Bradley Manning Trial FAQ – WikiLeaks

Who is Bradley Manning?

When is the trial?

How long is the trial?

What is Bradley Manning accused of?

What is the potential sentence?

What is the status of the federal investigation against Julian Assange and six other founders, owners or administrators of WikiLeaks?

What is the scope of the WikiLeaks/Manning investigation, which US officials have described as unprecedented both in its scale and nature

How does secrecy in the Manning trial compare to secret trials in Guantanamo Bay?

What legal actions has WikiLeaks taken in relation to BM?

How can Manning be charged with Aiding the Enemy?

What does the Manning trial mean for press freedoms?

Where can I find Bradley Mannings plea statement?

Twenty-five-year-old Bradley Manning is alleged to be the source of a trove of written and audiovisual material detailing, inter alia, war crimes, corruption, torture and human rights violations published by WikiLeaks. Manning is a Nobel Peace Prize nominee. He has won numerous prizes, including The Guardian "Person of the Year" award in 2012. The material concerned every country in the world. It detailed the deaths of hundreds of thousands of people (the majority civilians) in occupied Iraq and Afghanistan. Details of the execution of an Iraqi family and its cover-up ultimately precipitated the end of the Iraq War, after the Iraqi government refused to renew US immunity from prosecution. The material also revealed the existence of US death squads in Afghanistan. More

Manning was deployed as an army intelligence analyst in Iraq. He was arrested in May 2010 at the age of 23. For the first nine months the US army placed Manning in conditions of pre-trial punishment which the UN Rapporteur on Torture found to be inhuman and degrading, in violation of the UN Convention Against Torture. The military judge ruled in January 2013 that Manning had been subjected to unlawful pretrial punishment for 112 days at the Quantico marine brig.

The trial commenced on 3 June 2013. Pre-trial hearings began on 16 December 2011. http://www.bradleymanning.org/learn-more/bradley-manning

The trial is scheduled to last twelve weeks.

View the infographic comparing prosecutions charged dates versus the timeline set out by the Manning plea. Read the charge sheet here

The most serious charge against Bradley Manning is Aiding the Enemy, a capital offence. Although the prosecution has stated that they will seek a life sentence and not the death penalty, it is within the discretion of the court to pursue it nonetheless.

The criminal US investigation against WikiLeaks was most recently confirmed to be ongoing by the Department of Justice spokesman for the Eastern District of Virginia, Peter Carr, on the 26th March 2013. The federal investigation into the WikiLeaks publication and its Australian publisher Julian Assange in connection with Mannnings prosecution will establish a precedent. If successful these efforts will criminalise national security journalism.

The various limbs of the Manning/WikiLeaks investigation progress in parallel and inform one another. Prior to the recent confirmation, the US Attorney General, Eric Holder, spoke about the WikiLeaks investigation to the press here and here), as did the Department of Justice spokesman Dean Boyd.

More: http://justice4assange.com/extraditing-assange.html#WHATLAWS

WikiLeaks Grand Jury 10-GJ-3-793

The WikiLeaks Grand Jury empaneled in Alexandria, Virginia since 2010 is the mechanism through which the Obama administration is determining how to shape its criminal prosecution against Julian Assange and WikiLeaks in connection with the material allegedly leaked by Bradley Manning. The WikiLeaks grand jury has the number 10-GJ-3-793. "10" is the year it began, "GJ" stands for grand jury, "3" refers to a conspiracy statute, and "793" to the Espionage Act as encoded in US law.

The military prosecutors in the Manning case are using transcripts from 10-GJ-3-793 WikiLeaks grand jury testimony against Bradley Manning in the military trial. Bradley Mannings lawyer requested to view this evidence but was denied access to it.

Australian embassy cables describe the WikiLeaks grand jury thus: "active and vigorous inquiry into whether Julian Assange can be charged under US law, most likely the 1917 Espionage Act". US officials told the Australian embassy ["the WikiLeaks case is unprecedented both in its scale and nature". According to these diplomatic communications, the WikiLeaks grand jury casts the net beyond Assange to see if any intermediaries had been involved in communications between Assange and Manning".

Grand juries confer special powers on prosecutors and the rules of evidence are not as strict as in a trial. Witnesses to the grand jury can be compelled to testify because they cannot refuse to do so on grounds of self-incrimination. Australian diplomatic communications stated that Grand juries can issue indictments under seal, and that theoretically one could already have been issued for Assange. In this particular case, it would be more likely that an indictment would become known at the point of extradition proceedings, should these take place, in the UK or Sweden.

FBI Criminal investigation against WikiLeaks

As of a year ago, approximately 20% of the FBI classified investigation file into WikiLeaks pertained to Bradley Manning. 8,741 pages (636 documents) related to Bradley Manning out of 42,135 pages (3,475 documents) relating to WikiLeaks. The remaining FBI file involved at least eight civilians related to the WikiLeaks disclosures, including the founders, owners, or managers of WikiLeaks. The FBI investigation includes damage assessments.

The FBI conducted illegal operations as part of the WikiLeaks investigation. One unlawful FBI WikiLeaks operation became known to the public after WikiLeaks spokesman Kristinn Hrafnsson revealed the incident in a live interview on national television. The information was subsequently confirmed by Icelands Minister of Interior, Ogmundur Jonasson. A parliamentary inquiry took place in February 2013 in relation to the FBIs WikiLeaks activities in Iceland. The FBI agents and prosecutors were expelled from the country and Icelandic authorities formally suspended their collaboration with the FBI. The FBI had allegedly attempted to entrap WikiLeaks and its founder, Julian Assange. The operation in Iceland was conducted in secret. It involved six FBI officers and two US prosecutors, one of which was a prosecutor at 10-GJ-3-793, the WikiLeaks grand jury in Alexandria, Virginia. The unlawful methods of the FBI investigation should not come as a surprise given that they are led by Neil MacBride, whose prosecutorial tactics involves claiming that US criminal law applies in foreign jurisdictions.

On July 28, 2010, one month after Pfc. Bradley Manning was arrested in Iraq, the FBI opened an official criminal investigation into the editor and chief of WikiLeaks, Julian Assange, partnering with the joint investigation of the US Defense Department and the US Department of States Diplomatic Security Service. The investigation then grew into a whole of government investigation, involving interagency coordination between the Department of Defense (DOD) including: CENTCOM; SOUTHCOM; the Defense Intelligence Agency (DIA); Defense Information Systems Agency (DISA); Headquarters Department of the Army (HQDA); US Army Criminal Investigation Division (CID) for USFI (US Forces Iraq) and 1st Armored Division (AD); US Army Computer Crimes Investigative Unit (CCIU); 2nd Army (US Army Cyber Command); Within that or in addition, three military intelligence investigations were conducted. Department of Justice (DOJ) Grand Jury and the Federal Bureau of Investigation (FBI), Department of State (DOS) and Diplomatic Security Service (DSS). In addition, Wikileaks has been investigated by the Office of the Director of National Intelligence (ODNI), Office of the National CounterIntelligence Executive (ONCIX), the Central Intelligence Agency (CIA); the House Oversight Committee; the National Security Staff Interagency Committee, and the PIAB (Presidents Intelligence Advisory Board).

Source: Bradley Manning pre-trial hearing

Trials of accused terrorists in Guantanamo Bay are more transparent than the Manning trial. In the case of offshore trials in Guantanamo Bay, the military court committed to providing journalists with contemporaneous access to the material filed in court. Where information has been withheld at Guantanamo Bay proceedings, journalists can challenge the decision to keep the information secret. By contrast, the overwhelming majority of court records filed in the Manning case have been kept secret by the court and attempts to make them public have been dismissed. Although journalists have been been able to access portions of his pre-trial proceedings, the government refuses to provide its existing official court transcript of these public portions to the public. Instead, independent journalists have had to collect, piece together and report the trial in the absence of the governments compliance with the right of public access to criminal proceedings. These efforts are not funded by the US tax payer, but paid instead by donations. The most exhaustive record of Mannings court proceedings and the investigation against WikiLeaks is independent journalist Alexa OBriens site.

The Freedom of the Press Foundation is crowd-funding donations so that a court stenographer can be hired to take transcripts of the trial. Donations are tax-deductable in the US. https://pressfreedomfoundation.org/

The right of public access to the Manning hearings is protected by the First Amendment. Bradley Mannings lawyer was denied access to documents used by the prosecution. Journalists have not been allowed to view the documents filed in the proceedings.

WikiLeaks and Julian Assange have filed several petitions and complaints to the military court in relation to access in the Manning trial.

If Manning is convicted of the aiding the enemy offence, it would set a precedent that disclosing classified information to a publication is akin to communicating with Al Qaeda. The prosecution will call several operatives involved in the summary execution of Osama bin Laden to testify in secret. The prosecution has stated to the court that they would be pursuing this charge even if Manning was alleged to have submitted the information to The New York Times instead. Numerous prominent lawyers and journalists have opposed the pursual of this charge, including the spokesman for the US State Department under Hillary Clinton, PJ Crowley.

The charges against Manning and the potential or existing sealed indictment against Julian Assange carries with it the criminalisation of the news-gathering process and a calculated crippling of the First Amendment. The aiding the enemy charge implies that any press organisation, and any editor, anywhere in the world can be prosecuted for espionage, that is for divulging information that may be read by a person that the US has designated as an "enemy". In practice, this means that any information that is made available by a publisher on the Internet which the US government deems to be harmful to its national security can trigger the criminal prosecution of the publisher, even if it is a foreign publisher.

The US governments attempts to establish that the alleged WikiLeaks source and its publisher engaged in a conspiracy has been re-employed in the case of the US governments espionage subpoena of FOX news reporter James Rosen. The Manning trial and the WikiLeaks investigation marked the beginning of the sharp decline of press freedoms under Obama.

It can be found here.

View original post here:
Bradley Manning Trial FAQ - WikiLeaks

CryptoJunction: Cryptocurrency News, Prices, Charts …

News

Andrey Zamovskiy from Ambisafe has raised his concern on the Ethereum forums about the rising gas price. Ambisafe is a company that created the first live Ehtereum currency, Elcoin and is currently building the next government voting system for Ukraine using the Ethereum blockchain. According to Andrey large-scale decentralized applications need fast confirmation times and

Read More

In the Bitcoin space ASIC miners has dominated the scene since early 2013. ASIC chips vastly improves hash-rate generation and thus becomes more competitive than its counterparts , and . Until now we have only seen ASICs being produced for SHA256d and Scrypt mining algorithms. When it comes to DASH mining the ASIC chips has

Read More

So you have installed your mobile bitcoin wallet from blockchain.info and now you want to learn how to use it. Blockchain.info is an extremely simple application to use. In this tutorials we will go over how it all works and what all buttons and features are for. Type in the 4 digit pin code that

Read More

So you have decided that you want to start use Bitcoin, what a better way to start using bitcoin than on your mobile phone. You can carry it around, pay for day to day stuff and show your friends what this magic internet money really is. Blockchain.info provides a online mobile wallet where you control

Read More

Lisk is a decentralized application and sidechain platform, providing a full stack solution for the most widespread programming language in the world JavaScript. Lisk aims to provide one of the best cryptocurrency user experience with its easily manageable user interface and its integrated Dapp Store. Lisk is prepared to become the de facto standard

Read More

NeuCoin is a decentralized cryptocurrency designed for online microtransactions. NeuCoin aims to reach mainstream adoption by strategically distribute and reward participants in the ecosystem. The cryptocurrency has 2.25 million of initial funding from its founders and strategic angels that will help NeuCoin forge strategic partnerships and drive consumer adoption further. In-App Tipping NeuCoin Value Cykle

Read More

SimpleFX is a robust online trading provider, offering trading with Forex CFDs on Bitcoins, Litecoins, indices, precious metals and energy. With their mission and motto keep it simple! SimpleFX has set out to change the way people trade Forex and cryptocurrency. SimpleFX currently provides over 60 currency pairs with no minimum depostist to be traded

Read More

Poloniex is a cryptocurrency exchange, founded in 2014 and based in Montana, United States. The service is very similar to other cryptocurrency exchanges like Bittrex & Cryptsy as it focuses on altcoins and only offers cryptocurrency exchange options. Currently Poloniex covers more than 170 trading pairs with Bitcoin (BTC) as a base and another 15

Read More

Mining pools are a common tool used by cryptocurrency miners to stabalize and maximize their payouts. What is it like to run one? How much can you make? What are the capital requirements? Co-founder of ProHashing Steve Sokolowski tells all. This video is brought to us by Amanda B. Johnson and TheDailyDecrypt, a Monday to

Read More

It is only in the real world meatspace that we currently work and trade for lifes necessities of food, shelter, clothing, etc. Because in-game currencies and basic virtual reality software/hardware already exist, would sufficient blockchain-based advances enable the transfer of scarce digital property within virtual reality? The video was brought to us by

Read More

If you are into cryptocurrency you probably have heard about Ethereum by now. Ethereum is a decentralized platform that runs smart contracts: applications that run exactly as programmed without any possibility of downtime, censorship, fraud or third party interference. In many ways Ethereum is how the Internet was supposed to work. Free, open and uncensored.

Read More

While many people have some thing to say about Bitcoin, one can simply not portrait or foresee the full picture of what it will become. This can be said about all open source software. Open source code is not a one mind creation. Its ideas and code that is added, subtracted and iterated to be

Read More

MyEtherWallet.com is a Ethereum web wallet developed by kvhnuke and tayvano. The wallet is currently in beta mode and the use of small amounts of Ether is advised. Security Measures & Application Behavior Control Over Your Money The MyEtherWallet.com wallet gives you full control over your Ether. This means no third party can freeze or

Read More

EthereumWallet.com is a Ethereum web wallet developed by kryptokit. The wallet is currently in beta mode and the use of small amounts of Ether is advised. Security Measures & Application Behavior Control Over Your Money The EthereumWallet.com wallet gives you full control over your Ether. This means no third party can freeze or lose your

Read More

BitNation is a decentralized governance platform that provides individuals with common government services ranging from identity (proof-of-existence), voting, business registration, insurance, and dispute resolution. BitNation is built on top of the Bitcoin and uses Bitcoin as the currency for paying for these services. An example where BitNation could be used is in land and ownership

Read More

A decentralized social networking app built on Counterparty.

See more here:
CryptoJunction: Cryptocurrency News, Prices, Charts ...

Edward Snowden – facebook.com

+++ Alle, die fr ihre Freiheit eintreten wollen, bitte einen Moment innehalten und diesen Post lesen! +++

Danke. Leider ist das Interesse fr die Whistleblower, Edward Snowden, Manning und Assenge so gut wie nicht mehr vorhanden. Wir organisieren in Berlin und auch im Rest der Welt eine Kunstaktion, die auf eure tatkrftige Mithilfe angewiesen ist.

Worum geht es? Es geht darum im Zeitraum vom 1. bis zum 2. Mai ein Symbol fr die Freiheit zu schaffen. In Berlin werden drei S...tatuen von den genannten Whistleblowern aus Bronze gegossen auf drei Sthlen stehen, als Zeichen dafr, dass sie aufgestanden sind und sich aus der Masse erhoben haben. Das Motto der Aktion ist ebenso "Mut ist ansteckend"- und das soll es auch sein. Denn der vierte Stuhl ist leer und dient frei fr jeden dazu sich neben die Whistleblower zu stellen und seine Worte zu Freiheit, NSA, Persnlichkeitsrechte, Pressefreiheit etc. loszuwerden oder aber auch nur um kurz die Welt aus einer anderen Perspektive zu sehen. Genauere Informationen werden in den zwei Veranstaltungsgruppen verffentlicht werden. Die eine dient fr alle Orte auer Berlin, die andere fr Berlin, da nur dort die drei Statuen stehen. Wir wollen die Aktion la #WaitingForEd auf andere Lnder und Stdte der Welt ausweiten.

Nun muss ich um eure Hilfe bitten. Ihr knnt mithelfen, indem ihr selber in einer der vielen mglichen Varianten teilnehmt, oder aber mithelfen, die Aktion auf jeder erdenklichen Art und Weise zu verbreiten.

Freiheit ist ein wertvolles Gut und wir mssen zeigen, dass es uns was wert ist. Danke fr deine Zeit.

The rest is here:
Edward Snowden - facebook.com

WikiLeaks – reddit

Follow us on Twitter!

Welcome to r/WikiLeaks. This sub is for all news and questions related to WikiLeaks and their founder, Julian Assange. To the best of our knowledge, none of the posting members or moderators have any connections to WikiLeaks or Assange as this is merely a news and discussion section. Crossposts from other sub-Reddits are more than welcome.

Official and Related Links:

Also, for those who don't know, you can view the most, if not all, of the archives from their original site at the link below.

WikiLeaks Archives

NOTE: Do not post links or how-to tutorials on how to join cyber attacks against those who oppose WikiLeaks. This is counterproductive to the cause, and detours discussion about WikiLeaks and the information they release.

[Custom Blue Slogans] Add a little title or slogan to voice your opinion, show support, or just want a nickname. It will show up after your username on every post in r/WikiLeaks.

Check out These sub-Reddits:

Go here to see the original:
WikiLeaks - reddit

WhatsApp adds end-to-end encryption for all communications …

The Facebook-owned app announced Tuesday that it has added full end-to-end encryption for all communications. That means all text messages, file transfers and voice calls are scrambled en route between users' phones so they can't be intercepted.

The news comes after the bitter public fight between the FBI and Apple over encryption. WhatsApp says its latest move makes it impossible for third parties -- including government agencies, criminals and the company itself -- to peek into users' conversations within the service.

"The desire to protect people's private communication is one of the core beliefs we have at WhatsApp, and for me, it's personal," said Jan Koum, one of the app's founders who was raised in Ukraine under Soviet rule.

"The fact that people couldn't speak freely is one of the reasons my family moved to the United States," he said in a statement.

WhatsApp started introducing end-to-end encryption in 2014, but it's taken until now to extend it to all communications across all devices. Users need to be using the latest version of the app to ensure they benefit from the measure, it said.

Amnesty International called WhatsApp's move a "huge victory" for free speech.

Related: Facebook and WhatsApp might be the next in encryption fight

"Every day we see stories about sensitive records being improperly accessed or stolen. And if nothing is done, more of people's digital information and communication will be vulnerable to attack in the years to come," the WhatsApp statement said. "Fortunately, end-to-end encryption protects us from these vulnerabilities."

By bringing it to the entirety of its vast user base, WhatsApp has made the technology the most widely used cryptographic tool on the planet.

Encryption has become a hot-button issue around the globe. The feud between Apple and the FBI fueled a fierce debate over the tradeoff between individuals' privacy and the demands of law enforcement.

The U.S. Department of Justice asked the tech giant to unlock the iPhone of one of the terrorists involved in the San Bernardino shootings in December.

Apple refused the request and fought a court order ordering it to comply. The company said the demand would force it to create a "backdoor" that could potentially allow the government or hackers break into similar iPhones.

Related: Cellebrite is the FBI's go-to phone hacker

The FBI eventually dropped the case after it managed to get into the iPhone with the help of an unidentified third party. But Apple is opposing similar demands by U.S. federal law enforcement in at least a dozen other active cases.

WhatsApp filed an amicus brief in support of Apple's stance, as did several other major tech firms including Google.

The push to introduce end-to-end encryption has brought the app into conflict with law enforcement.

Brazilian authorities have demanded WhatsApp hand over IP addresses, customer information, geo-location data and messages related to an ongoing drug trafficking case.

WhatsApp says it has been cooperating, but is not able to provide "the full extent of the information law enforcement is looking for" because of the encryption it had already implemented.

A Brazilian judge ordered the service blocked countrywide in December after WhatsApp failed to respond to court orders. The ruling cut off all 100 million Brazilian WhatsApp users for 48 hours before a senior judge overturned it.

CNNMoney (Hong Kong) First published April 5, 2016: 11:59 PM ET

Read this article:
WhatsApp adds end-to-end encryption for all communications ...

A Cryptography Tutorial and Cryptography Introduction

Why Have Cryptography

Encryption is the science of changing data so that it is unrecognisable and useless to an unauthorised person. Decryption is changing it back to its original form.

The most secure techniques use a mathematical algorithm and a variable value known as a 'key'.

The selected key (often any random character string) is input on encryption and is integral to the changing of the data. The EXACT same key MUST be input to enable decryption of the data.

This is the basis of the protection.... if the key (sometimes called a password) is only known by authorized individual(s), the data cannot be exposed to other parties. Only those who know the key can decrypt it. This is known as 'private key' cryptography, which is the most well known form.

OTHER USES OF CRYPTOGRAPHY

Many techniques also provide for detection of any tampering with the encrypted data. A 'message authentication code' (MAC) is created, which is checked when the data is decrypted. If the code fails to match, the data has been altered since it was encrypted. This facility has may practical applications.

OTHER RESOURCES

The Cryptography Management Toolkit is a resource specifically designed to introduce cryptography in detail. It includes presentations, a comprehensive guide book, check lists, source code for common algorithms, and various other items.

More:
A Cryptography Tutorial and Cryptography Introduction

Private matter? Thats rich! Edward Snowden deals Cameron a …

David Cameron has been called out for hypocrisy by NSA whistleblower Edward Snowden after the PM, who has presided over a raft of new surveillance powers, claimed his late-fathers tax affairs are a private matter.

In response, Snowden, who exposed the extent of GCHQ and NSA mass surveillance, tweeted: Oh, now hes interested in privacy.

Leaks suggest Ian Cameron did not pay British taxes on his estate for 30 years.

David Cameron insists he has no shares, no offshore trusts, no offshore funds in the wake of the Panama Leaks, but declined to answer questions about his late fathers business with disgraced law firm Mossack Fonseca.

On Monday evening, campaigners demanded Cameron come clean about his familys assets.

Labour MP Jess Phillips said: If hes not sure then he should find out and rectify it as soon as possible. While tax affairs for ordinary people are a private matter, he is a prime minister who has committed to stamping out tax avoidance.

Whistleblower Snowden also called on other world leaders to take control of their financial assets, tweeting:

With scandals in Russia, China, UK, Iceland, Ukraine, and more, perhaps a new rule: if you're in charge of a country, keep your money in it.

Snowden currently lives in Russia, where he has been granted asylum. He is a critic of the UK governments planned Investigatory Powers Bill, which plans to legalise the mass surveillance of British citizens in the name of national security.

In November 2015 he voiced his opposition to the bill, saying ministers are taking notes on how to defend the indefensible and that the powers would give access to the activity log of your life.

Read the original here:
Private matter? Thats rich! Edward Snowden deals Cameron a ...

Edward Snowden summed up David Cameron’s attitude to the …

Fugitive whistleblower Edward Snowden has perfectly summed up David Cameron's attitude to the Panama Papers revelations.

Yesterday, the Prime Minister wouldn't answer questions over his family's use of tax havens

Mr Cameron's father, Ian, paid no UK duty for 30 years on a firm run from the Bahamas.

When asked if any Cameron cash was hidden in offshore accounts, Downing St replied: Thats a private matter.

But last night, Mr Snowden, who has heavily criticised the UK's push for mass government snooping on emails and browsing histories , pointed out the PM's hypocrisy.

He tweeted, simply: "Oh, now he's interested in privacy."

Mr Cameron's father, who died in 2010, was a director of Blairmore Holdings Inc. The investment fund hired a bishop to allegedly help it avoid paying UK tax .

Furious anti-tax avoidance campaigners and critics last night demanded the PM come clean about his familys riches.

Labour MP Jess Phillips said: If hes not sure then he should find out and rectify it as soon as possible. While tax affairs for ordinary people are a private matter, he is a Prime Minister who has committed to stamping out tax avoidance.

The Live Event you are trying to watch is either unavailable or has not started

Follow this link:
Edward Snowden summed up David Cameron's attitude to the ...

The Radicalisation of Bradley Manning | National Theatre Wales

Today, one day before his 24th birthday, Bradley Manning will start the process that will determine whether he'll celebrate his next 30 birthdays behind bars. I will be watching every minute of this case, because for the past year I have been writing a play entitled The Radicalisation of Bradley Manning for National Theatre Wales.

I have been following Bradley's case since his arrest in May 2010. His story had a heady mix of espionage, geo-politics and cyber-frontierism, but it wasn't until I learned of Bradley's teenage years in Wales that my curiosity turned into obsession. This young soldier who has attempted to call the president of the US as a defence witness knows bus timetables around Haverfordwest. He knows the trials of schoolboy rugby, and speaks rudimentary Welsh. Once I realised this, Bradley became more than a news story.

We had things in common. So reading accounts of his torture in the Quantico Brig haunted me.

While his treatment shocked me, his alleged actions thrilled me. If Bradley is guilty of uploading the information to WikiLeaks then he has courageously reminded us that not only is finance, religion, media, manufacturing and politics transnational, but so is our morality.

At a meeting with NTW to discuss the production of another of my plays, I could not get the young soldier out of my head, and confessed to the theatre that I believed we were doing the wrong play. I had to write about Manning, I told them, and they had to produce it. (It wasn't as finger-snappy as that, of course I did shoe-gaze and apologise a lot.) NTW agreed, and to my eternal gratitude we switched plays.

Read the rest of Tim's Blog on the Guardian website.

Continued here:
The Radicalisation of Bradley Manning | National Theatre Wales

System.Security.Cryptography Namespace

Class Description Aes

Represents the abstract base class from which all implementations of the Advanced Encryption Standard (AES) must inherit.

Provides a Cryptography Next Generation (CNG) implementation of the Advanced Encryption Standard (AES) algorithm.

Performs symmetric encryption and decryption using the Cryptographic Application Programming Interfaces (CAPI) implementation of the Advanced Encryption Standard (AES) algorithm.

Provides a managed implementation of the Advanced Encryption Standard (AES) symmetric algorithm.

Represents Abstract Syntax Notation One (ASN.1)-encoded data.

Represents a collection of AsnEncodedData objects. This class cannot be inherited.

Provides the ability to navigate through an AsnEncodedDataCollection object. This class cannot be inherited.

Represents the abstract base class from which all implementations of asymmetric algorithms must inherit.

Represents the base class from which all asymmetric key exchange deformatters derive.

Represents the base class from which all asymmetric key exchange formatters derive.

Represents the abstract base class from which all implementations of asymmetric signature deformatters derive.

Represents the base class from which all implementations of asymmetric signature formatters derive.

Encapsulates the name of an encryption algorithm.

Encapsulates the name of an encryption algorithm group.

Defines the core functionality for keys that are used with Cryptography Next Generation (CNG) objects.

Specifies a key BLOB format for use with Microsoft Cryptography Next Generation (CNG) objects.

Contains advanced properties for key creation.

Provides a strongly typed collection of Cryptography Next Generation (CNG) properties.

Encapsulates the name of a key storage provider (KSP) for use with Cryptography Next Generation (CNG) objects.

Encapsulates optional configuration parameters for the user interface (UI) that Cryptography Next Generation (CNG) displays when you access a protected key.

Performs a cryptographic transformation of data. This class cannot be inherited.

Accesses the cryptography configuration information.

Contains a type and a collection of values associated with that type.

Contains a set of CryptographicAttributeObject objects.

Provides enumeration functionality for the CryptographicAttributeObjectCollection collection. This class cannot be inherited.

The exception that is thrown when an error occurs during a cryptographic operation.

The exception that is thrown when an unexpected operation occurs during a cryptographic operation.

Defines a stream that links data streams to cryptographic transformations.

Provides additional information about a cryptographic key pair. This class cannot be inherited.

Contains parameters that are passed to the cryptographic service provider (CSP) that performs cryptographic computations. This class cannot be inherited.

Provides the base class for data protectors.

Represents the abstract base class from which all classes that derive byte sequences of a specified length inherit.

Represents the base class for the Data Encryption Standard (DES) algorithm from which all DES implementations must derive.

Defines a wrapper object to access the cryptographic service provider (CSP) version of the Data Encryption Standard (DES) algorithm. This class cannot be inherited.

Provides simple data protection methods.

Represents the abstract base class from which all implementations of the Digital Signature Algorithm (DSA) must inherit.

Provides a Cryptography Next Generation (CNG) implementation of the Digital Signature Algorithm (DSA).

Defines a wrapper object to access the cryptographic service provider (CSP) implementation of the DSA algorithm. This class cannot be inherited.

Verifies a Digital Signature Algorithm (DSA) PKCS#1 v1.5 signature.

Creates a Digital Signature Algorithm (DSA) signature.

Provides an abstract base class that Elliptic Curve Diffie-Hellman (ECDH) algorithm implementations can derive from. This class provides the basic set of operations that all ECDH implementations must support.

Provides a Cryptography Next Generation (CNG) implementation of the Elliptic Curve Diffie-Hellman (ECDH) algorithm. This class is used to perform cryptographic operations.

Specifies an Elliptic Curve Diffie-Hellman (ECDH) public key for use with the ECDiffieHellmanCng class.

Provides an abstract base class from which all ECDiffieHellmanCngPublicKey implementations must inherit.

Provides an abstract base class that encapsulates the Elliptic Curve Digital Signature Algorithm (ECDSA).

Provides a Cryptography Next Generation (CNG) implementation of the Elliptic Curve Digital Signature Algorithm (ECDSA).

Converts a CryptoStream from base 64.

Represents the base class from which all implementations of cryptographic hash algorithms must derive.

Represents the abstract class from which all implementations of Hash-based Message Authentication Code (HMAC) must derive.

Computes a Hash-based Message Authentication Code (HMAC) by using the MD5 hash function.

Computes a Hash-based Message Authentication Code (HMAC) by using the RIPEMD160 hash function.

Computes a Hash-based Message Authentication Code (HMAC) using the SHA1 hash function.

Computes a Hash-based Message Authentication Code (HMAC) by using the SHA256 hash function.

Computes a Hash-based Message Authentication Code (HMAC) using the SHA384 hash function.

Computes a Hash-based Message Authentication Code (HMAC) using the SHA512 hash function.

Represents the abstract class from which all implementations of keyed hash algorithms must derive.

Determines the set of valid key sizes for the symmetric cryptographic algorithms.

Computes a Message Authentication Code (MAC) using TripleDES for the input data CryptoStream.

Provides information for a manifest signature.

Represents a read-only collection of ManifestSignatureInformation objects.

Represents the abstract class from which all mask generator algorithms must derive.

Represents the abstract class from which all implementations of the MD5 hash algorithm inherit.

Provides a CNG (Cryptography Next Generation) implementation of the MD5 (Message Digest 5) 128-bit hashing algorithm.

Computes the MD5 hash value for the input data using the implementation provided by the cryptographic service provider (CSP). This class cannot be inherited.

Represents a cryptographic object identifier. This class cannot be inherited.

Represents a collection of Oid objects. This class cannot be inherited.

Provides the ability to navigate through an OidCollection object. This class cannot be inherited.

Derives a key from a password using an extension of the PBKDF1 algorithm.

Computes masks according to PKCS #1 for use by key exchange algorithms.

Provides methods for encrypting and decrypting data. This class cannot be inherited.

Provides methods for protecting and unprotecting memory. This class cannot be inherited.

Represents the abstract class from which all implementations of cryptographic random number generators derive.

Represents the base class from which all implementations of the RC2 algorithm must derive.

Defines a wrapper object to access the cryptographic service provider (CSP) implementation of the RC2 algorithm. This class cannot be inherited.

Implements password-based key derivation functionality, PBKDF2, by using a pseudo-random number generator based on HMACSHA1.

Represents the base class from which all implementations of the Rijndael symmetric encryption algorithm must inherit.

Accesses the managed version of the Rijndael algorithm. This class cannot be inherited.

Performs a cryptographic transformation of data using the Rijndael algorithm. This class cannot be inherited.

Represents the abstract class from which all implementations of the MD160 hash algorithm inherit.

Computes the RIPEMD160 hash for the input data using the managed library.

Implements a cryptographic Random Number Generator (RNG) using the implementation provided by the cryptographic service provider (CSP). This class cannot be inherited.

Represents the base class from which all implementations of the RSA algorithm inherit.

Provides a Cryptography Next Generation (CNG) implementation of the RSA algorithm.

Performs asymmetric encryption and decryption using the implementation of the RSA algorithm provided by the cryptographic service provider (CSP). This class cannot be inherited.

Specifies the padding mode and parameters to use with RSA encryption or decryption operations.

Decrypts Optimal Asymmetric Encryption Padding (OAEP) key exchange data.

Creates Optimal Asymmetric Encryption Padding (OAEP) key exchange data using RSA.

Decrypts the PKCS #1 key exchange data.

Creates the PKCS#1 key exchange data using RSA.

Verifies an RSA PKCS #1 version 1.5 signature.

Creates an RSA PKCS #1 version 1.5 signature.

Specifies the padding mode and parameters to use with RSA signature creation or verification operations.

Computes the SHA1 hash for the input data.

Provides a Cryptography Next Generation (CNG) implementation of the Secure Hash Algorithm (SHA).

Computes the SHA1 hash value for the input data using the implementation provided by the cryptographic service provider (CSP). This class cannot be inherited.

Computes the SHA1 hash for the input data using the managed library.

Computes the SHA256 hash for the input data.

Provides a Cryptography Next Generation (CNG) implementation of the Secure Hash Algorithm (SHA) for 256-bit hash values.

Defines a wrapper object to access the cryptographic service provider (CSP) implementation of the SHA256 algorithm.

View post:
System.Security.Cryptography Namespace