Why quality encryption is actually helping hackers hack – The American Genius

Too many places to hide

FBI General Counsel James A. Brady opened up another angle to the global encryption debate. In a Center for Strategic and International Studies (CSIC) panel, Brady claimed that the current trend in full-disk encryption (FDE) may make it easier for criminals to hide their illegal activity.

In the past, phone owners had to enable encryption, which protects our data by turning it into unreadable text. Today, any iOS8 or newer iPhone comes with full-disk encryption, which automatically encrypts hard drive data. Android owners with Android 5.0 Lollipop or later also get full disk encryption. Owners of these encrypted devices are the only ones able to access device data via a key, which is typically a user generated password. Prior to the rollout of full-disk encrypted devices law enforcement could bypass the need for a users key and appeal directly to phone companies for device access.

Weve already seen how this form of widespread encryption can end up costing law enforcement.

In last years high profile Apple vs. FBI debate, an encryption backdoor became a potential solution in cases where law enforcement need to access a criminals device.

This encryption backdoor and the FBIs questioning of full-disk encryption should keep business owners on alert. Phones are increasingly becoming extensions of our offices and meeting rooms. Businesses should push for the most innovative and widespread encryption technology when it comes to protecting their data and the data of their customers, especially as more of our business communications happen on phones. This doesnt mean law enforcement cant reconcile the need for sophisticated data protection with public safety.

A quicker system of gathering and analyzing unencrypted meta-data, such as the date and time of calls can help speed up an investigation. Law enforcement under the correct judicial orders can also take better advantage of cloud based data in their investigations.

Most of all, law enforcement should be proactive about developing their own hacking capabilities for use in the most extreme circumstances.

View post:
Why quality encryption is actually helping hackers hack - The American Genius

‘Use open source software for GIS mapping’ – The Hindu

'Use open source software for GIS mapping'
The Hindu
Open sourcing of data for Geographical Information System (GIS) mapping will create a huge potential for employment and transparency in administration, secretary of OSGEO-India V. Ravi Kumar has said. Proprietary software for GIS costs up to Rs. .30 lakh.

Here is the original post:
'Use open source software for GIS mapping' - The Hindu

SK Telecom and Nokia Sign Cooperation Agreement for Quantum Cryptography – PR Newswire (press release)

SK Telecom and Nokia have been working together closely from 2016 for interoperation of SK Telecom's quantum technologies with Nokia's optical transport system. The first prototype of this collaboration, also known as Quantum Transport System, is being demonstrated at Nokia's booth (Hall 3, 3A10) during the 2017 GSMA Mobile World Congress.

The quantum cryptography communication is known as the most secure form of communication encryption that cannot be broken with any existing hacking technology. Quantum cryptography is expected to replace the existing security solutions in all areas at risk of data hacking, including national defense, finance, autonomous vehicle and the Internet of Things (IoT).

Under the agreement, the two companies will also cooperate in the area of Quantum Random Number Generator (QRNG), a technology necessary for applying quantum cryptography technologies to IoT devices.

SK Telecom's QRNG is the world's smallest 5x5mm CMOS Image Sensor (CIS) based all-in-one, single silicon (ASIC) providing non-deterministic true random numbers on demand from quantum-shot noise. SK Telecom plans to tape out engineering samples of QRNG chip (ASIC) in the second quarter of 2017 and commercial launch is planned by the year end. SK Telecom envisions using QRNG for Internet of "secure" Things (IoT).

"Since opening Quantum Tech Lab in 2011, SK Telecom has been making constant efforts to develop quantum cryptography technologies," said Park Jung-ho, CEO and President of SK Telecom. "Based on the cooperation with Nokia, SK Telecom will create a new paradigm and ecosystem in the field of ICT."

"With SK Telecom's quantum cryptography technologies, we have secured the basis for building the most secure network security solution," said Rajeev Suri, CEO of Nokia. "We will respond proactively to rapidly growing demands of the cyber security market with these technologies and solutions."

About SK Telecom

Established in 1984, SK Telecom is the largest mobile operator in Korea by both revenue and number of subscribers. As of December 2016, the company holds around 50 percent of the market, with 29.60 million mobile subscribers including 21.1 million LTE subscribers. It has reached KRW 17.092 trillion in revenue in 2016.

SK Telecom has led the advancement of mobile technologies ranging from 2G to 4G, and is currently setting important milestones in its journey to 5G. The company is not only leading innovation in the field of mobile network, but also providing IoT, media, home and platform services.

SK Telecom is determined to play a significant role in the Fourth Industrial Revolution by achieving innovations and promoting shared growth with other players in the industry.

For more information, please visit http://www.sktelecom.com/en or contact skt_press@sk.com.

To view the original version on PR Newswire, visit:http://www.prnewswire.com/news-releases/sk-telecom-and-nokia-sign-cooperation-agreement-for-quantum-cryptography-300413873.html

SOURCE SK Telecom

http://www.sktelecom.com

Original post:
SK Telecom and Nokia Sign Cooperation Agreement for Quantum Cryptography - PR Newswire (press release)

Dash Is Now the Fourth Biggest Cryptocurrency with $200m Market Cap – Finance Magnates

Privacy focused cryptocurrency Dashs recent rally is still going strong and it is now carrying the project to never-before-seen heights. Dash is now the fourth biggestcryptocurrency in circulation by valuation with a totalmarket capitalization of $200 million.

Since we last reported on the rally ten days ago, Dashs price continued to climb from around $19 to over $28 right now. And over the last week alone, theexchange ratehas jumped by about 28%. The move is supported by strong trading volumes as well, as about $4.5 million worth of buying and selling of Dashs cryptocurrency has taken place just over the lastday much higher than its previously typical daily volumes.

Dashs recent price and volume growth is largely attributed to its recent software launch of Sentinel, which sets the foundation for its decentralized payments system Evolution. In addition the company has made several key integrations with new partners recently.

On ThursdayDashsigned a business partnership with digital payments platform BlockPay that allows people to pay for goods with the cryptocurrency.

Headquartered in Munich, BlockPay is popular particularly in Europe and Latin America for enablingPoint of Sale (PoS) transactions at no cost to the merchant and low fees for the consumer. It boasts a team of over 50 representatives in 36 countries, each working on securing the platform implementation in hundreds of convenience stores, grocery marts, gas stations, supermarkets, hotels, and ecommerce outlets.

Daniel Diaz, Dash VP of Business Development, said: Dash is a project that has been focused a lot on usability as digital cash, and we want people to have a similar experience doing both online and Point of Sale transactions. BlockPay has taken solid steps in this direction, developing software to make it easier for brick and mortar shops to accept digital currency seamlessly.

Dash joins several other leading cryptocurrencies available for use on the BlockPay POS platform, including Bitcoin, Ethereum, Steem, Litecoin and Dogecoin. Cryptocurrency users can pay at BlockPay terminals by scanning a QR-Code or tapping their phone on the NFC-Terminal. The payment and settlement process takes just a few seconds.

Originally posted here:
Dash Is Now the Fourth Biggest Cryptocurrency with $200m Market Cap - Finance Magnates

SBXbank to launch cryptocurrency-powered marketplace ‘Coinxmart’ – EconoTimes

Monday, February 27, 2017 5:28 AM UTC

SBXbank, a fintech company headquartered in London, is going to launch Coinxmart a unique marketplace where transactions are carried out using cryptocurrencies, Jakarta Globe reported.

Speaking with Jakarta Globe, SBXbank's Asean vice president of marketing Abdul Rahman said that company intends to sink up to Rp 100 billion ($7.5 million) into developing fintech services that offer e-commerce, peer-to-peer investment and lending, all of which will use a cryptocurrency.

Rahman further said that Coinxmart will be launched in Indonesia, alongside its iOS and Android apps, in May. SBXbank's proprietary cryptocurrency SBXCoin will be used in the marketplace.

He noted that the prospects of cryptocurrency is positive in Indonesia as it can also be used in many traditional banking services, including lending, deposit, payment and transfer.

"Soon fintech products will be used widely in all aspects of the financial industry's value-chain," Rahman added.

SBXbank is currently negotiating with Indonesia's Financial Services Authority (known as the OJK) to convince them that fintech services, including its cryptocurrency, are safe for the customers. Rahman is hopeful to convince OJK that the cryptocurrency is safe and cannot be easily used for money laundering activities particularly as SBXbank strictly follows know-your-customer (KYC) policies.

"We have to build public awareness of crypto currency. We have to let the public know the advantages of using crypto currency," he said.

In order to give time to the customers to familiarize with SBXCoin and promote its use, SBXbank intends to allow up to 30 debit cards to be used in the marketplace.

"There's no physical money in the internet, everything will be done using SBXCoin eventually," he said.

Human Life Could Be Extended Indefinitely, Study Suggests

Goosebumps, tears and tenderness: what it means to be moved

Are over-the-counter painkillers a waste of money?

Does an anomaly in the Earth's magnetic field portend a coming pole reversal?

Immunotherapy: Training the body to fight cancer

Do vegetarians live longer? Probably, but not because they're vegetarian

Could a contraceptive app be as good as the pill?

Some scientific explanations for alien abduction that aren't so out of this world

Society actually does want policies that benefit future generations

Six cosmic catastrophes that could wipe out life on Earth

Big Pharma Starts Using Cannabis For Making Drugs In Earnest

Do you need to worry if your baby has a flat head?

Read this article:
SBXbank to launch cryptocurrency-powered marketplace 'Coinxmart' - EconoTimes

Global Resource Coin: Invest in natural resources with cryptocurrency – ThisisReno

SPONSORED POST

Global Resource Coin (GRC) is the first cryptocurrency in the world specifically created for casual users, who want to obtain resources from the investment point of view. Cryptocurrency was developed in 2013, however after long registration procedures, contracts signing and creation of a special licensed trading platform, the official launch only took place at the beginning of 2017.

So what is the uniqueness and peculiarity of the GRC? It is quite simple: global corporations and governments in many countries do not allow ordinary people to become engaged in investing in natural resources. In order to do this, you need to have a considerable amount of money, a special financial education and a special license. However, cryptocurrency GRC solves this problem. Due to the fact that GRCs trading marketplace has a specialized license, anyone is able to invest their savings in a particular natural resource, whereas cryptocurrency acts as an intermediary between users from all over the world.

Due to a great interest demonstrated from international producers and developers of minerals and natural resources, GRC has introduced proprietary cryptocurrency code, which will valid until 2018. It was created in order to secure the process of mining and users activity against possible hacker attacks. However, at the beginning of 2018 cryptocurrencys trade will be deployed on the worlds largest stock exchanges, specializing not only in cryptocurrency, but also on commodity exchanges, such as NASDAQ.

The group of GRCs cryptocurrency developers is headed by Tomas Beran, a well-known developer from Czech Republic, who belongs to the famous family of Berans billionaires. At the end of 2016 a number of international media have published information about the beginning of operations on the trading platform, using GRCs cryptocurrency.

Therefore, GRC is the first cryptocurrency in the world based on natural resources. We all know that any investment is a high risk. But our platform helps to minimize those investment risks, offering the most relevant sources of income. Hundreds of GRCs platform specialists analyze all the offers on the natural resources markets on a daily basis and select only the most interesting ones for our users. This way, each of you can take advantage of the offers that appear daily on our platform.

In addition, from the year 2018 GRCs cryptocurrency rate is expected to grow due to its social usefulness and relevance. For this reason, you can use our cryptocurrency not only as an investment tool in natural resources, but also as a cryptocurrency that is followed by a perspective financial future.

Start changing your life right now and register on the GRC platform.

Global Resource Coin: https://grcoin.eu/

ThisisReno is your source for online Reno news and events since 2009. We are locally owned and operated. #thisisReno

Read more:
Global Resource Coin: Invest in natural resources with cryptocurrency - ThisisReno

Top 4 Cryptocurrencies Suffering From Slow Block Times – The Merkle

If there is one thing a lot of people would like to change about bitcoin, it is the rather long time in between blocks being generated on the network. This is also why various outcomes are so popular, as they process transactions a lot quicker. Interestingly enough, Bitcoin is not the only cryptocurrency to suffer from very long block times. In fact, there are at least four other well-known currencies, which suffer from this problem.

Similarly to bitcoin, NameCoin is another SHA-256 cryptocurrency using the same proof-of-work algorithm. It also has a total coin supply of 21 million coins, and a difficulty retarget mimicking the one of bitcoin. The similarities dont end there, though, as Namecoins block time is 10 minutes as well. Unfortunately Namecoin never become a mainstream success, even though it is still popular among the early cryptocurrency adopters.

There seems to be a trend among older SHA-256 coins, as quite a few of them have a 10-minute block time. PeerCoin is a bit different than NameCoin, though, as it combines both proof-of-work and proof-of-stake. Moreover, PeerCoin has no fixed coin supply and a much lower mining difficulty compared to other popular SHA-256 coins.

It is worth noting Peercoin offers a one-block mining difficulty retarget, which is rather unusual. Then again, this block reward of over 65 coins per network block is rather high, which may be part of the reason why Peercoin never became much of a success either. Without scarcity and clear use cases, there is not much use for Peercoin, even though it still holds a value of roughly US$0.31 per coin.

BitBar is the odd one on this list, as this altcoin never amounted to much. Whether that is due to the developer abandoning the project, or just a project that failed to capitalize on bitcoins hype, is a discussion for a different day. We do know Bitbar has a 10 minute block time, which makes it one of the slowest cryptocurrencies to date. Ten minutes is rather long for a Scrypt-based cryptocurrency, though, as those coins usually generate new blocks within three minutes or less.

Contrary to what most people would like to believe, bitcoin is not the slowest cryptocurrency in the world right now. That title goes to Quatloo, a rather obscure altcoin targeting the sci-fi enthusiasts around the world Although this currency has a specific appeal to this group of users, it never became a big success by any stretch of the imagination.

With a block time of 22.25 minutes, Quatloo transactions take ages to confirm. For a Scrypt-based proof-of-work cryptocurrency, that block time was the undoing from day one. Although Quatloo is still being mined as we speak, its community remains rather small and it appears that will not change anytime soon.

If you liked this article, follow us on Twitter @themerklenews and make sure to subscribe to our newsletter to receive the latest bitcoin, cryptocurrency, and technology news.

More here:
Top 4 Cryptocurrencies Suffering From Slow Block Times - The Merkle

‘The Source’ takes a powerful, jumbled measure of WikiLeaks – San Francisco Chronicle

The repetitive cry goes out, over and over, in smoothly metallic tones garbled by electronic glitches: Illumination, for illumination, we called for illumination.

This snippet of a classified military field report from Iraq one of hundreds of thousands of such files passed along by Chelsea Manning and released to a bewildered public in 2010 by WikiLeaks is the text for one section of The Source, the unnerving and chaotic oratorio by composer Ted Hearne and librettist Mark Doten that opened a six-performance run over the weekend at SF Opera Lab.

It is also a deft encapsulation of the works raison detre.

Haunting, scattershot, seductive and overambitious, The Source represents a desperate attempt to shed some kind of light on the horrors of this chapter in U.S. history not only the venal crime of the Iraqi invasion itself, but the shadowy national security apparatus that was strengthened even further in its aftermath.

Mellissa Hughes sings in Ted Hearnes The Source at SF Opera Lab.

Mellissa Hughes sings in Ted Hearnes The Source at SF...

If the result, witnessed on Saturday, Feb, 25, at the Taube Theatre, delivered only intermittently on that promise, consider the depths of the darkness that the creators were trying to explore. The flashes of brilliance scattered throughout the 75 minutes of The Source like the searing bursts of rocket and artillery fire that crop up repeatedly as reference points are at once revelatory and disorienting.

An omnivorous eclecticism sets the tone for much of the evening. Dotens libretto is built largely around military and diplomatic logs, along with some of the online chat-room communications between Manning and Adrian Lamo, the hacker who eventually turned her over to the authorities. Much of this material is atomized into short fragments that float free of their syntactic moorings.

Hearnes music, scored for seven instrumentalists and a quartet of vocalists, is equally dissociative. There are soothing hymnal chorales and jittery rock grooves, soul ballads and eerie, keening solo vocal lines. Hearne also interjects tiny rapid-fire samples of pop-culture detritus Bobby Darins recording of Mack the Knife, snippets of TV talk shows to further unmoor the listener. You cant resist the beauty and urgency of this material, even as it whiplashes you from one stylistic vein to the next.

Perhaps the scores most inventive aspect is the electronic processing that Hearne overlays on the work of the four superlative singers (Mellissa Hughes, Samia Mounts, Isaiah Robinson and Jonathan Woody) who perform from perches nestled within the audience. Its a variant of the increasingly ubiquitous Auto-Tune, which gives an other-worldly, digital-age patina to the vocal writing; in everything these singers do, you can hear an undercurrent of human foibles struggling to resist the computers sleek soullessness.

Overall, Hearnes investigative methods here (as in his equally freewheeling Katrina Ballads) are not unlike those of a nuclear physicist: He bombards his subject with every kind of musical projectile he can lay his hands on, trying to determine some piece of truth from the angle of the ricochet.

This proves most effective when The Source confronts the war head-on, creating an ensemble portrait of military servicemen as disembodied but still all-too-human enactors of atrocity. A section devoted to Julian Assange, the elusive figure behind WikiLeaks, leaves much of his mystery intact; issues of gender identity (Manning was Bradley Manning when the leaking occurred, only to transition in prison ) are tentatively floated, then abandoned.

For this production, director Daniel Fish and videographer Jim Findlay have provided a visual backdrop, displayed on four large screens surrounding the audience. This is footage of a large range of New Yorkers as they watch leaked video footage of a scene of carnage perpetrated by an American helicopter crew on Baghdadi civilians; their expressions range from stoicism to unease to outright grief.

There is something exquisitely haunting about these reactions, which imply so much more than they state you can tell theres something horrific lurking off-camera, but its not until the final moments of the performance that you discover what it is.

The attack footage, unfortunately, brings with it an infusion of literalism that actually undercuts the power of everything thats come before. To show us the truth at this point everyday Iraqis being mowed down like grass reads like an admission that art is not up to the task.

But the potency of The Source, with all its jump cuts and musical feints, puts the lie to that assertion. There is illumination to be had, all right, even if its of an impressionistic and transitory nature.

Joshua Kosman is The San Francisco Chronicles music critic. Email: jkosman@sfchronicle.com Twitter: @JoshuaKosman

The Source: 8 p.m. Wednesday-Friday, March 1-3. $35. Taube Atrium Theater, Veterans Building, 401 Van Ness Ave., San Francisco. (415) 864-3330, http://www.sfopera.com

Excerpt from:
'The Source' takes a powerful, jumbled measure of WikiLeaks - San Francisco Chronicle

Mysterious #Vault7: What Secrets is WikiLeaks Due to Release? – Sputnik International

The mysterious "Vault 7" continues toarouse public curiosity.

WikiLeaks, an international non-profit organization that publishes news leaks and classified information, started releasing cryptic questions about "Vault 7" onTwitter onFebruary 4, 2017.

The riddle has prompted speculation amongsocial media users asto what exactly WikiLeaks was going toexpose this time. Some users suggested that it would be explosive revelations aboutthe 9/11 terror attacks inNew York City, while others opined that the international organization is aboutto leak a new portion ofHillary Clinton's emails.

WikiLeaks Exposes CIA's Meddling inFrench Presidential Election

A video released byAnonymous Scandinavia onTwitter hinted atthe possibility that something "big" is likely tosurface onFebruary 19.

"WikiLeaks asked what Vault 7 was, where Vault 7 was, and when is Vault 7. While the world waits forthe 'why' and 'who', we assume that the answer asto 'when' is onFebruary 19," the video said.

However, it was onFebruary 16 when Julian Assange tweeted aboutthe US Central Intelligence Agency's meddling inthe French presidential election back in2012.

"My new story: the CIA conducted a 10-month espionage operation targeting the last French presidential election," Assange wrote onhis brand new Twitter account.

According toCIA documents published byWikiLeaks, the US intelligence service officially ordered its agents topenetrate all the major political parties inFrance aswell astheir electronic systems beforethe country's 2012 presidential election.

Speaking toRadio Sputnik onSunday, veteran journalist Diana Johnstone said that this operation was obviously part ofa broader pattern.

"We know that the United States and the CIA inparticular are notorious forintervening inelections all overthe world. There is nothing surprising aboutthat," Johnstone remarked.

The unconfirmed claims regarding Russia's alleged interference intothe 2016 US election have immediately paled incomparison withthe large-scale cyber campaign launched bythe CIA againstFrance a few years ago.

The Flynn Scandal and Clinton's Aides' Alleged Meeting With the Chinese Ambassador

Meanwhile, onFebruary 19 WikiLeaks turned the spotlight onHillary Clinton's national campaign chairman John Podesta, whose emails it released last October.

One such email said that back inJanuary 2016 Chinese Ambassador tothe US Cui Tiankai sought "an informal, private, offthe record get-together" withthe Clinton campaign's top aides "to discuss the next year and the current state ofUS-China affairs."

Predictably, this email has taken ona new significance amidthe scandal overDonald Trump's former National Security Adviser Michael Flynn's alleged contacts withRussian Ambassador Sergei Kislyak.

However, tothe disappointment ofmany, neither WikiLeaks nor Assange have released anything explosive comparable tothe Iraq War Logs or the Podesta emails.

So, is the "Vault 7" mystery overhyped?

REUTERS/ Courtesy of WikiLeaks

WikiLeaks founder Julian Assange holds up his new kitten at the Ecuadorian Embassy in central London, Britain, in this undated photograph released to Reuters on May 9, 2016

'We Open Governments': WikiLeaks' 'Vault 7' Exposures

Sputnik got intouch withCharles K. Ortel, an investigative journalist and renowned Wall Street analyst and investor, todiscuss this issue.

"I am happy totry answering your questions withthe caveat applying toeach ofmy answers that I am joining you inmaking educated guesses I have no connection, direct or indirect, withWikiLeaks or withanyone connected toWikiLeaks," Ortel responded toSputnik.

AP Photo/ Carolyn Kaster

"Under President Obama, the United States government and elements connected toit intervened inopenly expressing preferences concerning candidates and issues inforeign elections and referenda," the Wall Street analyst pointed out.

Donald Trump's victory was a bolt fromthe blue forHillary Clinton's supporters fromboth Democratic and Republican camps, prompting some ofthem toclaim that elements connected with "the Russians" had stepped into intervene inthe election.

"As a guess, WikiLeaks knows precisely who leaked the Podesta emails and that this source was not Russia or elements connected toRussia," Ortel said.

"Moreover, asa guess, WikiLeaks (and others) have obtained all ofthe missing Hillary Clinton emails and may have obtained emails found inOctober 2016 onAnthony Weiner's laptop computer. If so, WikiLeaks has much valuable information it could choose toshare ona schedule ofits own choosing," he suggested.

"If Vault 7 is a reference tothe 7th Floor atthe US State Department (which it may or may not be), then it is possible that the forthcoming release will document more intervention inforeign elections and referenda and show previously unseen communications and deliberations involving US government personnel, possibly including Hillary Clinton, her aides, and other members ofthe Obama Administration," Ortel noted.

According tothe analyst, it is also possible that WikiLeaks may release heretofore unseen communications explaining how the Clinton Foundation came tobe re-organized afterJanuary 20, 2009 when the Obama administration acquired the ability tounderstand how the Foundation and its affiliates operated outsidecompliance withapplicable state, federal and foreign laws fromOctober 23, 1997 when it was founded onwards.

"To me, the release of 'Vault 7' seems a natural progression inthe evolution ofWikiLeaks," Ortel noted, "and I should add that no credible person has argued that the Podesta emails, forexample, or other releases are forgeries, so their record is noteworthy and any additional releases should be taken seriously and reviewed carefully."

AFP 2016/ Brendan Smialowski

Clinton advisers Jake Sullivan (L), Nick Burns (2L) and John Podesta (2R) wait with Clinton Campaign Chairman, Democratic presidential nominee Hillary Clinton for a meeting with Ukrainian President Petro Poroshenko on September 19, 2016 in New York.

Ecuadorian Elections: 'Vault 7' and Julian Assange's Future

Is it possible that the Vault 7 campaign was aimed atdrawing attention toJulian Assange amidthe Ecuadorian election, which took place onFebruary 19?

"Julian Assange may lose protection fromextradition that is afforded bythe Government ofEcuador, depending uponnational elections inprogress there, so your suggestion is certainly possible," the Wall Street analyst responded.

REUTERS/ Suzanne Plunkett/Files

However, the election is due togo toan April runoff betweenthe candidate fromthe Left, Lenin Moreno, and Lasso. That means that Assange's future is hanging inthe balance.

Can we assume that Assange postponed the much-discussed leak tothe time ofthe April runoff?

"I suspect that the next set ofWikiLeaks papers may drop earlier thanthis coming April if they are extensive, they may need many days todisseminate this information tothe general public," Ortel said.

'Vault 7' and Upcoming 2017 Elections inEurope

The Wall Street journalist believes that the forthcoming leaks would have something todo withEurope's 2017 elections inFrance, the Netherlands and Germany.

The release ofthe CIA's files concerning the 2012 French election could have been an appetizer.

"Watching the reaction inFrance, I suspect that WikiLeaks may wish tohave Vault 7 spread particularly toother nations scheduled tohold elections and referenda during2017," Ortel highlighted.

AP Photo/ Manuel Balce Ceneta

"I think Wikileaks has evolved tobecome a serious force and there is no doubt that powerful governments and individuals have positive and negative reasons toconsider intervening innational elections (and inthe affairs ofmulti-lateral grant-making government entities) so educating the general public concerning potential corruption and influence peddling is truly a welcome service," he said.

Ortel pointed outthat those who operate withingovernments using secrets have a paramount duty, underthe US Constitution, toobey laws, and toprotect secrets.

"Concerning the Podesta emails, what WikiLeaks shows us is rampant, so far unprosecuted criminality particularly withregard tosoliciting and spending funds inthe supposed care ofthe Clinton Foundation, and evident failures toprotect secrets, some ofwhich held commercial value (as well asbeing classified atthe highest levels)," the analyst stressed.

So should we expect more fromthe much discussed "Vault 7" campaign?

"Given its long record, and recognizing that WikiLeaks has become bigger thanJulian Assange alone, I fully expect more releases," Ortel emphasized.

The views expressed inthis article are solely those ofthe author and do not necessarily reflect the official position ofSputnik.

Read the original:
Mysterious #Vault7: What Secrets is WikiLeaks Due to Release? - Sputnik International

Margaret Sullivan: Daniel Ellsberg, who leaked the Pentagon Papers, asks: Who will be the next Snowden? – Salt Lake Tribune

Almost five decades after the first Pentagon Papers story was published in 1971, revealing the secret history of the Vietnam War, the 85-year-old Ellsberg still isn't done making trouble. That was clear on a Georgetown University stage earlier this month, shortly after the scarf encounter.

"Something like the Pentagon Papers should be coming out several times a year," Ellsberg told journalist and scholar Sanford Ungar, who organized the two-day symposium, "Free Speech Legacies: The Pentagon Papers Revisited."

If Ellsberg had had access to the Senate Intelligence Committee report on CIA torture, a summary of which was released in 2014, "I would have put that out," he said.

There's plenty more, he's sure.

"The secrecy system operates overwhelmingly to keep important information from the American public," he said.

Whistleblowers are the best defense, he believes but there aren't enough of them.

An admirer of two other major leakers, Chelsea Manning and Edward Snowden, Ellsberg wants more.

"Is three whistleblowers of this scale about right in 45 years?" he demanded.

He knows, though, that they have paid a big price and the legal troubles of other Obama-era leakers, such as Thomas Drake and John Kiriakou, underscore his point.

Manning, a former Army intelligence analyst, leaked a huge tranche of classified information including a video showing a U.S. airstrike killing Iraqi civilians through WikiLeaks. Court-martialed, the transgender woman formerly known as Bradley Manning went to prison for seven years. President Barack Obama commuted her sentence in his final days in office.

Snowden, a former National Security Agency contractor who revealed shockingly widespread electronic surveillance of U.S. citizens by their government, will never return to the United States, Ellsberg said. Exiled in Russia, Snowden would not be allowed to explain his motivations during trial because he is charged under the Espionage Act, which allows no public-interest defense.

Ellsberg entertained the Georgetown crowd with spot-on impressions of Nixon and Kissinger, and tales about failing to master Twitter and digital encryption.

"I had to rely on Xerox I used the cutting-edge technology of my day," he quipped.

The government case against him ended in a mistrial, sparing him what he expected would be life in prison.

See the original post here:
Margaret Sullivan: Daniel Ellsberg, who leaked the Pentagon Papers, asks: Who will be the next Snowden? - Salt Lake Tribune