From coal miners to Chelsea Manning the world of oratorios has changed – The Mercury News

Oratorio. For many of us, the word conjures large-scale works of the past, Baroque epics such as Handels Messiah and Bachs Passions.

Yet composers are reimagining the form for our times. Two contemporary works, both making their Bay Area premieres this week, demonstrate that oratorios remain a powerful medium for telling big stories.

The works themselves couldnt be more different. Ted Hearnes The Source, which San Francisco Opera presents Feb. 24-March 3, focuses on Chelsea Manning, the U.S. Army intelligence analyst who released thousands of classified documents to WikiLeaks.

Julia Wolfes Anthracite Fields, coming to Cal Performances in a Feb. 26 performance featuring the new music sextet Bang on a Can All-Stars and Cappella SF, examines the Pennsylvania coal mining industry from the late 19th century on.

These new-wave oratorios, both of which premiered in 2014, use unusual forces to tell their stories.

Hearnes score employs four voices, seven instrumentalists, video and electronica; the libretto, by Mark Doten, is assembled from news reports, Twitter feeds, declassified government documents and emails between Manning and hacker Adrian Lamo. Performed in the round, the piece yields a prismatic portrait of Manning, who was arrested in 2010 as Bradley Manning and sentenced to 35 years in prison. (Manning subsequently began identifying as female: now Chelsea, her sentence was commuted by President Obama last month. She is scheduled to be released in May.)

Hearne began writing The Source in 2010 and says the piece morphed as Mannings story did. At first, I was interested in the freedom of information implications of a group like WikiLeaks, the composer explained in a recent call from Los Angeles. When the leaks of the Department of Defense and Department of State cables came out and Manning became known as a public figure, that story and the content of those leaks really took over.

Reading this on your phone? Stay up to date on Bay Area and Silicon Valley news with our new, free mobile app. Get it from the Apple app store or the Google Play store.

Like Hearne, Wolfe drew on historical documents for Anthracite Fields. Her score, which won the Pulitzer Prize for music in 2015, riffs on miners names, taps interviews and oral histories and incorporates bits of ads, speeches and childrens rhymes in a moving 21st-century score (the title refers to the type of coal that burns the cleanest.)

Wolfe, a co-founder of Bang on a Can, grew up in Pennsylvania but says she knew little about the coal industry. She started taking the bus on information-gathering trips to coal country, visiting mines and museums and talking to people who were part of that life. She was often surprised by what they told her.

In one poignant movement, the choir sings the names of children the Breaker Boys who worked and perished in the mines. Other movements focus on mining communities the patch towns where workers and their families lived.

I wanted to honor the people who worked in the mines, says Wolfe. I thought this would be a dark piece there were a lot of disasters and difficulties but there were also sunny things. The work comes current in the final movement, which names activities that coal continues to power today.

Surprisingly, neither composer initially thought of these scores as oratorios.

I dont use the word oratorio very often, Hearne said, although I love the old Baroque oratorios, which have a way of telling stories that uses discrete numbers.

When you see the Messiah, youre vaguely aware of the story. Here, we know part of the story. Most people have heard of Chelsea Manning and probably know that the U.S. is engaged in war overseas. But theres no character. Its not lets follow Mary as she gives birth. There are four singers, and they all sing the words that came from several different people. They all sing Mannings words at one point. They sing words that were written by Department of Defense officials. So its really up to us to piece together the story. Thats why I call it an oratorio.

Wolfe notes that contemporary works are often harder to categorize. These names are kind of fluid, she said. Like Einstein at the Beach is it an opera? Sometimes things are called something afterwards. With this piece, I almost retroactively called it an oratorio. I really think of it as a poetic history.

Details

The Source: Feb. 24-March 3; Taube Atrium Theatre, 401 Van Ness Ave., San Francisco; $35; 415-864-3330, http://www.sfopera.com

Anthracite Fields:7 p.m. Feb. 26, Zellerbach Hall, UC Berkeley; $38-$62; 510-642-9988, calperformances.org

Contact Georgia Rowe at growe@pacbell.net.

Excerpt from:
From coal miners to Chelsea Manning the world of oratorios has changed - The Mercury News

Edward Snowden Latest: NSA Whistleblower’s Newest Mission Is Protecting Journalists From Spies – International Business Times

Amid speculation over whether Russia will hand over Edward Snowdento the United States, the National Security Agency whistleblower said he is committed to protecting journalists and their sources from spies, according to an interview conducted by Wired Magazine this week.

Watch the journalists and youll find their sources, Snowden was reported as saying by Wired. So how do we preserve that confidentiality in this new world, when its more important than ever?

Snowden, who is currently exiled to Moscow, has been the president of the San Franciscobased nonprofit Freedom of the Press Foundation (FPF) since last year. He joined the group on the request of journalists Glenn Greenwald and Laura Poitras, who were the first to receive Snowdens leaks, and was soon elected its president. He does not take a salary for the position and has given the organization over $60,000 from his own earnings, the magazine reported.

Edward Snowden speaks via video link during a conference at University of Buenos Aires Law School, Argentina, Nov. 14, 2016. Photo: REUTERS/MARCOS BRINDICCI

No one has more practical expertise when it comes to whistleblower and journalist communications, Trevor Timm, the FPFs executive director, reportedly said. It was the perfect fit.

The Snowden-led group aims at equipping the media to work without the threat of state-sponsored hackers or government surveillanceto carry out the best possible form of investigative journalism. FPF is working on the development of a number of security upgrades for reporters, which will keep their information and sources safe from spies.

Newsrooms dont have the budget, the sophistication, or the skills to defend themselves in the current environment, Snowden told the magazinethrough an encrypted video chat from Moscow. Were trying to provide a few niche tools to make the game a little more fair.

An example of the groups early successis the development of SecureDrop an open-source whistleblower submission system that media organizations can install to securely accept documents from anonymous sources.

Managed by FPF, the system is currently being used by some major media outlets like the Guardian, the New York Times, BuzzFeed, the New Yorker, the Washington Post and the Associated Press, according to its website.

Snowdens name did not figure in the list of 1,715 people granted commutationsby former president Barack Obama before he left office. According to reports, he is not expected to receive a pardon or commutation even underPresident Donald Trump, who once called the whistleblower a terrible guy.

However, this does not seem to deter Snowden from his mission to protect the press.

We cant fix the surveillance problem overnight, Snowden told the publication. But maybe we can build a shield that will protect anyone whos standing behind it.

Read more from the original source:
Edward Snowden Latest: NSA Whistleblower's Newest Mission Is Protecting Journalists From Spies - International Business Times

NSA denies ‘blanket’ spying on spectators and athletes at the 2002 … – Washington Post

The National Security Agency has denied it indiscriminately spied on spectators, athletes and others who attended the Salt Lake City Olympics in 2002.

The denial came in a document filed last week in a U.S. District Court in Utah, where a group of Salt Lake City residents filed a complaint in 2015 alleging the U.S. government engaged in widespread, indiscriminate communications surveillance, interception, and analysis, without warrants and without probable cause during the Games that took place just months after the 9/11 terrorist attacks.

At issue, specifically, is how the Presidents Surveillance Program, or PSP, was implemented during the Games. PSP made headlines after 2013 when the government admitted to collecting a type of information known as metadata in bulk following the publication of classified materials leaked by Edward Snowden.

[New study: Snowdens disclosures about NSA spying had a scary effect on free speech]

In the court document, the NSA and other intelligence authorities admit that the activities actually carried out under the PSP were conducted without warrant or court order or judicial findings of probablecause, but rather, under Presidential and statutory authority, NSA attorney James Gilligan wrote in the filing on Friday.

He added, however, To the extent the allegations of this paragraph exceed the scope of or are inconsistent with the foregoing admissions, they are denied, including, specifically, the allegation that the PSP involved indiscriminate surveillance, interception, or analysis of communications.

Gilligan wrote neither the PSP nor any other NSA intelligence activity involved or evolved into blanket, indiscriminate surveillance of the contents of every email and text message and the metadata of every telephone call sent or received in Salt Lake City, or the vicinity of Olympic venues, during the 2002 Salt Lake City Winter Olympic Games.

Gilligan concluded the filing by asking the court to dismiss the complaint.

The NSAs latest request for dismissal comes just a month after U.S. District Court Judge Robert Shelby refused to dismiss the complaint that was filed by former Salt Lake City Mayor Ross Rocky Anderson on behalf a bipartisan group of individuals. The individuals are not seeking monetary damages.

Because the allegations in the [complaint] are not legal conclusions, bare assertions of the elements of standing, or sufficiently fantastic on their face as to defy reality, the law requires the court to accept them as true when evaluating the NSAs Motion to Dismiss, Shelby wrote in a court filing last month. Though these allegations will undoubtedly be tested as this case proceeds, the court concludes at this early stage that the Plaintiffs have plausibly alleged injury and redressability as required (H/t: Fox 13)

More here:
NSA denies 'blanket' spying on spectators and athletes at the 2002 ... - Washington Post

Gmail v7.2 Prepares to Add Support for S/MIME Enhanced Encryption – XDA Developers (blog)


XDA Developers (blog)
Gmail v7.2 Prepares to Add Support for S/MIME Enhanced Encryption
XDA Developers (blog)
For a while, users of the Android app could only send messages over the default TLS encryption (enabled by default), but in version 7.2 of the Gmail application, it appears that support for sending messages with this enhanced S/MIME encryption may soon ...

See the original post here:
Gmail v7.2 Prepares to Add Support for S/MIME Enhanced Encryption - XDA Developers (blog)

More Than Half of All Internet Traffic Is Now Encrypted – Newsweek – Newsweek

Half of all internet traffic is now encrypted and better protected from eavesdropping, censorship and hackers, privacy activists have said.

Statistics released by Mozilla, the creators of the Firefox web browser, revealed that the average volume of encrypted traffic passed the average volume of unencrypted traffic earlier this month.

The shift comes as more websites switch from HTTP to HTTPSthe protocol over which data is sent between browsers and a website, and the letters that come at the beginning of a web address. Without HTTPS, it becomes easier for hackers and other malicious actors to see or intercept the information web users are reading or publishing.

Try Newsweek for only $1.25 per week

The encryption of more than half of all web traffic is an important milestone in making the web better protected from eavesdropping and hackers. EFF

The Electronic Frontier Foundation (EFF), a non-profit organization that has led the push for tech companies to implement the secure HTTPS protocol, praised the milestone but said more work still needs to be done.

Major websites, including Facebook, Google and Wikipedia, have all adopted HTTPS, but many smaller sites face difficulties implementing it. EFF has developed several tools to make it easier for website owners to implement the protocol by default.

Unfortunately, you can only use HTTPS on websites that support itand about half of all web traffic is still with sites that dont, EFF researcher Gennie Gebhart said in a blogpost. However, when sites partially support HTTPS, users can step in with the HTTPS Everywhere browser extension.

Our goal is a universally-encrypted web that makes a tool like HTTPS Everywhere redundant. Until then, we have more work to do.

Here is the original post:
More Than Half of All Internet Traffic Is Now Encrypted - Newsweek - Newsweek

Confide in me! Encryption app leaks sensitive info from Washington … – SC Magazine UK

Encryption app leaks sensitive info

An encrypted messaging app called Confide is being used in Washington DC by White House staffers to leak embarrassing or sensitive information.

Since US President Donald Trump's inauguration, a steady stream of leaks have been provided by the White House including reports of national security adviser Michael Flynn's unauthorised talks with Russia.

On Thursday, US President Donald Trump vowed to prosecute leakers. We are looking into this very seriously. It's a criminal act, Trump said. He has reportedly ordered an internal investigation to identify how sensitive information about his calls with foreign leaders and national security matters made their way to the press.

Messages sent via the Confide app are automatically deleted, leaving virtually no paper trail.

According to Jon Brod, cofounder and president of Confide, once messages are read, they vanish without a trace. The message is gone forever, it's deleted from our servers, you can't archive, print it, save it, cut and paste it. Again, just like the spoken word, it disappears, Brod said.

The message self-destructs so I can't go back in and try to piece together a number of screenshots into the actual message, and it notifies both the sender and the recipient that a screenshot was attempted, Brod continued.

White House staffers, and possibly other government officials and business executives, worried about being caught leaking information to the media have adopted this app.

They are likely violating the law if they are revealing that information through any means, whether it's through an email or through a disappearing chat app, said Carrie Cordero, a former national security lawyer at the Justice Department.

Confide's privacy features won't totally protect leakers since it still requires them to register their identities.

Sometimes these apps give users a false confidence that they will never be able to be traced, said Cordero. And although the communication in this particular app might disappear, that doesn't mean that the user is necessarily not able to be traced in any way.

Some security researchers are doubtful about Confide's cryptography since the app is not open-source and may use old protocols. Confide's encryption is closed source and proprietary, so no one outside the company knows what's going on within the app. The encryption protocol is based on the PGP standard and the app's network connection security relies on recommended best practices.

One key is always, do you make code publicly available that's been audited where features have been inspected by the security community so that it can arrive at some consensus, says Electronic Frontier Foundation legal fellow Aaron Mackey. My understanding with Confide, at least right now, is that it's not clear whether that's occurred.

Since its inception in 2013, Confide has seen a spike in usage after key security events took place such as the Celebgate scandal, the Sony Pictures hack in 2014, the Russian group leak of thousands of emails belonging to the DNC in 2016 and, of course, the 2016 US presidential election.

Using an encrypted messaging app such as Confide can pose legal concerns. It is the user's responsibility to make sure they abide by the law and use the app strictly for personal communications.

See more here:
Confide in me! Encryption app leaks sensitive info from Washington ... - SC Magazine UK

What It Means to Have an ‘Adult’ Conversation on Encryption – Pacific Standard

In 2017, we need to move past the debate over backdoors.

By Kevin Bankston

Since last summer, Federal Bureau of Investigation Director James Comey has been signaling his intent to make 2017 the year we have an adult conversation about encryption technologys impact on law enforcement investigations. Hes probably going to get his wish, but if a new report from leaders in Congress is any indication, its not going to be the conversation he wants. Rather, as that new report from the House working group investigating the encryption issue recognizes, having the adult conversation about encryption means talking about how law enforcement can adapt to a world where encryption is more common, rather than wrongheadedly forcing the technology to adapt to law enforcements needs.

To Comey, being adult about encryption apparently means agreeing with his conclusion that the existence of unbreakable encryptionfor example, the full-disk encryption that protects your iPhone against anyone who doesnt have your passcode, or the end-to-end encryption that protects your iMessages and Whatsapp texts as they cross the Internetposes an unacceptable threat to law and order. Being an adult, to Comey, means accepting the argument that technology companies should design their products to ensure that the government can access any data it needs in an investigation, whether by building (in the words of his opponents) a backdoor into strongly encrypted products, or by not deploying that encryption in the first place. Being an adult, to Comey, means supporting efforts to legally require tech companies to ensure government access, if they wont do it voluntarily.

When Comey insists that we havent yet had the adult conversation on this issue, hes insulting everyone who has disagreed with himwhich is almost everyone whos voiced an opinion on the subject, that disagreement flowing in an endless stream of expert white papers (issued by adult institutions like the Massachusetts Institute of Technology and Harvard University), editorials, coalition letters, Congressional testimony, National Academies of Sciences proceedings, and more.

Ever since this latest debate over encryption was first sparked in the fall of 2014, when Apple announced that new iPhones would be completely encrypted by defaulta debate that peaked with last years court fight between Apple and the FBI over the locked iPhone of one of the San Bernardino shootersthe clear consensus among experts has been that any kind of mandate on companies to weaken their products security to ensure government access to encrypted data would be devastating to cybersecurity and to the international competitiveness of United States tech companies. It would also be futile, since U.S. companies dont have a monopoly on the technology, making it trivial for bad guys to obtain strong encryption products, no matter what Congress does. It is these exact same arguments that won the day in the Crypto Wars of the 90s when a similar policy debate over encryption arose.

Importantly, its not just privacy advocates and privacy-minded tech experts making these arguments. Opposition to backdoors has been voiced by leaders from the national security and law enforcement establishmentall of them indisputably adults!such as former National Security Agency director and director of National Intelligence Mike McConnell, former NSA and Central Intelligence Agency Director Michael Hayden, former Department of Homeland Security Secretary Michael Chertoff, andin agreement with his fellow members in President Barack Obamas handpicked Review Group on Intelligence and Communications Technologiesformer CIA Director Michael Morrell. And thats just the Michaels! The list of expert adults that have disagreed with Comey at this point is staggeringly long.

Despite that broad consensus, Senators Richard Burr and Dianne Feinstein floated draft legislation last year that would broadly require any provider of any encrypted product or service to be able to produce any encrypted data on demand. Although that bill was almost universally panned at the time, Comey is probably hoping that similar legislation will have a better chance this yearespecially if he has the support of a new attorney general and a new president that appear to share his views, rather than being held back by an Obama administration that chose not to pursue a legislative solution. (Notably, the fact that the Trump administration seems likely to support backdoors is all the more ironic and hypocritical considering the report that high-level Trump aidesalong with key staff for Hillary Clinton, Obama, and many other political figuresare now using the end-to-end encrypted messaging application Signal for fear of being hacked.)

Still, Comey likely will not get his wish, because the long list of people who disagree with him just got longer: As Congress was preparing to depart for its winter holiday, a House Congressional working group tasked with examining the issue of encryption technologys impact on law enforcement issued a year-end report that signaled a major shift in the crypto debate. The working group, established in May as a collaboration between members of the House Judiciary Committee and the House Energy & Commerce Committee, had spent many months meeting with law enforcement, the intelligence community, privacy advocates, security experts, and tech companies, to help guide its bipartisan investigation. The report, signed off on by 10 House members including the top Republican and top Democrat on each of the two investigating committees, came to an unequivocal conclusion: Congress should not weaken this vital technology because doing so works against the national interest, but should instead work to help law enforcement find new ways to adapt to the changing technological landscape.

In particular, the reports authors arrived at four observations, echoing the arguments of Comeys prior opponents: Weakening encryption goes against the national interest because it would damage cybersecurity and the tech economy; encryption is widely available and often open source, such that U.S. legislation would not prevent bad actors from using the technology; there is no one-size-fits-all fix for the challenges that encryption poses for law enforcement; and that greater cooperation and communication between companies and law enforcement will be important going forward and should be encouraged. As next steps, they suggest further investigation into avenues other than backdoors that can help address the challenges that encryption poses to government investigators, including working to ensure that all levels of law enforcement have the information and technical capacity they need to make full use of the wide variety of data that is available to them even without backdoors.

In other words, the key committees in the House that have jurisdiction over the encryption issue have sent a clear signal to Comey, and to his allies in the Senate like Feinstein and Burr: Sorry, but the House is definitely not interested in legislating to require backdoors. How else can we help you? Though news of the report was somewhat buried due to the holiday timing, that signal has now been heard loud and clear across Washington, D.C. The House does not want to waste any more time on childish bickering over backdoors that essentially everyone but the FBI agrees are a bad idea. In 2017, it wants to have the adult conversation that moves beyond backdoors.

Lets hope Comey is listening.

See the article here:
What It Means to Have an 'Adult' Conversation on Encryption - Pacific Standard

World Wide Web Creator Calls for Internet Decentralization & Encryption – The Data Center Journal

When World Wide Web was created in 1989 by Tim Berners-Lee, its purpose was for the web technology to be available to everyone, always, without any patents or royalties. Recently, as the Internet becomes more and more centralized, the creator of the Internet and other people at its heart start calling for a revolution in order to rethink the way that Internet works.

A lot has happened in the years of Internets existence, but the pattern is clear: the tool that was meant to bring profound advance for liberty is too often used by governments and corporations as a means of control. Russia and UK, for example, have passed new intrusive surveillance laws, and China and Vietnam block major websites from their citizens; users are being tracked by corporations and advertisers, and their data is being sold to third parties; Internet giants like Google and Facebook yield big power over the data of all the global Internet users.

Tim Berners-Lee publically speaks against such invasive surveillance laws as UKs Snoopers Charter. According to him and other web activists, the only way to give Internet its original purpose is decentralization and encryption. Some of the so-called Web 3.0 projects are already attracting investors with their idea of more privacy and security.

Blockstack is a startup that is working on open-source software to create a kind of parallel webone powered by the bitcoin blockchain. It hopes to give users more control of their data by avoiding storage with any third-parties. Later this year, Blockstack is planning to release software that will allow surfing this alternative Internet with a regular browser. Its users will generate data by using various services, but the data will not be stored in any of those service databases.

Another example of initiatives aimed at decentralizing the web is MaidSafe, a startup which has spent a decade building a decentralized p2p network, and now allows to create safe websites, store data, host websites and more.

Web 3.0, which could be defined as a platform for decentralized apps, might be the future of the Internet, since decentralization idea is gaining popularity among mainstream developer community. Till then, Internet users must be careful about their Internet privacy, and take initiative to implement available encryption tools.

There already are many existing ways to encrypt ones Internet activities: secure email service providers, such as ProtonMail, or encrypted messaging apps, such as Signal.

One of the must-have encryption services is a VPN (Virtual Private Network). A VPN encrypts all data between a users computer and a VPN server into a secure tunnel. It is important to choose a VPN like NordVPN that doesnt keep any customer logs, offers secure encryption protocols and advanced security solutions like DoubleVPN. A VPN hides a users IP address, disguising the real location, thus giving the user a great layer of protection online from unwanted security threats and/ or surveillance.

At the moment, encryptionbe it via encrypted email, messaging or VPN technologyremains the most secure tool available to protect ones online privacy and security.

For more information, please visit http://www.nordvpn.com.

World Wide Web Creator Calls for Internet Decentralization & Encryption was last modified: February 21st, 2017 by Press Release

Continued here:
World Wide Web Creator Calls for Internet Decentralization & Encryption - The Data Center Journal

Irish unit of open source software developers Red Hat sees profits jump – Irish Times

A Cork-based subsidiary of open source software specialist Red Hat reported a sharp rise in revenues and profits last year, recently lodged accounts show.

Red Hat Ltd, whose parent acquired Irish software firm Feed Henry for 63.5 million in September 2014, recorded a pretax profit of 33.2 million for the 12 months ending February 2016. This compares with a profit before tax of 26.6 million a year earlier.

Turnover for the company, which also has offices in Dublin and Waterford, the latter a result of the Feed Henry acquisition, rose to 430.7 million from 341.2 million a year earlier.

Distribution costs increased to 362.5 million from 289.5 million as administrative expenses rose to 35.8 million from 25.8 million.

The Irish unit employed 98 people during the reporting period with staff costs totalling 17.4 million, as against 13.4 million in the preceding year.

Red Hat Limited is a wholly owned subsidiary of Round Pond, which is incorporated in Ireland. Its ultimate parent is North Carolina-base Red Hat Inc, which reported revenues of 2.05 billion for the year ending February 2016.

Go here to read the rest:
Irish unit of open source software developers Red Hat sees profits jump - Irish Times

How China Mobile Is Using Linux and Open Source – Linux.com (blog)


Linux.com (blog)
How China Mobile Is Using Linux and Open Source
Linux.com (blog)
During the 2016 Mobile World Congress, China Mobile declared that the operational support system running their massive network would be based on open source software. China Mobile is not alone; many major networking vendors are moving to open ...

Continued here:
How China Mobile Is Using Linux and Open Source - Linux.com (blog)