Search — WikiLeaks War Diaries

Expand acronyms: Take care; definitions may be wrong.

WarDiaries.Wikileaks.org is a website which provides an easy way to search through the Iraq and Afghan War Diaries, which were made public by Wikileaks on 22nd October 2010. The documents are a set of over 391,000 reports which cover the war in Iraq from 2004 to 2009 and Afghanistan from 2004 to 2009.

From here, you can browse through all of the documents that have been released, organized by type, category, date, number of casualties, and many other properties. From any document page, clicking on the green underlined text will open a popup that links to other documents that contain those phrases, making it possible to see important search terms and connections that you might not otherwise notice.

Our hope is that this tool will be helpful to reporters and researchers who are interested in learning more about the US's war in Afghanistan and making sense of this important database. If you wish to support this work, we encourage you to make a donation to wikileaks.

Source code for this website is freely available on github we welcome any contributions, improvements or suggestions.

On to the documents.

Read this article:
Search -- WikiLeaks War Diaries

Edward Snowden: The Untold Story | WIRED

The afternoon of our third meeting, about two weeks after our first, Snowden comes to my hotel room. I have changed locations and am now staying at the Hotel National, across the street from the Kremlin and Red Square. An icon like the Metropol, much of Russias history passed through its front doors at one time or another. Lenin once lived in Room 107, and the ghost of Felix Dzerzhinsky, the feared chief of the old Soviet secret police who also lived here, still haunts the hallways.

But rather than the Russian secret police, its his old employers, the CIA and the NSA, that Snowden most fears. If somebodys really watching me, theyve got a team of guys whose job is just to hack me, he says. I dont think theyve geolocated me, but they almost certainly monitor who Im talking to online. Even if they dont know what youre saying, because its encrypted, they can still get a lot from who youre talking to and when youre talking to them.

More than anything, Snowden fears a blunder that will destroy all the progress toward reforms for which he has sacrificed so much. Im not self-destructive. I dont want to self-immolate and erase myself from the pages of history. But if we dont take chances, we cant win, he says. And so he takes great pains to stay one step ahead of his presumed pursuershe switches computers and email accounts constantly. Nevertheless, he knows hes liable to be compromised eventually: Im going to slip up and theyre going to hack me. Its going to happen.

Indeed, some of his fellow travelers have already committed some egregious mistakes. Last year, Greenwald found himself unable to open a large trove of NSA secrets that Snowden had passed to him. So he sent his longtime partner, David Miranda, from their home in Rio to Berlin to get another set from Poitras, who fixed the archive. But in making the arrangements, The Guardian booked a transfer through London. Tipped off, probably as a result of surveillance by GCHQ, the British counterpart of the NSA, British authorities detained Miranda as soon as he arrived and questioned him for nine hours. In addition, an external hard drive containing 60 gigabits of dataabout 58,000 pages of documentswas seized. Although the documents had been encrypted using a sophisticated program known as True Crypt, the British authorities discovered a paper of Mirandas with the password for one of the files, and they were able to decrypt about 75 pages, according to British court documents. *

Another concern for Snowden is what he calls NSA fatiguethe public becoming numb to disclosures of mass surveillance, just as it becomes inured to news of battle deaths during a war. One death is a tragedy, and a million is a statistic, he says, mordantly quoting Stalin. Just as the violation of Angela Merkels rights is a massive scandal and the violation of 80 million Germans is a nonstory.

Nor is he optimistic that the next election will bring any meaningful reform. In the end, Snowden thinks we should put our faith in technologynot politicians. We have the means and we have the technology to end mass surveillance without any legislative action at all, without any policy changes. The answer, he says, is robust encryption. By basically adopting changes like making encryption a universal standardwhere all communications are encrypted by defaultwe can end mass surveillance not just in the United States but around the world.

Until then, Snowden says, the revelations will keep coming. We havent seen the end, he says. Indeed, a couple of weeks after our meeting, The Washington Post reported that the NSAs surveillance program had captured much more data on innocent Americans than on its intended foreign targets. There are still hundreds of thousands of pages of secret documents out thereto say nothing of the other whistle-blowers he may have already inspired. But Snowden says that information contained in any future leaks is almost beside the point. The question for us is not what new story will come out next. The question is, what are we going to do about it?

*CORRECTION APPENDED [10:55am/August, 22 2014]: An earlier version of this story incorrectly reported that Miranda retrieved GCHQ documents from Poitras; it also incorrectly stated that Greenwald has not gained access to the complete GCHQ documents.

Excerpt from:
Edward Snowden: The Untold Story | WIRED

After Paris Attacks, Heres What the CIA Director Gets …

Slide: 1 / of 1 .

Caption: Getty Images

Its not surprising that in the wake of the Paris terrorist attacks last Friday, US government officials would renew their assault on encryption and revive their efforts to force companies to install backdoors in secure products and encryption software.

Just last month, the government seemed to concede that forced decryption wasnt the way to go for now, primarily because the public wasnt convinced yet that encryption is a problem. But US officials had also noted that something could happen to suddenly sway the public in their favor.

Robert S. Litt, general counsel in the Office of the Director of National Intelligence, predicted as much in an email sent to colleagues three months ago. In that missive obtained by the Washington Post, Litt argued that although the legislative environment [for passing a law that forces decryption and backdoors] is very hostile today, it could turn in the event of a terrorist attack or criminal event where strong encryption can be shown to have hindered law enforcement.

With more than 120 people killed in Paris, government officials are already touting the City of Light as the case against encryption.

In the story about that email, another US official explained to the Post that the government had not yet succeeded in persuading the public that encryption is a problem because [w]e do not have the perfect example where you have the dead child or a terrorist act to point to, and thats what people seem to claim you have to have.

With more than 120 people killed last week in Paris and dozens more seriously wounded, government officials are already touting the City of Light as that case. Former CIA deputy director Michael Morell said as much on CBS This Morning, suggesting that recalcitrant US companies and NSA whistleblower Edward Snowden are to blame for the attacks.

We dont know yet, but I think what were going to learn is that [the attackers] used these encrypted apps, right?, he said on the show Monday morning. Commercial encryption, which is very difficult, if not impossible, for governments to break. The producers of this encryption do not produce the key, right, for either them to open this stuff up or for them to give to governments to open this stuff up. This is the result of Edward Snowden and the public debate. I now think were going to have another public debate about encryption, and whether government should have the keys, and I think the result may be different this time as a result of whats happened in Paris.

CIA Director John Brennan said something similar at a security forum this morning (.pdf).

There are a lot of technological capabilities that are available right now that make it exceptionally difficult, both technically as well as legally, for intelligence and security services to have the insight they need to uncover it, he said. And I do think this is a time for particularly Europe, as well as here in the United States, for us to take a look and see whether or not there have been some inadvertent or intentional gaps that have been created in the ability of intelligence and security services to protect the people that they are asked to serve. And I do hope that this is going to be a wake-up call.

'Intel agencies are drowning in data... It's not about having enough data; it's a matter of not knowing what to do with the data they already have.' EFF Attorney Nate Cardozo

No solid information has come out publicly yet about what communication methods the attackers used to plot their assault, let alone whether they used encryption.

On Sunday, the New York Times published a story stating that the Paris attackers are believed to have communicated [with ISIS] using encryption technology. The papers sources were unnamed European officials briefed on the investigation. It was not clear, the paper noted, whether the encryption was part of widely used communications tools, like WhatsApp, which the authorities have a hard time monitoring, or something more elaborate.

Twitter users harshly criticized the Times story, and it has since disappeared from the site (though it is archived) and the URL now points to a different story, with no mention of encryption.

A Yahoo news story on Saturday added to the theme, declaring that the Paris attacks show that US surveillance of ISIS is going dark. Over the past year, current and former intelligence officials tell Yahoo News, IS terror suspects have moved to increasingly sophisticated methods of encrypted communications, using new software such as Tor, that intelligence agencies are having difficulty penetratinga switch that some officials say was accelerated by the disclosures of former NSA contractor Edward Snowden.

Numerous other news stories have suggested that attackers like the ones who struck Paris may be using a video game network. According to the Daily Mail and others, authorities in Belgium, where some of the attackers were based, have found evidence that jihadis there have been using the PlayStation 4 network to recruit and plan attacks. A source told the paper that they are using it because Playstation 4 is even more difficult to monitor than WhatsApp. The sources didnt indicate if they were speaking specifically about the Paris attackers or about other jihadis in that country. But the fallacy of these statements has already been pointed out in other stories, which note that communication passing through the PlayStation network is not encrypted end-to-end, and Sony can certainly monitor communications passing through its network, making it even less secure than WhatsApp.

US law enforcement and intelligence agencies have been warning for years that their inability to decrypt communication passing between phones and computerseven when they have a warrant or other legal authority to access the communicationhas left them in the dark about what terrorists are planning.

But there are several holes in the argument that forcing backdoors on companies will make us all more secure. While doing this would no doubt make things easier for the intelligence and law enforcement communities, it would come at a grave societal costand a different security costand still fail to solve some of the problems intelligence agencies say they have with surveillance.

1. Backdoors Wont Combat Home-Brewed Encryption. Forcing US companies and makers of encryption software to install backdoors and hand over encryption keys to the government would not solve the problem of terrorist suspects using products that are made in countries not controlled by US laws.

Theres no way of preventing a terrorist from installing a Russian [encryption] app or a Brasilian app, notes Nate Cardozo, staff attorney for the Electronic Frontier Foundation. The US or UK government could mandate [backdoors], but Open Whisper Systems is not going to put in a backdoor in their product period and neither is PGP. So as soon as a terrorist is sophisticated enough to know how to install that, any backdoor is going to be defeated.

Such backdoors also will be useless if terrorist suspects create their own encryption apps. According to the security firm Recorded Future, after the Snowden leaks, its analysts observed an increased pace of innovation, specifically new competing jihadist platforms and three major new encryption tools from three different organizationsGIMF, Al-Fajr Technical Committee, and ISIS. Encryption backdoors and keys also dont help when terrorists stop using digital communications entirely. A 2011 AP story indicated that al-Qaida had long ago ditched cell phones and internet-connected computers in favor of walkie talkies and couriers.

News reports about the Paris attacks have indicated that some of the perpetrators lived in the same town in Belgiumwhich would have made it very easy to coordinate their attack in person, without the need for digital communication.

2. Other Ways to Get Information. The arguments for backdoors and forced decryption often fail to note the many other methods law enforcement and intelligence agencies can use to get the information they need. To bypass and undermine encryption, intelligence agencies can hack the computers and mobile phones of known targets to either obtain their private encryption keys or obtain email and text communications before theyre encrypted and after theyre decrypted on the targets computer.

In the case of seized devices that are locked with a password or encryption key, these devices have a number of security holes that give authorities different options for gaining access, as WIRED previously reported. A story this week pointed to vulnerabilities in BitLocker that would make it fairly easy to bypass the Windows encryption tool. And the leaks of Edward Snowden show that the NSA and British intelligence agencies have a constantly evolving set of tools and methods for obtaining information from hard-to-reach systems.

Were still living in an absolute Golden Age of surveillance, says Cardozo. And there is always a way of getting the data that is needed for intelligence purposes.

3. Encryption Doesnt Obscure Metadata. Encryption doesnt prevent surveillance agencies from intercepting metadata and knowing who is communicating with whom. Metadata can reveal phone numbers and IP addresses that are communicating with one another, the date and time of communication and even in some cases the location of the people communicating. Such data can be scooped up in mass quantities through signals intelligence or by tapping undersea cables. Metadata can be extremely powerful in establishing connections, identities and locating people.

[CIA] Director Brennan gleefully told us earlier this year that they kill people based on metadata, Cardozo says. Metadata is enough for them to target drone strikes. And thats pretty much the most serious thing we could possibly do with surveillance.

Some metadata is encryptedfor example, the IP addresses of people who use Tor. But recent stories have shown that this protection is not foolproof. Authorities have exploited vulnerabilities in Tor to identify and locate suspects.

Tor can make the where a little more difficult, but doesnt make it impossible [to locate someone], Cardozo says. And Tor is a lot harder [for suspects]to use than your average encrypted messaging tool.

4. Backdoors Make Everyone Vulnerable. As security experts have long pointed out, backdoors and encryption keys held by a service provider or law enforcement agencies dont just make terrorists and criminals open to surveillance from Western authorities with authorizationthey make everyone vulnerable to the same type of surveillance from unauthorized entities, such as everyday hackers and spy agencies from Russia, China, and other countries. This means federal lawmakers on Capitol Hill and other government workers who use commercial encryption would be vulnerable as well.

The National Security Council, in a draft paper about encryption backdoors obtained by the Post earlier this year, noted the societal tradeoffs in forcing companies to install backdoors in their products. Overall, the benefits to privacy, civil liberties and cybersecurity gained from encryption outweigh the broader risks that would have been created by weakening encryption, the paper stated.

If all of these arent reason enough to question the attacks on encryption, there is another reason. Over and over again, analysis of terrorist attacks after the fact has shown that the problem in tracking the perpetrators in advance was usually not that authorities didnt have the technical means to identify suspects and monitor their communications. Often the problem was that they had failed to focus on the right individuals or share information in a timely manner with the proper intelligence partners. Turkish authorities have already revealed that they had contacted French authorities twice to warn them about one of the attackers, but that French authorities never got back to them until after the massacre in Paris on Friday.

Officials in France indicated that they had thwarted at least six other attack plots in recent months, but that the sheer number of suspects makes it difficult to track everyone. French intelligence maintains a database of suspected individuals that currently has more than 11,000 names on it, but tracking individuals and analyzing data in a timely manner to uncover who poses the greatest threat is more than the security services can manage, experts there have said. Its a familiar refrain that seems to come up after every terrorist attack.

If Snowden has taught us anything, its that the intel agencies are drowning in data, Cardozo says. They have this collect it all mentality and that has led to a ridiculous amount of data in their possession. Its not about having enough data; its a matter of not knowing what to do with the data they already have. Thats been true since before 9/11, and its even more true now.

Read this article:
After Paris Attacks, Heres What the CIA Director Gets ...

Why I Keep Fighting – huffingtonpost.com

(As read by Aaron Kirkhouse -- May 9, 2016)

Good evening from sunny Fort Leavenworth, Kansas.

I wish I could be there to accept this award in person, but since I cannot, I am delighted to have Aaron Kirkhouse accept it on my behalf.

As you know, I am held in an American military prison with only a small library and without access to the internet. In this time of rapid technological advances in social networking and the machine learning age, it's quite an odd predicament to find myself in.

Today, when once obscure online refrains are now finding their way into the global lexicon -- "pics or it didn't happen" -- it's easy to feel disconnected from a world exponentially intertwined and dependent on technology.

As a military prisoner, my public persona is carefully controlled and enforced. Any interviews or statements that I make -- such as this one -- must be written or dictated through someone else who types it up on my behalf. I am not allowed to be recorded over the telephone, do any video interviews, or have any pictures taken -- with the exception of the occasional grainy mug shot. For those living in my situation, it's easy to start feeling invisible -- left behind and dismissed by the rest of a fast-paced society.

Despite these obstacles, I know I need to keep going. It is important to stay vocal. To stay creative. Active. Motivated. To keep fighting.

I keep fighting to survive and thrive. I am fighting my court-martial conviction and sentence before a military appeals court, starting this month. I am fighting to make the full investigation by the FBI public. I am fighting to grow my hair beyond the two-inch male standards by the U.S. military.

I keep fighting to warn the world of the dangerous trend in which the only information you can access is the kind that someone with money or power wants you to see.

And, I keep fighting to let people know that they too can create change. By staying informed and educated, anyone can make a difference. You have the ability to fight for a better world for everyone -- even for the most desperate, those at the bottom of the social ladder, refugees from conflict, queer and trans individuals, prisoners, and those born into poverty.

Thank you all so very much for your support over the years, and thank you to Lady Hollick, Mr. Davis, and Dr. Dreyfus for selecting me to be the first person to receive this award. It is truly an an amazing treat. I'm honored that my voice continues to be heard. Thank you for all for listening and choosing to fight alongside me. And of course, thank you to Aaron Kirkhouse for accepting this award for me.

I am grateful to you all -- for being here tonight, and being there for me tomorrow. Think what we might accomplish if we do one thing -- perhaps a grand undertaking or even what may seem to be a tiny, insignificant gesture -- each day with the simple goal of making the world a better place.

Aaron Kirkhouse (above) accepting the Blueprint Enduring Impact Whistleblowing Prize on Chelsea Manning's behalf.

This piece originally appeared on Chelsea Manning's Medium blog.

View post:
Why I Keep Fighting - huffingtonpost.com

Edward Snowden won’t say hello to Allo – CNET

James Martin/CNET

Edward Snowden has joined a growing group of privacy experts criticizing Google for not integrating end-to-end encryption as a default feature in its new Allo messaging app. In a tweet the NSA whistleblower called Allo "dangerous" and warned his followers against using it for now.

Allo has an incognito mode that promises end-to-end encryption through the popular Signal messaging protocol, but it has to be manually switched on for specific conversations. And to use Allo's Smart Reply feature, which allows the app to read your messages and suggest possible replies, you'll have to disable incognito mode completely.

Allo, which Google announced at the I/O developer conference this week, is Google's answer to messaging apps such as WhatsApp and comes with added personal-assistant features. WhatsApp also uses Signal for encryption, but Signal is baked into the app for all conversations from the start.

Google didn't immediately respond to a request for comment.

The rest is here:
Edward Snowden won't say hello to Allo - CNET

Chelsea Manning Appeals Conviction, Calls Sentence …

After being sentenced to 35 years in prison for leaking a trove of some 700,000 government documents to Wikileaks,Chelsea Manningis appealing her convictionand calling the sentence grossly unfair and unprecedented.

No whistleblower in American history has been sentenced this harshly, Mannings attorneys write in their appeal brief. Throughout trial the prosecution portrayed PFC Manning as a traitor and accused her of placing American lives in danger, but nothing could be further from the truth.

The prosecution, they write, sought to make an example of her, and the overzealous nature of the prosecution made the trial unmanageable, confused the military judge, and caused a myriad of errors.

They argue that a 10-year sentence would be more appropriate as it will adequately punish her, deter others, and allow her to receive the treatment and care she needs.

The ACLU filed a separate brief saying that Mannings prosecution was separately unconstitutional because the military judge overseeing the trial barred Manning from asserting any defense on the basis that the information she disclosed was in the public interest, according to The Guardian (where Manning was brought on as a contributing writer in Feb. 2015).

The Open Society Justice Initiative (OSJI) filed another brief arguing that Mannings overall motive was to advance the public interest and the public interest value of some of the disclosures justifies mitigation of the sentence.

In an op-ed published in theNew York Times in June 2014, Manning defended her decision to leak the cablesregarding the wars in Afghanistan and Iraq, writing,I believe that the current limits on press freedom and excessive government secrecy make it impossible for Americans to grasp fully what is happening in the wars we finance.

[image via wikicommons]

Visit link:
Chelsea Manning Appeals Conviction, Calls Sentence ...

Bitmon – Bitcoin and cryptocurrency mining monitor service

Bitmon monitors your mining workers around the clock and notifies you as soon as a worker starts to perform badly or stops completely.

You are able to set an individual hashrate threshold for every mining pool worker you have and are notified as soon as a drop in hashrate is detected.

All the common mining pools like CEX, Slush's Pool, Multipool, Bitminter etc. are supported with more being added continuously, and Bitmon supports all the cryptocurrenies like Bitcoin, Litecoin, Dogecoin etc. in addition, fiat currencies like USD, CAD, DKK etc. used by those mining pools.

View the list of supported mining pools, cryptocurrencies and fiat currencies.

Monitoring your mining pools enables Bitmon to generate great reports that include your mining yield, broken down for each mining pool.

In the reports is also a calculated fiat value based on the latest exchange rate.

The report is available in a daily and weekly interval.

Go here to see the original:
Bitmon - Bitcoin and cryptocurrency mining monitor service

Chelsea Manning files appeal against ‘grossly unfair’ 35-year …

Chelsea Manning, 28, was convicted in 2013 of multiple crimes for passing an estimated 700,000 documents to WikiLeaks, Photograph: AP

Chelsea Manning has formally appealed against her conviction and 35-year prison sentence for leaking a huge cache of government documents, arguing that her punishment was grossly unfair and unprecedented.

Describing the sentence as perhaps the most unjust sentence in the history of the military justice system, attorneys for Manning complained that she had been portrayed as a traitor to the US when nothing could be further from the truth.

No whistleblower in American history has been sentenced this harshly, states the appeal, which also alleges that Manning was excessively charged and illegally held while awaiting trial in conditions amounting to solitary confinement. It suggests that her sentence be reduced to 10 years.

The appeal sharply contrasts the governments punishment of Manning with the two years probation given to David Petraeus, the retired military commander and CIA director, who admitted giving classified information to his biographer, with whom he was having an extramarital affair. While Manning was a whistleblower, Petraeus apparently disclosed the materials for sex, say Mannings attorneys.

Manning, a 28-year-old former US army private, was convicted in 2013 of multiple crimes for passing an estimated 700,000 documents to WikiLeaks, the anti-secrecy group. The cache included diplomatic cables and reports on the wars in Iraq and Afghanistan.

Attorneys for Manning filed the appeal documents on Wednesday to the US army court of criminal appeals at Fort Belvoir, Virginia. The documents were made public on Thursday after being reviewed by officials for possible redaction of classified material. Manning, a transgender woman previously known as Bradley, is serving her sentence at the Fort Leavenworth military base in Kansas.

Manning disclosed the materials because under the circumstances she thought it was the right thing to do, said the appeal brief. She believed the public had a right to know about the toll of the wars in Iraq and Afghanistan, the loss of life, and the extent to which the government sought to hide embarrassing information of its wrongdoing.

Mannings appeal said her sentence was unfairly inflated by the military judges misreading of relevant laws and by overzealous prosecutors deciding to charge her with more severe crimes than the mishandling of classified information, to which she admitted.

She was initially charged with stealing or converting databases, despite the original records remaining intact. But stealing or converting photocopies of documents within a filing cabinet is not the same as stealing the filing cabinet itself, Mannings attorneys argued. The government later amended these charges but only after each side had presented its case.

The appeal also claimed the sentence also did not take into account the time she served in deplorable and inhumane conditions of confinement before her trial, which are described as unconstitutional and sufficient grounds for dismissing the charges altogether.

Mannings attorneys requested that she be credited 10 days of time served for every day she spent in these outrageous and completely unjustified pretrial conditions, which would effectively wipe out seven years of the total sentence.

The appeal urged authorities to consider the context of Manning suffering from mental health problems and stress, which it blames on her inability to live openly as a transgender woman in the US military. The governments litigation strategy was to ignore all of this, and to instead make an example of her, it said.

Related: When will the US government stop persecuting whistleblowers? | Chelsea Manning

In a simultaneously filed brief supporting Mannings appeal, the American Civil Liberties Union said the Espionage Act used to convict Manning was unconstitutionally vague because it allows the government to subject speakers and messages it dislikes to discriminatory prosecution.

The ACLU said Mannings prosecution was separately unconstitutional because the military judge overseeing the trial barred Manning from asserting any defense on the basis that the information she disclosed was in the public interest.

A war against whistleblowers is being waged in this country and this case represents how this country treats anyone who reveals even a single page of classified information, Nancy Hollander, one of Mannings attorneys, said in a statement. We need brave individuals to hold the government accountable for its actions at home and abroad and we call upon this court to overturn the dangerous precedent of Chelsea Mannings excessive sentencing.

In another brief backing Manning, the Open Society Justice Initiative (OSJI) said her overall motive was to advance the public interest and the public interest value of some of the disclosures justifies mitigation of the sentence.

In support of this argument, the brief quoted the Guardians former investigations editor David Leigh and John Kerry, now the US secretary of state, who as chairman of the Senate foreign relations committee said that disclosures within the Afghan war logs leaked by Manning raise serious questions about the reality of Americas policy toward Pakistan and Afghanistan.

The OSJI brief also argued that Mannings sentence was far higher than the penalties that our closest allies would consider proportionate. The brief featured a survey of 30 such countries that pointed to a maximum 14-year sentence in Canada as the next stiffest penalty for a comparable conviction.

Read the original post:
Chelsea Manning files appeal against 'grossly unfair' 35-year ...

Chelsea Manning Appeals "Unprecedented" Conviction

Lawyers for Chelsea Manning appealed her conviction on Thursday, calling it grossly unfair and unprecedented and arguing that no whistleblower in American history has been sentenced this harshly.

Manning was convicted of six counts of espionage by a military court in 2013 and is currently serving a 35-year sentence in military prison.

In January 2010, while serving as an Army intelligence analyst overseas, Manning then known as Bradley sent hundreds of thousands of documents about the Iraq and Afghanistan wars to WikiLeaks. The documents revealed dramatically higher numbers of civilian casualties than were publicly reported and featured a video of Apache attack helicopters in Baghdad gunning down two Reuters journalists.

Manningstreatment in military court came under fire from journalists and free speech advocates. Because she was indicted under the Espionage Act, shewas not allowed to raise the public interest value of her disclosures as a defense.

In the 209-page legal brief made public on Thursday, lawyers for Manning questioned the testimony of military officials at her trial, arguing that their claims of harm were speculative and provided no indication of actual harm, which they said had a highly prejudicial effect on the trial.

The American Civil Liberties Union filed an amicus briefarguing that applying the Espionage Act to whistleblowers is unconstitutional and furnishes the government with a tool for selective prosecution.

The ACLU brief cites the example of Gen. David Petraeus, a former Army general and CIA director, who gave eight notebooks filled with classified information to his biographer, who he was sleeping with. Petraeus was not charged under the Espionage Act,accepted a plea deal for two years probation and a $100,000 fine, and kept his security clearance.

NSA whistleblower Edward Snowden has cited Mannings treatment and trial as a key reason for not returning to the United States.

[Disclosure: First Look MediaWorks, Inc.,publisher of The Intercept, made a $50,000 matching-fund donation to Chelsea Mannings legal defense fund through its Press Freedom Litigation Fund, andGlenn Greenwald, a founding editor of The Intercept, donated $10,000.]

Read more:
Chelsea Manning Appeals "Unprecedented" Conviction

Encryption – UCSD Mathematics

Encryption is a method of hiding data so that it cannot be read by anyone who does not know the key. The key is used to lock and unlock data. To encrypt a data one would perform some mathematical functions on the data and the result of these functions would produce some output that makes the data look like garbage to anyone who doesn't know how to reverse the operations. Encryption can be used to encrypt files that the owner feels are too sensitive for anyone else to read. And now, with the rise of the Internet, encryption is used to encrypt data, like a credit card number, and then send it across the net. This way no one can read intercept and read the data while it is traveling through the web. The recipient of the data does have to know how to decrypt the information or else the data will look like garbage to the recipient too.

There are two categories of encryption, private key and public key. The major difference is who knows the key. Encryption is an entirely mathematical process applied to the world of computers. The only thing an encryption program will do is take in data, perform some predefined mathematical operations on the data, and then output the result. Decryption is the process of taking the encrypted data, that now looks like garbage, and reverse the mathematical functions so that the result is the same data that originally existed before the encryption process. The "key" is the set of mathematical operations and values that are used to encrypt and decrypt the data. Encryption and decryption algorithms describe the mathematical operations while key describes the exact process which includes the algorithms and any other random initial values that are used in the algorithms. Lets first look at private key encryption and how it works.

PRIVATE KEY ENCRYPTION

What private key means is that the same method is used to encrypt and decrypt. If someone knows what method was used to encrypt the message then that person can decrypt the message. Thus, the key must be kept private. Only the person sending the data and the person receiving the data should know the key. Private key cryptography, also known as symmetric cryptography since the encryption and decryption processes are just opposites, is an encryption method where the encryption algorithm is known before hand by the sender and the recipient. Accordingly, the two users must communicate beforehand and agree on the algorithm and the key so that the recipient can decode the message. A very simple example of private key cryptology is to take the text that is to be sent across the Internet and use the next letter in the alphabet in place of the original letter. Then send the scrambled text across the Internet. The person receiving the text would have to know how the message he receives is scrambled so that he can unscramble it. Thus, the "key" being used in this example is, 'use the next letter in the alphabet.'

With this key the text, "hi rob" would become, "ij spc". Since the recipient of the message knows the key, that person will take the message he received and take the previous letter in the alphabet. The person would receive the message, "ij spc," and using the previous letter that person would recover, "hi rob." This example is much simpler than the private key encryption algorithms used today, but it illustrates the fact that in private key encryption the encryption and decryption processes are just the reverse of each other

Private key encryption has the benefits of being very fast in that the computer programs that will perform the encryption and decryption will finish executing in a very short amount of time. The more complex the key the longer the process takes. However, even the most complex private keys algorithms can encrypt and decrypt data faster than that of public key cryptology. A disadvantage to private key cryptography is that the key must be communicated before hand. You would have to tell me exactly how you were going to encrypt the messages that you will send to me so that I could recover the original message later.. You could not encrypt this information as I wouldn't know the key yet. In a large organization or over the Internet it is easy for these keys to become compromised because they have communicated, without using encryption, before the actual encryption takes place.

PUBLIC KEY ENCRYPTION

Public key cryptography (asymmetric) was created to eliminate the shortcomings of private key cryptography. The biggest advantage of public key cryptography is that no prior communication needs to take place between the recipient and the sender.

Public key cryptography works like this, everyone has two keys, a public key, which the entire world has access to, and a private key, which only the owner knows. Note that the private key referred to here is completely different than the private key used in private key cryptography. For lack of a better name the secret key in public key cryptography is called a private key. These two "keys" are much different form the "keys" used in private key cryptography. In fact both keys used in public key cryptography are just very large integers, on the order of 300 digits long. With public key cryptography there is only one algorithm that is in use, that algorithm is know as the RSA algorithm. The RSA algorithm is the only algorithm that will be used to encrypt and decrypt data.

The algorithm works by taking in some data, and then using one of the keys which is a large number, and using the key to perform modulo and exponential functions on the data. The result is a message so scrambled that no amount of statistical analysis could break the code. The beauty of RSA is that a message encrypted with a public key can be decrypted with the corresponding private key and a message encrypted with a private key can be decrypted with the corresponding public key. For this reason RSA is know as asymmetric cryptography, different algorithms are used to decrypt and encrypt data. The algorithm is actually just a very complex mathematical identity. Thus, person X can encrypt a message with person Ys public key and only person Y can decrypt the message using his private key, this is the process used to encrypt e-mail. More importantly, if I had a public and private key, and only I know my public key, I could encrypt a message using my private key and everyone could decrypt the message using my public key. If my public key successfully decrypts the message you can be sure that I sent it because the message could have only been created with my private key. The reason it could have only been created with my private key is that my public key was used to decrypt the message. By decrypting the message with my public key you know only my private key created it. This works as long as only I have access to my private key. The process described here is known as a digital signature because by creating a message that only I could have created I am effectively signing the message.

Like private key cryptography the encryption and decryption process must reverse each others actions, but the difference lies in that there are two different numbers and two different algorithms used. One number is the public key and the other number is the private key. These numbers are used in the two different algorithms one to encrypt a message and one to decrypt a message. The important aspect of RSA and public key cryptography is that no prior communication has to take place before a message is sent. If you receive a message encrypted with RSA and your public key you have all the information you need to decrypt the message. RSA does have some disadvantages however, since the numbers used are so large the amount of time it takes to encrypt or decrypt is a lot longer than private key cryptography.

What you should understand now is that there are two methods of encryption, private key and public key, each with its own advantages and disadvantages. You should also understand the concept of a digital signature as this will be used later to prove identity.

To go back to main page click here or to proceed to the page describing digital certificates, click here

Read the original here:
Encryption - UCSD Mathematics