Media ought to discover motives of WikiLeaks’ Vault 7 whistleblower – The Guardian

The CIA headquarters in Langley, Virginia, US. Photograph: Dennis Brack/EPA

In any big data leak story, the why? and the who? tend to matter as well as the what? We need to remember the horrors of the Afghan war that sent Chelsea Manning to WikiLeaks and the disgust over unmonitored mass surveillance that made up Edward Snowdens mind for him. In sum, the ideals of the whistleblower matter too, and so does the social purpose fulfilled (as when America, for example, cleaned up its act after Snowden).

What, then, about Vault 7, the 10,000 or so CIA documents revealed via WikiLeaks last week (many of them, in the nature of things, as yet unread)? What was the leaker so exercised about? TV sets secretly monitoring the front parlour, a kind of Gogglebox in reverse?

This may be a moment when anger at privacy lost finally ignites (Ewen MacAskill in the Guardian), or when public opinion shrugs benignly and thinks the security agencies are just doing their job. But inevitably we also need to know more about who leaked it, and why.

WikiLeaks vaults tossed into a political campaign by a foreign power clearly dont pass muster (whoever the leaks are directed against). Simple document dumps in Assange mark 2 mode arent defensible either.

Perhaps the Vault 7 whistleblower had a particular outrage in mind? Perhaps he or she was just playing wrecker or serving some covert master? And those, increasingly, are questions for the media to ask as well. What the blanks going on here?

Read this article:
Media ought to discover motives of WikiLeaks' Vault 7 whistleblower - The Guardian

Pamela Anderson defends ‘sexy’ WikiLeaks founder Julian Assange in essay – USA TODAY

Pamela Anderson has penned a passionate defense of Julian Assange.(Photo: Kirsty Wigglesworth/AP, Foc Kan/WireImage)

Here's a twosome you may not have been expecting.

Pamela Anderson, 49,has penned a passionate defense of WikiLeaks founder Julian Assange, 45, calling him both"the most intelligent, interesting, and informed man in existence" and "quite sexy" to boot.

The actress, who has saidshe met Assange through designer Vivienne Westwood,has been spotted visiting the WikiLeaks founderat the Ecuadorian Embassy in London, where he has been holed upfor four years, even bringing him a vegan lunch in October.

"Yes- I think he's quite sexy," Anderson wrote in a March 9blog post on her website. "He has tremendous strength and stamina though vulnerable. Hard to imagine him that way as capable as he is. But, he is up against the biggest super powers in the world. I've spent enough time with him, to be absolutely sure of his intentions. They are good ones."

And on Feb 27, she wrote: "I have had more stimulating conversation with this man than all my ex-husbands and lovers combined."

Assange sought political asylum inJune 2012 after a European arrest warrantwas issued against him by Swedish authorities. Two women accused him of intentionally taking off or tampering with condoms, without consent, during sex.

Assange denies the rape allegation. He faces arrest by British police if he leaves the embassy before the statute of limitation runs out on the remaining charges in 2020.

Anderson calls the rape allegations levied against Assange "defamation," arguing,"There is no rape. It is a case of condom or not. It is ridiculous." She continues: "It is complex and there are powerful people trying to control the outcome."

Anderson closes her essay by saying: "I will always stand by My Julian ..."

In a February radio interview, Assange called Anderson "an attractive person with an attractive personality and whip smart" but declined to confirm a romantic relationship.

On Tuesday, WikiLeaks publishedthousands of documents it says detailCIA tools for hacking into web servers, computers, smartphones and even TVs that can be turned into covert microphones.

The Trump administrationrefused to confirm or deny the authenticity of the leaks.

Read or Share this story: http://usat.ly/2mdR6Pu

Read the original:
Pamela Anderson defends 'sexy' WikiLeaks founder Julian Assange in essay - USA TODAY

The good and bad of Wikileaks’ Vault 7 dump – Android Central


Android Central
The good and bad of Wikileaks' Vault 7 dump
Android Central
On Tuesday (March 7, 2017 if you're reading from the future) Wikileaks released the Vault 7 CIA files. These dumped a ton of information along with some Tweets about how journalists were supposed to be afraid that the CIA has tapped into everyone's ...

and more »

See original here:
The good and bad of Wikileaks' Vault 7 dump - Android Central

WikiLeaks’ CIA dump makes the Russian hacking story even murkier if that’s possible – Salon

Russia hacked the election. Russia didnt hack the election. Russia sort of, maybe, possibly hacked the election.

Is your head spinning from this story yet?

The latest WikiLeaks disclosures concerning the CIAs hacking abilities has further complicated the hall of mirrors that is the Russian hacking story. The Vault 7 leaks are believed to be authentic and reveal a few uncomfortable truths about the overreach of U.S. intelligence agencies.

Reactions to the leaks have varied from those who think they could be more significant than the Edward Snowden revelations to those who think its all a bit of a non-story. Basically, its a pretty clear split between those who regard WikiLeaks editor Julian Assange as a trustworthy whistleblower and those who regard him as a tool of the Kremlin.

Among other things, the leaks revealed that the U.S. government is essentially paying out to exploit the vulnerabilities in software without telling companies and, disturbingly, that they could be using your iPhone or Samsung TV as a microphone even when its supposedly switched off.

One of the most interesting disclosures concerns how the CIA can cover its tracks by leaving electronic trails suggesting the hacking is being done in different places notably, in Russia. In fact, according to WikiLeaks, theres an entire department dedicated to this. Its job is to misdirect attribution by leaving false fingerprints. If youve been at all skeptical about the recent levels of Russia-related hysteria, promoted heavily by U.S. intelligence agencies, alarm bells are probably going off in your head.

Keeping these tactics in mind, the evidence presented to prove that Russia hacked the Democratic National Committee in an effort to throw the presidential election to Donald Trump becomes flimsier than it was before. And it was pretty flimsy to begin with.

Recall, for example, that cybersecurity firm CrowdStrike conveniently concluded within one day that the Russian government was behind the attack on the DNC servers. I say conveniently, because the DNC paid for CrowdStrikes services and its fair to say the DNC had an unhealthy fixation on all things Russia for the duration of the election cycle.

The evidence provided by CrowdStrike included the fact that malware found on DNC servers was the same as malware believed to be used by Russian intelligence units, that metadata files included information in Cyrillic text, and that emails had been sent using the Russian email service Yandex. In other words, it was nothing the CIA couldnt have done itself in order to misdirect attribution. Whats more, CrowdStrike actually admitted that it deliberately left outevidence that didnt support its claims that Russia was responsible.

FireEye, a competitor of CrowdStrike, made similar claims on thin evidence. The hackers, they explained, appeared to cease operations on Russian holidays, and their work hours seem to align with the UTC +3 time zone, which contains cities such as Moscow and St. Petersburg.

In a thorough and thought-provoking piece on Russian hacking, investigative journalist Yasha Levine picks this evidence apart:

So, FireEye knows that these two APTs [Advanced Persistent Threats] are run by the Russian government because a few language settings are in Russian and because of the telltale timestamps on the hackers activity? First off, what kind of hacker especially a sophisticated Russian spy hacker keeps to standard 9-to-5 working hours and observes official state holidays? Second, just what other locations are in Moscows time zone and full of Russians? Lets see: Israel, Belarus, Estonia, Latvia, Moldova, Romania, Lithuania, Ukraine. If non-Russian-speaking countries are included (after all, language settings could easily be switched as a decoy tactic), that list grows longer still: Greece, Finland, Turkey, Jordan, Lebanon, Syria, Iraq, Saudi Arabia, Somalia, Yemen, Ethiopia, Kenya the countries go on and on.

This is forensic science in reverse, Levine writes. First you decide on the guilty party, then you find the evidence that confirms your belief.

Does any of this mean that Russia is not actually hacking or attempting to hack American institutions and agencies? Of course not. All major powers dedicate huge amounts of time and resources to hacking each other, pretty much on a constant basis. Its highly doubtful that hacking ceases on national holidays. The question is whether Russia is actually responsible in the instances described by firms like CrowdStrike and FireEye.

The Vault 7 leaks are not exactly a smoking gun for those who maintain Russias innocence where the DNC hacks and leaks are concerned but theyre not insignificant either. If anything, the new leaks should make people think a little harder before putting their complete trust in the CIAs public conclusions about the acts (or alleged acts) of enemy states.

On the other hand, for those who still believe Russia is responsible for the DNC hack, the latest WikiLeaks dump could also easily have confirmed their beliefs. Russia is the only country specifically named by WikiLeaks as a potential victim of these misdirected attribution tactics. This will heighten suspicions that U.S. intelligence agencies have in some way been infiltrated by Russia to facilitate the leaks of damaging (but true) information. It will confirm, for some observers, that WikiLeaks is in Vladimir Putins pocket.

Personally, given that WikiLeaks has an impeccable record in terms of the authenticity of the material it releases, Im inclined to disagree with the analysis that paints Assange as a Kremlin stooge. What we really need to be skeptical about is the way these stories are framed and promoted by both government agencies and media. The fact that the CIA an organization of professionals trained in the most sophisticated methods of deception is front and center promoting the idea that Assange is a Russian agent, should be enough for anyone to take that idea with a pinch of salt.

The Russia story has turned into a game of pick your favorite conspiracy theory but what we label as conspiracy theory is most often whatever we find unpalatable to our built-in biases. We go around looking to confirm our own theories by seizing on the evidence that matches our ideas of how things are. No one is immune to this.

What we should work toward is a better awareness of these tendencies. If journalists can do that and they should perhaps they can begin to employ more exacting standards to their investigations and reporting. Maybe then we can come a little closer to determining the real truth, rather than the truth as we would like it to be.

Original post:
WikiLeaks' CIA dump makes the Russian hacking story even murkier if that's possible - Salon

FBI prepares for new hunt for WikiLeaks’ source – Washington Post

The FBI has begun preparing for a major mole hunt to determine how anti-secrecy group WikiLeaks got an alleged arsenal of hacking tools the CIA has used to spy on espionage targets, according to people familiar with the matter.

The leak rattled government and technology industry officials, who spent Tuesday scrambling to determine the accuracy and scope of the thousands of documents released by the group. They were also trying to assess the damage the revelations may cause, and what damage may come from future releases promised by WikiLeaks, these people said.

It was all a familiar scenario for a government that has repeatedly seen sensitive information compromised in recent years.

In the wake of revelations from Army private Chelsea Manning and former National Security Agency contractor Edward Snowden, officials sought to tighten security procedures, and federal agents came under greater pressure to find and prevent secrets from spilling out of the government.

But cracks keep appearing in the system. Last year, the FBI arrested Harold T. Martin III, an NSA contractor who took home documents detailing some of the agencys most sensitive offensive cyberweapons. Some of those files later appeared online, although investigators are still trying to determine Martins role, if any, in that part of the case.

(Dalton Bennett,Greg Miller/The Washington Post)

He has pleaded not guilty to charges that he violated the Espionage Act. Officials call the Martin case the largest theft of classified information in U.S. history.

Now, less than a year after the Martin case, U.S. intelligence agencies are rushing to determine whether they again have suffered an embarrassing compromise at the hands of one of their own.

Anybody who thinks that the Manning and Snowden problems were one-offs is just dead wrong, said Joel Brenner, former head of U.S. counterintelligence at the office of the Director of National Intelligence. Ben Franklin said three people can keep a secret if two of them are dead. If secrets are shared on systems in which thousands of people have access to them, that may really not be a secret anymore. This problem is not going away, and its a condition of our existence.

In Silicon Valley, industry figures said they received no heads-up from the government or the hacking community that such a move by WikiLeaks was in the works. By midday Tuesday, industry officials said they still had not heard from the FBI.

It wasnt immediately clear if the CIA had sent a crimes report to the Justice Department a formal mechanism alerting law enforcement of a potentially damaging and illegal national security leak. Such a report would offer the FBI a road map for where to begin investigating, and whom to question.

The FBI and CIA both declined to comment.

Once investigators verify the accuracy of the WikiLeaks documents, a key question to answer is who had access to the information, according to veterans of past leak probes. The FBI has spent years investigating WikiLeaks, and authorities are eager to figure out whether it has recruited a new, well-placed source from the U.S. government.

In releasing thousands of pages of documents, WikiLeaks indicated that its source was a former government employee or contractor.

This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA, WikiLeaks said in announcing the first release of documents. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

One former intelligence official said if that claim is accurate, theres going to be another major mole hunt ... If this is all correct, its a big deal.

A key distinction for investigators will be whether WikiLeaks reveals the actual computer code or enough details about such code that others can develop and deploy some of the hacking tools, according to current and former officials.

The security failures highlighted by damaging leaks from Snowden and Manning have proven difficult to address.

Manning was arrested in Iraq in May 2010 after transmitting documents to WikiLeaks that came to be known as the Iraq and Afghanistan War Logs. She also leaked a video showing a U.S. Apache helicopter in Baghdad opening fire on a group of people that the crew thought were insurgents. Among the dead were two journalists who worked for Reuters. She also leaked documents pertaining to Guantanamo Bay prisoners, as well as 250,000 State Department cables.

In response to the Manning case, the Obama administration created the National Insider Threat Task Force, designed to teach and train government workers and contractors to spot potential leakers.

Manning, formerly known as Bradley Manning, came out as transgender after her 2013 conviction. In the waning days of his presidency, Barack Obama commuted her 35-year prison sentence, and she is due to be released in coming months.

The post-Manning efforts did not stop Snowden from taking reams of data about sensitive bulk intelligence collection in 2013 and giving the material to reporters. Those revelations, including a court document showing how the government gathered Americans phone records, sparked years of political debate about privacy and government surveillance in the digital age.

Snowden has remained out of reach of the U.S. government, living in Russia.

Brenner, the former counterintelligence official, said the net effect of the new leaks could be very dangerous to us, because they accelerate the leveling of the playing field between the United States and its adversaries in cyberspace.

The bigger lesson of the newest leak, Brenner argued, is that U.S. pursuit of dominance in cyberspace may actually be destabilizing over the long run. That is a very unsettling debate for our military and our intelligence services, but I think its coming, he said.

Snowden also weighed in regarding the alleged CIA documents, tweeting: What @Wikileaks has here is genuinely a big deal. Looks authentic.

See original here:
FBI prepares for new hunt for WikiLeaks' source - Washington Post

DeSantis town hall: Rep reiterates support for repealing ACA but still seeks costs savings – St. Augustine Record

Health care was the hot topic at a town hall held on short notice Saturday by Rep. Ron DeSantis at Pedro Menendez High School. Town halls around the nation since President Donald Trumps election and the announcement of the Affordable Care Act replacement have been contentious this one being no exception.

With a mixed crowd of Republicans and Democrats, it was rare for anyone to get through a question or answer (or anything for that matter) without others offering their opinion on what was being said. Comments leading up to questions were especially scrutinized, with members of both sides countering any stories told or claims made by the other side with declarations they were untrue or just flat-out lies.

Asked whether he read House Speaker Paul Ryans bill, unveiled Monday night, DeSantis said he had but that it was very difficult to understand because theres many amendments in the 150-page document to the roughly 2,000 pages of the Affordable Care Act. Adding the bill was rammed through two committees on Wednesday night, DeSantis said he didnt think anyone could really come to grips with it in 36 hours.

It gets rid of the onerous taxes and mandates that you have under Obamacare and I think that thats good, he said. The problem is, Im not sure if it does enough to lower the cost of health care.

He said the story hes heard in his office is one of families with premiums and deductibles that have doubled. Throwing a scenario out there, he said a family of four paying $800 a month in premiums with a deductible of $10,000 is not sustainable.

However, DeSantis also said that because the bureaucratic architecture has not been removed, he still sees incentives to drive prices up, even with the Republicans plan.

DeSantis later said hes been a supporter of repealing the Affordable Care Act since the get-go.

We gotta do it, we gotta do it, and we will do it, 100 percent, he said.

He said the replacement part of the puzzle is really what hes looking at.

If you do it right, people are are going to have access to cheaper plans, if you dont, then you still have a lot of government interference and bureaucracy, he said. Im just not sure its going to reduce costs the way its supposed to.

Questions about health care often came with anecdotes.

One woman from Hastings said the Affordable Care Act has allowed her and her family to secure a fantastic plan with a $0 deductible and premiums (with subsidies factored in) totaling under $100 a month. She said previously, in the free market, they were paying higher deductibles on top of un-subsidized premiums. Some years they didnt have insurance at all.

I appreciate that, believe me, DeSantis said. But theres a lot of people who are paying those same premiums who are getting squat in subsidies. Theyre not getting anything.

He said the model is not sustainable, although later said when you go beyond Obamacare its not like thered be nothing there.

One man from Ormond Beach said prior to the Affordable Care Act he had been with the same wonderful physician for over 25 years but that the physician had to close because he could not afford to continue his practice under the new regulations. He said his premiums have all gone up. He then criticized the Republicans bill for being what he saw merely as a list of amendments to the Affordable Care Act.

That is not repeal of Obamacare! he exclaimed.

DeSantis said that was a great point and that he felt the regulations under the Affordable Care Act accelerated a migration of private practitioners to hospitals, a trend he said would lead to more power to the hospitals and less choice for patients. Throughout the discussion he called for more flexibility in the types of plans available to participants.

While the bulk of the roughly hour and a half discussion focused on health care, there was enough meat on the bone for other issues to be tackled here and there.

Asked if he was in favor of putting term limits on members of Congress, DeSantis said (to as much of a consensus of applause he achieved the whole discussion), Yes, yes, absolutely yes. Thatd be great.

He said in lieu of limits there are, instead, incentives for member of Congress to stay as long as possible, which may actually have the adverse effect of giving more power to the executive branch and un-elected bureaucracy. He said there was an argument to be made that elected officials who know their days are numbered might be less inclined to accept their low spot on the totem pole and push for more power to the legislature.

However, when asked later whether he would personally limit himself to his current third term, particularly if a proposed bill he supports to do just that were to fall through, DeSantis said he hasnt made up his mind about his future political plans. He said he had concerns about senior members further consolidating their power if younger members with two or three terms volunteered to leave. He said in the event the bill does pass, he would abide by it, even if his term was grandfathered in.

Asked if he thought Trump was unstable, DeSantis said he didnt want to make it about the man but his policies.

I know some people dont like him, thats fine, but thats not what I want to focus on, he said. It was a tough election, I get it, a lot of people are upset on both sides, but were here to kind of press forward now.

Asked whether he supported an independent investigation into the allegations of ties between the Trump administration and Russia, DeSantis said he felt it was better left in the hands of the intelligence committees to protect any sensitive intelligence that may entail.

Youre part of the problem, one woman called out after members of the crowd had chanted Yes or no.

Asked how he would vote on a bill that would require candidates for president to release their tax returns (in the event it passes the committees), DeSantis said he would look at it.

It is the decision of the candidates to make and it was something that was very litigated in the campaign, he said. I think some voters cared about it but others were fine to not do it.

DeSantis also said there needs to be consequences for people who have a duty to protect sensitive information but leak that information to outside sources. He said he was very disappointed with former President Barack Obamas pardon of Chelsea Manning, formerly Pfc. Bradley Manning, a United States Army soldier sentenced to 35 years in prison for leaking hundreds of thousands of classified documents to WikiLeaks.

DeSantis also reiterated his support for defunding Planned Parenthood.

The stop was one of three the District 6 representative made Saturday. There were other engagements in Daytona Beach and Mount Dora.

Read this article:
DeSantis town hall: Rep reiterates support for repealing ACA but still seeks costs savings - St. Augustine Record

Blame Snowden and Manning for the CIA Leak – Newsweek – Newsweek

This article first appeared on The Daily Signal.

The most recent dumpof documents from WikiLeaks can be directly attributed to Bradley Manning and Edward Snowden.

No, I dont think either of these two previous titleholdersof the "biggest spy in modern history" award was directly involved with this disastrous event. Manning is still in prison, but not for much longer, and Snowden is still sunning himself in some dacha in Vladimir Putins Russian paradise.

Try Newsweek for only $1.25 per week

Their physical fingerprints are not on it this time, but their actions and the failure of Americas leaders to ensure their punishment surely led to this.

As curious reporters and pundits paw over the enormous pile of stolen secrets from WikiLeaks Vault 7, some people are debating whether Julian Assanges troops have committed a crime or have done a servicestriking a blow for openness and slaying the dragon of spying.

Bradley Manning and Edward Snowden's portraits adorn an umbrella at a protest march against the electronic surveillance tactics of the NSA on July 27, 2013, in Berlin. Steven Bucci writes that the thief who plundered Vault 7 was watching what happened to Manning and Snowden, and the message he or she took was that there would be little downside to ignoring the law, violating their oath and deciding that they as an individual knew better than the collective wisdom of the leaders of our land. Sean Gallup/Getty

There should be no question in anyones mind that this was a huge blow to Americas security and makes the nation less safe. Our enemies now have a much better idea as to how the CIA contributes to protecting America from those who openly, and with no remorse, mean to do her harm.

In truth, if Manning had not been pardoned by President Barack Obama, and if Snowden had not been allowed to escape into Russias protection, this massive leak still may have happened. It is extremely unlikely that these were obtained by hacking.

Related: Has the CIA been damaged by the latest WikiLeaks leaks?

The CIA is not the Democratic National Committee. The agencys computer security is not perfect (it does have humans involved in it), but it is darned good, and it is not connected to the internet.

The most likely way WikiLeaks obtained the Vault 7 files was by a malicious insider stealing them.

A malicious insider (like Manning and Snowden) is someone who has the proper clearance and authority to be inside the network, but uses that authority to loot the files and pass them on to others who have no lawful right to see them.

That is a federal crime. It is spying, and it is a treasonous act. No amount of pained logic, hand-wringing and moral gymnastics can turn that into heroic action.

Criminal acts are normally deterred by the fact that previous occurrences have been severely punished to the fullest extent of the law. But that did not happen with regard to Manning. He got a fraction of what the judge could have given him for his guilty verdict, and Obama pardoned a big chunk of that.

It has not happened to Snowden, who still sits blithely in Russia, occasionally piped in to American academic conferences by Skype to opine on the police state called America.

The thief who got Vault 7 was watching, and the message he or she took was that there would be little downside to ignoring the law, violating their oath and deciding that they as an individual knew better than the collective wisdom of the leaders of our land.

No, Manning and Snowden didnt walk out with the files this time, but they are, together with the weak responses of the Obama administration, fully to blame.

Steven Bucci is a visiting research fellow at The Heritage Foundation.

Go here to see the original:
Blame Snowden and Manning for the CIA Leak - Newsweek - Newsweek

BT to offer customers encryption service for data – Capacity Media (registration)

BT is to offer transparent encryption to its customers in 180 countries, in order to protect corporate information and critical data including big data that is held in the cloud and elsewhere.

The company has signed a deal with the e-security unit of French multinational Thales to provide its Vormetric transparent encryption to customers. The system will allow customers to encrypt data-at-rest, control privileged user access and manage a collection of security intelligence logs without re-engineering applications, databases or infrastructure.

David Stark, vice president of BTs security portfolio, said: "Security and integrity of data remains one of the biggest concerns for our customers when deploying cloud solutions. Through our agreement with Vormetric, we provide our customers with an additional layer of security that helps them protect data stored in the cloud as well as enhance access control."

Mike Coffield, vice president of global channel strategy at Thales e-Security, said that organisations "have never faced a more significant threat from cyberattacks, with breaches not only potentially costing vast sums of money in fines, but also longer term damage to brand, reputation and market value".

The companies said that the collaboration "represents a significant step forward for organisations seeking to address todays growing business challenge of protecting mission-critical data and corporate information assets".

BT Security said it provides managed services to 6,500 customers worldwide, including both private and public-sector organisations. Customers will be able to buy the service as a licence or a subscription.

Coffield added: "With organisations increasingly deploying techniques such as cloud computing and big data to drive up customer service, it is critical that this proliferation of data is safeguarded from getting into the wrong hands."

Topics: BT, Thales, security, e-security, cloud, big data, encryption, Vormetric

Visit link:
BT to offer customers encryption service for data - Capacity Media (registration)

Quantum Cryptography: A Boon for Security – National Review

The most recent WikiLeaks document dump regarding the CIA has made it clear that its getting harder and harder to keep secrets in the digital age.

If the CIA or foreign intelligence services like Britains arent eavesdropping on our conversations by surreptitiously turning on our Samsung TVs or hacking into our supposedly encrypted smart phones (and disguising themselves as Russian hackers while theyre doing it); if actual Russian and Chinese and North Korean hackers arent burrowing through one firewall after another in our corporate or government networks; then we have rogue insiders like Edward Snowden, former sergeant Manning, and very possibly whoever sent these 9,000 CIA documents to WikiLeaks, feeling free to expose mounds of classified documents to public scrutiny whenever they feel like it, on the rationale that its more ethical for you as a citizen of the world to endanger your nations security than to protect it as you are legally required to do.

No one can be very shocked that the CIA, or any other spy agency, has the capabilities the WikiLeaks documents allege that it does. Whats shocking is that we didnt find out sooner. In an intelligence community that has become populated by rogue whistleblowers (or, as the Michael Flynn case suggests, rogue employees on a vendetta) and in which our most trusted and guarded information networks have become extremely porous, the mission motto of the 1992 Robert Redford movie Sneakers No More Secrets may be coming to pass before our eyes.

Fortunately, however, there is a silver lining to all these dark shadows.

Thats the advent of quantum cryptography, which uses quantum mechanics, instead of digital algorithms, to encrypt data. The data will then be forever immune from hackers or malware makers; the only users who will see it will be you and whoever you are sending it to or sharing it with. Big Brothers data may finally be safe; but so will your data, from an unauthorized Big Brother.

How does quantum cryptography work? Since the late 1940s, standard digital computing has relied on the same binary linear sequence of the numbers 1 and 0 to encode, transmit, and then read messages via electricity. The process has gotten faster over the last 70 years, thanks to the transistor, the microchip, and using more and more conducive media through which to send the electrons. But ultimately the electronic digital process that ENIAC used to do computations for the Army during the Truman administration is still the same as the one that runs your smart phone or the worlds biggest supercomputer.

Quantum computing turns to the electrons smaller nuclear cousin, the quantum, to transmit message data. That eliminates the need for the traditional 0-1 linear sequence; instead a quantum bit can be both a zero and a one at the same time. That not only exponentially speeds up the transmission process; it means interrupting the linear process. The opening for traditional hacking techniques vanishes in an uncertain haze. Is a bit a zero or one? Only its programmer, and receiver, knows for sure.

A metaphor helps here. Think of the standard Internet server as the equivalent of a telephone landline; a hacker can tap it like an eavesdropper who taps the wire to listen in on a conversation.

With quantum cryptography, the intrusion of another listener snaps the cable. The sender and receiver know at once that the connection has been severed, and why. Hacking has become an exercise in futility; sender and receiver are able to communicate in confidence, knowing that their connection defies any intrusion from unwanted guests.

Quintessence Laboratories in Australia is just one of the companies involved in quantum cryptography that say that a commercially viable version of quantum cryptography will be available in 18 months or two years creating a virtually unhackable cyber universe.

Thats the good news, that quantum cryptography can either be installed directly on devices, which revolutionizes the Internet of Things, or be accessible in the quantum cloud.

The bad news is the same quantum principles will also revolutionize computing itself in another decade or less. It will turn even our most advanced current systems into todays equivalent of TVs with rabbit ears. (If you arent old enough to know what those are, you can ask your grandmother.) Quantum computing will rip through any and all conventional algorithms for encryption literally in less than a blink of an eye.

The challenge is that the instability of quanta that makes quantum cryptography so effective makes quantum computing i.e., transforming the entire digital universe into a quantum-driven cyber sphere daunting. Nonetheless, other countries are trying. The Chinese are already feverishly working to achieve the first big breakthrough in quantum computers; so are the Europeans.

This is the Next Big Thing in information technology. As with all technological revolutions, it has two sides one positive, one negative. It will shut some doors we all want shut, and eventually will open others wed all prefer shut. We cant let current scandals distract us from preparing for the brave new world to come, and taking a clear-eyed look before making the Quantum Leap.

Arthur Herman is a senior fellow at the Hudson Institute. His most recent book, Douglas MacArthur: American Warrior, was published in June.

See more here:
Quantum Cryptography: A Boon for Security - National Review

Tech Roundup: Julian Assange as Tech Companies’ Defender – New York Times


NPR
Tech Roundup: Julian Assange as Tech Companies' Defender
New York Times
The founder of WikiLeaks, Julian Assange, said the Central Intelligence Agency lost control of a large arsenal of cyberwarfare tools and then covered up that the material was not secured. He said WikiLeaks is working with companies like Apple and ...
Julian Assange Says WikiLeaks Will Share CIA Code With Tech CompaniesNPR
Silicon Valley shrugs off Julian Assange's help and questions his motivesThe Guardian
Scepticism as Julian Assange offers to help Silicon Valley fight CIA hackingStuff.co.nz
Salon -USA TODAY
all 3,786 news articles »

See more here:
Tech Roundup: Julian Assange as Tech Companies' Defender - New York Times