". Encryption technology classified under ECCN 5E002 for "non-standard cryptography", to any end-user located or headquartered in a country listed in Supplement No. 3 to this part;

(B) Other technology. Encryption technology classified under ECCN 5E002 except technology for "cryptanalytic items", "non-standard cryptography" or any "open cryptographic interface," to any non-"government end-user" located in a country not listed in Country Group D:1 or E:1 of Supplement No. 1 to part 740 of the EAR.

8. What is non-standard cryptography?

Non-standard cryptography, defined in Part 772 Definition of Terms, means any implementation of cryptography involving the incorporation or use of proprietary or unpublished cryptographic functionality, including encryption algorithms or protocols that have not been adopted or approved by a duly recognized international standards body (e.g., IEEE, IETF, ISO, ITU, ETSI, 3GPP, TIA, and GSMA) and have not otherwise been published.

9. How do I complete Supplement No. 5 if I am a law firm or consultant filing on behalf of a producer or exporter of encryption items?

The information in Supplement No. 5 to Part 742must pertain to the registered company, not to the submitter. Specifically, the point of contact information must be for the registered company, not a law firm or consultant filing on behalf of the registered company.

10. What if you are not the producer of the item or filing directly on behalf of the producer (e.g., law firm/consultant)?

You may answer questions 4 and 7 in Supplement No. 5 to part 742as not applicable if your company is not the producer of the encryption item. An answer must be give for all other questions. An explanation is required when you are unsure.

11. What do I need to submit with an encryption commodity classification request in SNAP-R?

Encryption commodity classification determinations should be submitted through SNAP-R. Before entering SNAP-R, you should prepare the following supporting documents:

After accessing SNAP-R, fill-in a commodity classification determination request and upload the supporting documents into SNAP-R.

12. Is Supplement No. 6 to part 742 required for paragraph 740.17(b)(1) authorization?

If you are requesting a classification of an item is described in paragraph 740.17(b)(1) (in other words, the item is not described in either Section 740.17(b)(2) or (b)(3)), a Supplement No. 6questionnaire is not required as a supporting document. Provide sufficient information about the item (e.g., technical data sheet and/or other explanation in a separate letter of explanation) for BIS to determine that the item is described in paragraph 740.17(b)(1). If you are not sure that your product is authorized as 740.17(b)(1) and you want BIS to confirm that it is authorized under 740.17(b)(1), providing answers to the questions set forth in Supplement No. 6 to part 742 with your request should provide BIS with sufficient information to make this determination.

13. How do I submit a Supplement No. 8 Self Classification Report for Encryption Items?

The annual self-classification report must be submitted as an attachment to an e-mail to BIS and the ENC Encryption Request Coordinator. Reports to BIS must be submitted to a newly created e-mail address for these reports (This email address is being protected from spambots. You need JavaScript enabled to view it.). Reports to the ENC Encryption Request Coordinator must be submitted to its existing e-mail address (This email address is being protected from spambots. You need JavaScript enabled to view it.). The information in the report must be provided in tabular or spreadsheet form, as an electronic file in comma separated values format (CSV), only. In lieu of email, submissions of disks and CDs may be mailed to BIS and the ENC Encryption Request Coordinator.

14. When do I file Supplement No. 8 Self-Classification Report for Encryption Items?

An annual self-classification report for applicable encryption commodities, software and components exported or reexported during a calendar year (January 1 through December 31) must be received by BIS and the ENC Encryption Request Coordinator no later than February 1 the following year. If no information has changed since the previous report, an email must be sent stating that nothing has changed since the previous report or a copy of the previously submitted report must be submitted.

15. What is Note 4?

Note 4 to Category 5, Part 2 in the Commerce Control List (Supplement No. 1 to part 774) excludes an item that incorporates or uses cryptography from Category 5, Part 2 controls if the items primary function or set of functions is not information security, computing, communications, storing information, or networking, andif the cryptographic functionality is limited to supporting such primary function or set of functions. The primary function is the obvious, or main, purpose of the item. It is the function which is not there to support other functions. The communications and information storage primary function does not include items that support entertainment, mass commercial broadcasts, digital rights management or medical records management.

Examples of items that are excluded from Category 5, Part 2 by Note 4 include, but are not limited to, the following:

16. I have an item that was reviewed and classified by BIS and made eligible for export under paragraph (b)(3) of License Exception ENC in 2009. The encryption functionality of the item has not changed. This item is now eligible for self-classification under paragraph (b)(1) of License Exception ENC. What are my responsibilities under the new rule?

Your item meets the grandfathering provisions set forth in section 740.17(f)(1) of the EAR. You do not need to submit an encryption registration (Supplement No. 5), an annual self-classification report (Supplement No. 8), or semi-annual sales reports for the item.

17. When do I need a deemed export license for encryption technology and source code?

A license may be required in certain circumstances for both deemed exports and deemed reexports. For encryption items, the deemed export rules apply only to deemed exports of technology and to deemed reexports of technology and source code. There are no deemed export rules for transfers of encryption source code to foreign nationals in the United States. This is because of the way that section 734.2 defines exports and reexports for encryption items.

For transfers of encryption technology within the United States, section 740.17(a)(2) of license exception ENC authorizes the export and reexport of encryption technology by a U.S. company and its subsidiaries to foreign nationals who are employees, contractors, or interns of a U.S. company . . . There is no definition of U.S. company in the EAR, however, BIS has interpreted this to apply to any company operating in the United States. This means that deemed export licenses are generally not required for the transfer of encryption technology by a company in the U.S. to its foreign national employees. A deemed export license may be required if, for example, a company operating in the U.S. were to transfer encryption technology to a foreign national who is not an employee, contractor, or intern of a company in the United States. License exception ENC does not authorize deemed exports or reexports to any national of a country listed in Country Group E:1.

For deemed reexports, the end-user would have to be an employee, contractor, or intern of a U.S. Subsidiary for 740.17(a)(2) to apply, or a private sector end-user headquartered in a Supplement 3 country for 740.17(a)(1) to apply. The term contractor in this context means a contract employee (i.e., a human person). License exception ENC does not authorize deemed exports or reexports to any national of a country listed in Country Group E:1.

Also note that as of June 25, 2010, encryption technology (except technology for cryptanalytic items, Open Cryptographic Interface items, and non-standard cryptography) that has been reviewed is eligible for license exception ENC to any non-government end user located outside of Country Group D:1. Also, encryption source code that has been reviewed by BIS and made eligible for license exception ENC under 740.17(b)(2) is eligible for export and reexport to any non-government end-user. Thus encryption technology and source code that have been reviewed are eligible for export and reexport to a broader range of end-users than 740.17(a) allows. Again, section 740.17 does not authorize deemed exports or reexports to any national of a country listed in Country Group E:1.

18. Does the EAR definition of "OAM" include using encryption in performing network security monitoring functions?

No. The definition of "OAM" includes "monitoring or managing the operating condition or performance of an item." BIS does not consider network security monitoring or network forensics functions to be part of monitoring or managing operating condition or performance.

The phrase "monitoring or managing the operating condition or performance of an item" is meant to include all the activities associated with keeping a computer or network-capable device in proper operating condition, including: configuring the item; checking or updating its software; monitoring device error or fault indicators; testing, diagnosing or troubleshooting the item; measuring bandwidth, speed, available storage (e.g. free disk space) and processor / memory / power utilization; logging uptime / downtime; and capturing or measuring quality of service (QoS) indicators and Service Level Agreement-related data.

However, the "OAM" definition does not apply to cryptographic functions performed on the forwarding or data plane, such as: decrypting network traffic to reveal or analyze content (e.g., packet inspection and IP proxy services); encrypting cybersecurity-relevant data (e.g., activity signatures, indicators or event data extracted from monitored network traffic) over the forwarding plane; or securing the re-transmission of captured network activity.

Thus, products that use encryption for such network security monitoring or forensics operations, or to provision these cryptographic services, would not be released by the OAM decontrol notes (l) or (m), or the Note to 5D002.c.

Similarly, the "OAM" decontrol does not apply to security operations directed against data traversing the network, such as capturing, profiling, tracking or mapping potentially malicious network activity, or "hacking back" against such activity.

Back to top

See the original post:
Encryption FAQs - Bureau of Industry and Security