President Trump Calls Chelsea Manning An ‘Ungrateful …

Chelsea Manning had been sentenced to 35 years for leaking military secrets to WikiLeaks. President Obama commuted the sentence shortly before leaving office. AP hide caption

Chelsea Manning had been sentenced to 35 years for leaking military secrets to WikiLeaks. President Obama commuted the sentence shortly before leaving office.

Donald Trump took aim at Chelsea Manning in an early morning tweet on Thursday.

The tweet appears to refer to an op-ed published in The Guardian on Thursday morning, in which former Army Pvt. Chelsea Manning criticizes former President Obama as having been too willing to attempt compromise with his political opponents and being insufficiently progressive. She did not, however, call Obama a "weak leader" in so many words, as Trump's tweet might suggest.

Manning leaked hundreds of thousands of documents to WikiLeaks in 2010 and was subsequently sentenced to a 35-year prison term. After seven years in prison for Manning, President Obama commuted that sentence last week, just before leaving office.

Manning acknowledged that Obama's opponents were unusually obstinate, writing that the former president "faced unparalleled resistance from his opponents, many of whom wanted him to fail." However, Manning excoriated Obama for, in her eyes, compromising too much on health care and foreign policy, and she called for "a strong and unapologetic progressive" to lead the United States.

It wasn't clear whether Trump's tweet was intended to come to Obama's defense Trump, after all, has slammed the former president on many occasions. Rather, it may have been an opportunity to both criticize Manning and draw attention to criticism of Obama criticism coming from someone whom Obama recently prevented from serving around 28 more years in prison, no less.

Likewise, it's not clear whether Trump's tweets were inspired directly by the Guardian column. The tweets came minutes after a Fox News report that could easily have prompted them, as CNN's Brian Stelter tweeted.

Reporting on the column, Fox and Friends First's Abby Huntsman said that "the disgraced former Army private is slamming President Obama as a weak leader with few permanent accomplishments," while the words "ungrateful traitor" appeared at the bottom of the screen, as Mediaite pointed out.

This wouldn't be the first time that Trump's tweets correlate with Fox News segments. As BuzzFeed's Brandon Wall pointed out earlier this week, a recent tweet about violence in Chicago may also have been inspired by a segment on the O'Reilly Factor.

Here is the original post:
President Trump Calls Chelsea Manning An 'Ungrateful ...

Chelsea Manning – The New York Times

Latest Articles

The founder of WikiLeaks said on Thursday he said he would go if his rights were protected, though he is not under public indictment by the United States.

By STEVEN ERLANGER

President Obama did the right thing in granting clemency to Chelsea Manning, and should offer Edward Snowden similar leniency.

By THE EDITORIAL BOARD

Obama should pardon him before a much less thoughtful president, who has spoken of his execution, takes over the machinery of surveillance.

By ALAN RUSBRIDGER

The Army intelligence analyst convicted in a 2010 leak of security documents is set to be freed this May instead of in 2045.

By CHARLIE SAVAGE

The former Army intelligence analyst who disclosed files to WikiLeaks hopes to be allowed to move ahead with her gender reassignment and her life.

By CHARLIE SAVAGE

In Stan Richardsons Private Manning Goes to Washington, the activist hacker Aaron Swartz wants to put on a play inspired by the whistle-blower Manning.

By ELISABETH VINCENTELLI

Ms. Manning has been incarcerated for more than six years, longer than any other convicted leaker in American history.

By CHARLIE SAVAGE

Ms. Manning says she tried to commit suicide at the start of a week of solitary confinement she was serving as punishment for a previous attempt to end her own life.

By CHARLIE SAVAGE

Long before Edward J. Snowden, he showed us how vulnerable digital secrets were.

By YUDHIJIT BHATTACHARJEE

A lawyer for the former Army analyst said the punishment would like exacerbate Ms. Mannings problems and would be appealed.

By CHARLIE SAVAGE

Ms. Manning, who is in military prison for leaking government files, was told the Army will allow the operation.

By JONAH ENGEL BROMWICH

The finding is a symbolic victory for the Wikileaks founder, but may have little if any practical significance.

By SEWELL CHAN and LIAM STACK

This Mark Dendy cabaret explores the story of Ms. Manning, formerly Bradley Manning, who is serving a prison term for leaking documents.

By ALEXIS SOLOSKI

El odio, la discriminacin y la violencia siguen siendo parte de la vida diaria para miles de personas transgnero.

Por CLYDE HABERMAN

As a broader understanding of gender identity emerges, a history of hatred, violence and discrimination continues.

By CLYDE HABERMAN

Ms. Manning, a former Army analyst sentenced to 35 years for leaking documents to WikiLeaks, will write about war, gender and freedom of information.

The militarys backward policy has left Chelsea Manning without essential treatment for more than a year.

An intentional dearth of light, cohesiveness and clarity makes The Source, an oratorio of leaked war logs, the perfect medium for the message.

By ZACHARY WOOLFE

The Bureau of Prisons has rejected the Armys request to accept the transfer of Chelsea Manning, formerly known as Pfc. Bradley Manning, from the military prison at Fort Leavenworth, Kan., to a civilian facility.

The director of the National Security Agency, Adm. Michael S. Rogers, described the steps the agency is taking to ensure that no one else can download the information taken by Edward J. Snowden, a former defense contractor.

By DAVID E. SANGER

The founder of WikiLeaks said on Thursday he said he would go if his rights were protected, though he is not under public indictment by the United States.

By STEVEN ERLANGER

President Obama did the right thing in granting clemency to Chelsea Manning, and should offer Edward Snowden similar leniency.

By THE EDITORIAL BOARD

Obama should pardon him before a much less thoughtful president, who has spoken of his execution, takes over the machinery of surveillance.

By ALAN RUSBRIDGER

The Army intelligence analyst convicted in a 2010 leak of security documents is set to be freed this May instead of in 2045.

By CHARLIE SAVAGE

The former Army intelligence analyst who disclosed files to WikiLeaks hopes to be allowed to move ahead with her gender reassignment and her life.

By CHARLIE SAVAGE

In Stan Richardsons Private Manning Goes to Washington, the activist hacker Aaron Swartz wants to put on a play inspired by the whistle-blower Manning.

By ELISABETH VINCENTELLI

Ms. Manning has been incarcerated for more than six years, longer than any other convicted leaker in American history.

By CHARLIE SAVAGE

Ms. Manning says she tried to commit suicide at the start of a week of solitary confinement she was serving as punishment for a previous attempt to end her own life.

By CHARLIE SAVAGE

Long before Edward J. Snowden, he showed us how vulnerable digital secrets were.

By YUDHIJIT BHATTACHARJEE

A lawyer for the former Army analyst said the punishment would like exacerbate Ms. Mannings problems and would be appealed.

By CHARLIE SAVAGE

Ms. Manning, who is in military prison for leaking government files, was told the Army will allow the operation.

By JONAH ENGEL BROMWICH

The finding is a symbolic victory for the Wikileaks founder, but may have little if any practical significance.

By SEWELL CHAN and LIAM STACK

This Mark Dendy cabaret explores the story of Ms. Manning, formerly Bradley Manning, who is serving a prison term for leaking documents.

By ALEXIS SOLOSKI

El odio, la discriminacin y la violencia siguen siendo parte de la vida diaria para miles de personas transgnero.

Por CLYDE HABERMAN

As a broader understanding of gender identity emerges, a history of hatred, violence and discrimination continues.

By CLYDE HABERMAN

Ms. Manning, a former Army analyst sentenced to 35 years for leaking documents to WikiLeaks, will write about war, gender and freedom of information.

The militarys backward policy has left Chelsea Manning without essential treatment for more than a year.

An intentional dearth of light, cohesiveness and clarity makes The Source, an oratorio of leaked war logs, the perfect medium for the message.

By ZACHARY WOOLFE

The Bureau of Prisons has rejected the Armys request to accept the transfer of Chelsea Manning, formerly known as Pfc. Bradley Manning, from the military prison at Fort Leavenworth, Kan., to a civilian facility.

The director of the National Security Agency, Adm. Michael S. Rogers, described the steps the agency is taking to ensure that no one else can download the information taken by Edward J. Snowden, a former defense contractor.

By DAVID E. SANGER

Read the rest here:
Chelsea Manning - The New York Times

Cryptography for Network and Information Security

Cryptography is a cornerstone of the modern electronic security technologies used today to protect valuable information resources on intranets, extranets, and the Internet. Microsoft Windows2000 includes a wide range of distributed security technologies that you can deploy to provide cryptography-based network and information security. Understanding the basic concepts, components, and risks of cryptography-based security is important in choosing and planning appropriate network and information security systems for your organization.

What Is Cryptography?

Basic Components of Modern Cryptography

Basic Components of a Public Key Infrastructure

Risk Factors for Cryptography Systems

Cryptography Export Restrictions

For information about security solutions that use public key technology, see "Choosing Security Solutions That Use Public Key Technology" in this book.

For more information about the Windows2000 public key infrastructure and Certificate Services, see "Windows2000 Certificate Services and Public Key Infrastructure" in this book.

For more information about designing, testing, and deploying a public key infrastructure, see "Planning Your Public Key Infrastructure" in the Microsoft Windows 2000 Server Resource Kit Deployment Planning Guide .

See the original post here:
Cryptography for Network and Information Security

Wikileaks | The Huffington Post

NEWS

WorldPost

Highline

Science

Education

Weird News

Business

TestKitchen

Tech

College

Media

Pollster

Heroin Epidemic

Donald Trump

Racial Inequality

US Senate

Election Results

HuffPost Hill

Police Brutality

Hate Crimes

Supreme Court

Congress

So That Happened

Entertainment

Comedy

Celebrity

TV

Arts + Culture

Backspace

Movies

Black Voices

Latino Voices

Women

Fifty

Queer Voices

Parents

Arts + Culture

Black Voices

Books

Business

Candidate Confessional

Celebrity

College

Comedy

Crime

Divorce

Dolce Vita

Eat the Press

Education

Election Results

Entertainment

Fifty

Good News

Green

Healthy Living

Highline

Home

Horoscopes

HuffPost Data

HuffPost Hill

Impact

Latino Voices

Media

Outspeak

Parents

Politics

Pollster

Queer Voices

Religion

Science

Small Business

So That Happened

Sports

Style

Taste

Tech

Teen

TestKitchen

Travel

TV

Weddings

Weird News

Women

WorldPost

FEATURED

Hawaii

OWN

Paving the Way

The Power Of Humanity

Sleep + Wellness

What's Working: Purpose + Profit

POLITICS

Tom Williams via Getty Images

COMEDY

POLITICS

Orlando Sentinel/Getty Images

WORLDPOST

Anadolu Agency via Getty Images

SUBSCRIBE TO & FOLLOW TRUMP'S FIRST 100 DAYS

How will Donald Trumps first 100 days impact YOU? Subscribe, choose the community that you most identify with or want to learn more about and well send you the news that matters most once a week throughout Trumps first 100 days in office. Learn more

Continue reading here:
Wikileaks | The Huffington Post

osalt.com – Find Open Source Alternatives to commercial software

Today the future of internet begins - and open source is ready Companies world-wide start to embrace the new standard for communication on the internet; the Internet Protocol version 6 - also known as IPv6. IPv6 will at some point replace existing IPv4 which have been used to transport our data through the internet for more than 30 years.

The main reason to switch is that IPv4 only allows around 4 billion internet addresses. In order for one device to communicate with another on the internet each of them has to have a unique internet address (IP address). With the number of devices currently on the market - computers, smartphones, smart tvs and set-top boxes - we are already out of addresses. However, clever manipulation allows some devices to share IP addresses with other devices, but this is not an ideal situation. The sharing of addresses makes it difficult for devices to communicate freely on the internet, thus limited functionality.

IPv6 solves the IP address issue simply by introducing a new type of IP address that can handle 3.4e+38 - or 4 billion times 4 billion times 4 billion times 4 billion. It a huge number - difficult for most people to understand. But lets just assume that we will not be running out of IP address ever again.

Today (6/6/12) was been chosen by the Internet Society to mark the launch of IPv6 . IPv6 has been around for many years but the deployment very limited - and mainly used for research within companies and institutions. ISP, hosting providers and other companies on the internet have been repluctant to start offering services on IPv6, primarily because of the investment required both in hardware, software and training.

The Internet Society on the other hand has tried to initiate a movement encouraging ISP, webiste and hardware vendors to take the leap to IPv6 anyway - and thus promote their businesses by using cutting-edge technology.

Another reason why IPv6 has taken such a long time to be accepted is that it is not compatible with IPv4, even though they can exist side by side. But not being compatible means that every piece of software communicating on the internet has to be re-written to support IPv6. Luckily, a lot of software already supports IPv6 - and especially open source software. The communities around each of the open source projects have a natural interest to support new features; and many projects strive to be forerunners in these areas.

On Open Source Alternative we have tagged each open source project that supports IPv6 with an IPv6 tag - making it easy to see and search for software that supports IPv6. A list of all IPv6 enabled open source projects is available here: Open source alternatives with IPv6 support

One of the most important projects is Apache - the open source web server that hosts almost 2/3 of all websites on the internet. Apache is also the web server used by Open Source Alternative to make our website available on both IPv4 and IPv6. The software, however, gets you nowhere, unless your hosting provider also supports IPv6, which is the reason why Osalt switched to Linode VPS for great hosting and IPv6 connectivity to the internet.

On the other end of a connection to an IPv6 webserver is of course an IPv6 web browser. Again, the open source community has the answer in terms of Firefox and Google Chrome.

If you want to explore the new world of IPv6 - either check if you ISP offers IPv6 or visit http://www.tunnelbroker.net/

Finally, you can also just wait, because sooner of later IPv6 will come to you...

Nevernote was created in response to popular demand of Linux users. A clone of Evernote, it was originally intended for Linux but can also run on Windows. Nevernote is a note-saving program that also lets you save photos, sound files and documents.

One of the first things a person will notice is that the interface, written in Java, is not slick and attractive. It is, however, very functional and does exactly what it is supposed to do. The interface is very easy to interact with and largely self-explanatory, making for a very short learning time. You'll see different sorting options; for instance, if you click on a tag like "business meetings" you will see all the notes you've made for that subject as well as photos you took of presentation material, etc. In the largest space on the screen the actual note you selected appears.

Nevernote will sync your notes and other saves across all your computer, iPad and SmartPhone. You can save notes, photos, anything you see or hear and even leave yourself a voice memo if you like. Just type a note and it is saved automatically.

At this time, Nevernote doesn't have Ink Notes; you cannot write in cursive or print and have it show up on your Android or be able to edit them on your iPad. However, you can make ink notes on your computer and file them for future reference. You will also find that the search function is adequate but the more specific you are in titling your notes the easier it is for the search function to find them.

Nevernote is an easy to use, viable alternative to those Linux users who want a program nearly exactly like Evernote.

It has a GUI (graphical user interface) based on Qt framework and its 3D viewer allows quick rendering of 3D scenes. It is simple to use and easy to quickly figure out its special functions.

For instance, FreeCAD has a plugin/module framework, divided into the core software and modules that can be added when they are needed. Geometry types and nearly all the tools are stored in the modules that can be added or taken off as needed. Tools are grouped around workbenches so that only the tools you need are displayed according to the task you are doing. This provides an uncluttered workspace that is both functional and easy to work with.

This 3D CAD modeler has the ability to sketch in 2D or to take details from a 3D model and create 2D production drawings. Its focus is not specifically on 2D drawings or animation although it does have advanced motion simulation features; it is very adaptable and can be used in a broader area than software like Cinema 4D or Maya.

A user can create a collection of parts and manipulate it with open or closed 3D loops. The parts can be connected with motors, springs, joints, torques or gravity; a multibody dynamics analysis can be used to predict its motion according to the laws of gravity.

Continue reading here:
osalt.com - Find Open Source Alternatives to commercial software

Trump calls Chelsea Manning ‘ungrateful TRAITOR’ after Obama …

"Ungrateful TRAITOR Chelsea Manning, who should never have been released from prison, is now calling President Obama a weak leader. Terrible!" Trump wrote in a post.

Trump appeared to be responding to an op-ed in the Guardian that Manning shared on Twitter on Wednesday in which she wrote that Obama's presidency had been insufficiently progressive.

"Takeaway from the @BarackObama legacy: What we need is a strong #unapologeticprogressive to lead us," Manning wrote in a tweet that linked to her piece.

Manning's op-ed does not specifically call Obama a "weak leader," but Trump's tweet was sent minutes after a Fox News discussion aired, which featured a banner that read "UNGRATEFUL TRAITOR," and Fox News commentator Abby Huntsman described Obama "as a weak leader with few permanent accomplishments."

Manning, a transgender woman, was serving a 35-year sentence at Fort Leavenworth, having been convicted of stealing and disseminating 750,000 pages of documents and videos to WikiLeaks. But she was stationed at an all-male Army prison in eastern Kansas, despite her request to transfer to a civilian prison.

Chase Strangio, an attorney for the American Civil Liberties Union, which represented Manning, said he was "relieved and thankful" Obama commuted her sentence, and Amnesty International also cheered news of Manning's commutation. Obama's White House released a statement last week saying her prison sentence is set to expire on May 17.

Trump was harshly critical of government leaks during his presidential campaign, even as he repeatedly praised WikiLeaks for disseminating damaging documents that were stolen from the rival campaign of Hillary Clinton. In response to the news that Manning had been pardoned during Obama's final week, White House press secretary Sean Spicer told reporters that Trump was "troubled" by the commutation.

CNN's Brian Stelter, Sara Murray and Jeremy Diamond contributed to this report.

Here is the original post:
Trump calls Chelsea Manning 'ungrateful TRAITOR' after Obama ...

The Best Email Encryption Software of 2017 | Top Ten Reviews

Our editorial staff evaluates products and services independently, but Top Ten Reviews may earn money when you click on links. Learn More

Send and Receive Secure Emails

Email security and encryption software does more than just encrypt emails. Depending on the solution, you can send compliant email transmissions, thwart data loss, secure proprietary information and instill client confidence. In addition, imposed encryption points range from one-click options to enforced policy-based encryption methods. Although many industries in the past required faxing of sensitive information, nowadays many email encryption services provide compliant encrypted email options that are even more secure than traditional faxing and much more convenient.

Beyond email security, secure email software also provides tools to help with compliance, legal inquiries and tracking. The best email security software provides an administration console, compliance reports, sortable email logs, email trackers, email expiration dating, and archiving technology. Many are also compatible with all email types, DLP filters, security software and mobile email.

To learn more about what email security services can offer check out our top rated products. See HP SecureMail, if you are looking to integrate email encryption with your established business applications. For exceptional ease of use from admin to recipient, see DataMotion. If you are looking for DLP tools combined with email encryption, see Proofpoint. To learn more about email encryption, see our articles on email encryption software.

The first consideration with email security software is the encryption point. Small businesses may trust employees to decide which emails need to be encrypted. In this situation, a desktop or cloud-based solution will work. Other companies may benefit from removing the decision from the employee by using policy-based filters. This encrypts emails after they leave the employee's desktop at the point where they pass through the mail server, gateway, appliance or web portal, based on your company's policy filters.

Other considerations include the integrations and compatibilities you require, such as Outlook plugins, mobile phone emailing, email protocols and archiving methods. You will also want to select a solution that provides the encryption methods your business and clients require. Most services support OpenPGP and S/MIME encryption methods and provide access to other types of email security, such as AES and certificates if requested. Another consideration is the recipient experience. You want to look for a secure email solution that provides a simple and quick way for your customers and recipients to access secure messages.

Here are the criteria we used to compare email encryption software:

Security If your company is bound by compliance or regulatory requirements, you need to ensure that the email encryption service you use can satisfy your security standards. All email encryption software secures emails. However, most secure email services offer a range of security options, such as user-initiated and policy-based encryption. Some will even block email from sending messages that contain non-sharable information. If the service stores your email data and interactions for your company, they should take precautions to secure their data center(s). We compared a wide range of security features and rated highest those that not only encrypt email, but also those that provide additional layers of security.

Recipient Experience While security is critical, you do not want it to inconvenience your customers. We looked for encryption software with features that make the recipients' experience hassle free. The encryption programs that are simplest to use do not require your customers to download software or maneuver through a complicated process to receive secure messages. We rated highest the software that also allows recipients to send secure return emails and easily request passwords without your administrator having to manage the request.

Administration Tools Competitive email encryption software for small businesses and larger companies should supply a powerful, simple to use administration console. We compared services and the tools they offer for managing emails, creating reports, sorting emails, deploying software and configuring policies. The best software provides simple or even automatic deployment options and preconfigured policies that support common regulatory constraints.

Integrations & Compatibility Most companies do not run email encryption software independently. To be truly useful and efficient, it should function alongside popular business solutions such as Salesforce, GroupWise and security software. It also ought to work across platforms with all email types, regardless of the device type (PC, mobile phone or tablet). Top encryption tools also work in conjunction with content and internet filters, as well as eDiscovery and archiving methods. We rated highest the encryption software that is compatible with all popular platforms and commonly used business applications.

Unless you only need encryption software for one seat, you will want to do your share of research before contracting with an email encryption service. We suggest that you peruse our reviews, identify your top three candidates and then contact those companies for a customized quote. Their sales teams and account managers should be able to help you identify the best method for providing the type of email security that would work best for your company and its regulatory requirements.

Read the original here:
The Best Email Encryption Software of 2017 | Top Ten Reviews

EverGreenCoin – Environmental Green Causes, nurtured by …

What is EverGreenCoin?

EverGreenCoin is much more than a new currency, a new 'cryptocurrency' as it's called. Cryptocurrency is a sort of digital money that can be used as a store of value or in exchange for goods and services. The EverGreenCoin currency itself is only the mechanism leveraged to nourish our more important focus, taking responsible care of our environment and the world we live in.

EverGreenCoin is a decedent of Bitcoin and EverGreenCoin inherited some great traits from its ancestors. Traits like being able to transfer anywhere in the world with near zero fees, regardless of borders. Zero risk to personal information loss or theft because personal information is never required. Zero manipulation by governments and banks because EverGreenCoin is not printed, or 'mined' as the case may be, out of thin air. Rather the supply is finite, predetermined, rates never change, and only the free market dictates its price. But we, the environmentally awake, will determine its true value.

EverGreenCoin has taken its ancestral traits and built upon them, and in ways more friendly for both our planet and the people storing, spending, and receiving value with EverGreenCoin. In large part, this comes from Proof of Stake mining. Proof of Stake replaces the Proof of Work methodology for making transactions happen and securing the record of transactions that have happened in the past. This record is called a blockchain. For maintaining the blockchain through mining, you are rewarded and this is true for both Proof of Work and Proof of Stake.

The difference is that with Proof of Stake, you are not wasting electricity and taking a gamble on what your reward amount might be. With EverGreenCoin your reward is always 7% annual and the energy consumed is no greater than running a word processor on your computer and can be done in the background during times you already have your computer on.

EverGreenCoin is also much faster than Bitcoin. Transaction on the EverGreenCoin network are fully confirmed, which means fully received and spendable, faster than a Bitcoin transaction would get its first confirmation. In what Bitcoin could transfer in an hour, EverGreenCoin could do 10 times over again. Actually 100 time, because of EverGreenCoin's larger blocks also.

Neither traditional banking system nor Bitcoin can give you what EverGreenCoin gives you. In addition, you are helping yourself and all living things by increasing asset potential for EverGreenCoin's environmental aspirations.

It is free to make an EverGreenCoin account. You do not need to surrender any personal information. You do not need a credit check. There are no age or border restrictions. You do not need to make an account on this website, but it is encouraged as it will allow you to communicate with like-minded people. Click here for help deciding which solution is best for your needs.

Read more here:
EverGreenCoin - Environmental Green Causes, nurtured by ...

NSA Not Spying On Canadians, But The ‘Five Eyes’ Are

A secret court authorization allows the NSA to spy on all of the worlds countries except four, one of them being Canada, according to U.S. government documents obtained by the Washington Post.

The NSA automatically filters out phone calls from Britain, Canada, Australia and New Zealand, the Post reports, essentially making those the only countries in the world the U.S.s electronic spy agency isn't authorized to monitor.

The documents came by way of a leak from NSA whistleblower Edward Snowden. They show the U.S.s Foreign Intelligence Surveillance Court authorized NSA surveillance of 193 countries. Only those four countries are missing from the list.

But that doesnt mean Canadians are immune from mass surveillance. The reason the NSA skips over these four countries is that they, along with the U.S., are members of the Five Eyes, a Cold War-era alliance that allows the five countries to share signals intelligence amongst themselves.

Critics of the program say the Five Eyes alliance is essentially a runaround of these countries privacy laws, which forbid warrantless surveillance of their own citizens. Surveillance on a given country is carried out by one of the other partner countries, they allege.

In an interview with German media, Snowden described the Five Eyes as something that has evolved into a supra-national intelligence organization that doesnt answer to the laws of its own countries.

An earlier leak of NSA documents from Snowden indicated Canadas electronic spy agency, CSEC, helped monitor communications during the G20 conference in London in 2009.

CSEC says its mandate is foreign surveillance and it only incidentally spies on Canadians. It argues a lot of its spying, often at the request of the U.S., is necessary for government to have a clear idea of what is going in the world, in order to make proper decisions.

But John Adams, who headed up CSEC from 2005 until 2011, said in media interviews he shut down a dragnet surveillance program that appeared to be targeting Canadians, among others.

The same year Adams stepped down, then-Defence Minister Peter MacKay authorized the re-start of a program that, according to documents obtained by the Globe and Mail, allows CSEC to monitor electronic communications, including those of Canadians, for patterns of suspicious activity.

Its not clear if the restarted program is the same as the one Adams shut down.

The Harper government has significantly ramped up spending on electronic communications, nearly doubling CSECs funding in just the most recent budget. The agency is slated to receive $829 million in 2014-15, up from around $444 million the year before.

The feds are also spending some $1.2 billion on CSECs new headquarters in Ottawa, a state-of-the-art "spy palace" believed to be the most expensive government building ever built in Canada.

Close

Canada's electronic eavesdropping agency, CSEC, is getting a new $1.2-billion headquarters in Ottawa, the most expensive government building ever built. Here are some illustrations of the finished building.

NEXT ON HUFFPOST: 24 SUSSEX DRIVE, THE PRIME MINISTER'S RESIDENCE

ALSO ON HUFFPOST: THE COOLEST HOUSES FOR SALE IN CANADA

This newly-built home just northwest of downtown Calgary not only looks cool and has excellent views of the city, it features some pretty slick amenities, such as built-in kitchen appliances, a 1,500-bottle wine cellar and five bedrooms across 5,300 square feet of living space.

This house in Montreal's old-money Westmount area was built in 1857 and, with its awesome wrap-around porch, may be the coolest heritage residential building for sale in Canada right now. It's actually three units -- a main house, a townhouse in the back and what's referred to as the "well house." Three bedrooms and two baths in the main house.

Can you say house with a view? This four-bedroom property features not only one of the best views out of anyone's living room window in the country, it also has an outdoor pool, sunk slightly below house level, with views all its own. Four bedrooms and an elevator in this house the realtor describes as an "amazing entertainment home."

Located in Vancouver's (now) prestigious neighbourhood of Kerrisdale, this house is described by the realtor as "an expression of West Coast Modernism." We're not sure what that means, but this house's situation next to an elegant outdoor pool is certainly eye-catching. Four bedrooms on 5,200 square feet of living space.

The coolest thing about this house is the location -- look at where it's sitting! Not for the faint of heart, this eight-year-old house sits perched 90 feet above the Atlantic Ocean on the Nova Scotia coast. Five bedrooms in this property that sits on 16 acres of land.

This house may look like a remade 19th-century train station, but look carefully: There's a two-car garage on one side. The house is actually only four years, and situated in pleasant Bedford, outside Halifax. The house features an elevator to the second floor, and a master bedroom with fireplace and six-piece ensuite bathroom.

Designed by Ottawa architect Barry Hobin, this 3,300-square-foot house near the city's ritzy Rockcliffe Park neighbourhood features a sixty-foot-high domed skylight and some pretty non-standard layouts.

From above, this house is shaped almost like a hexagon, but that's not the only cool thing about -- it's also located on an outer beach not far from St. John's. Dubbed "Burnt Island," the property is made of red cedar log and features three bedrooms in 3,100 square feet of living space.

This house's a unique take on the Roman column look is certainly controversial, but for those who do like the look, the home is a winner. Twelve thousand square feet of living space in this house with seven bedrooms, including two loft bedrooms, a rec room, an exercise room, a sauna and a wet bar.

The realtor describes this as a "modern day Mad Men entertainer's home," and there is definitely something "retro-modern" about this three-bedroom, 4,200-square-foot bungalow. The house has a "covered outdoor living room" -- only in Vancouver could you find that in Canada -- that features a pool with a hardtop.

This house that the realtor boasts was featured in Architectural Digest is something increasingly seen in the dense inner cores of Canadian cities -- modern architecture reflecting the traditional houses nearby. Promos for the house promise a "New York Upper East Side feel" in this five-bedroom property.

It may not look it from its industrial-modern design, but this house is, according to the realtor, a ravine oasis. Located in the city's upscale Lawrence Ave. area, the house features a 23-foot ceiling in the foyer, a glass spiral staircase, an indoor squash court and a sauna on 5,100 square feet of living space.

Not many pictures available of the exterior of this house, but just look at this pool! Possibly the awesomest indoor pool in a private residence in Canada. The rest of the house ain't bad, either: 12,000 square feet of living space, with nine bedrooms and 10 baths, a 25-foot-high ceiling at the main entrance, and underground car parking.

This is a huge house -- more than 8,500 square feet of living space. Besides the eye-catching front entrance, the house features a 22-foot barrel vaulted entrance and more than 500 feet of private waterfront. There's also a three-car garage.

The realtor promises an "indoor and outdoor lifestyle" in this oceanfront house in West Van. The house's three levels overlook a central atrium and the lower level features a heated swimming pool and jacuzzi. The house has an elevator, naturally, and a boat ramp.

Located about 100 kilometres outside Montreal, this summer "cottage" is located on a private peninsula on Lac du Nord. The house features an infinity pool, a wine cellar, and a movie theatre. And oh yeah, there are bedrooms too, six of them.

Go here to see the original:
NSA Not Spying On Canadians, But The 'Five Eyes' Are

Disgrace: Obama Commutes Bradley Manning’s Sentence …

Im not surprised, but Im still deeply disappointed:

WASHINGTON President Obama on Tuesday largely commuted the remaining prison sentence of Chelsea Manning, the army intelligence analyst convicted of an enormous 2010 leak that revealed American military and diplomatic activities across the world, disrupted the administration, and made WikiLeaks, the recipient of those disclosures, famous.

Manning is transgender and now goes by the name Chelsea after entering the Army as Bradley. He deployed to Iraq as an intelligence analyst, where he copiedand ultimately disclosed a vast number of military and diplomatic files, including detailed, classified accounts of American military operations in Iraq and Afghanistan.

While the New York Times tries to underplay the significance of the leak by noting that the documents were merely classified at the secret level, it at least partially acknowledges the gravity of the breach:

The disclosures set off a frantic scramble as Obama administration officials sought to minimize any potential harm, including getting to safety some foreigners in dangerous countries who were identified as having helped American troops or diplomats. Prosecutors, however, presented no evidence that anyone was killed because of the leaks.

Let me put this more plainly. He disclosed details of American military operations, the identities of American military allies, and placed sensitive American diplomatic relationships at risk. We may never know exactly how much damage he did.

No matter how troubled Manning is (and hes certainly troubled), he breached faith with his brothers in arms. Armies depend on bonds of trust, and he knowingly and intentionally placed lives in danger by indiscriminately placing our nations secrets in the public domain. He risked American lives. He risked allied lives.

Its not that long ago that actions like Mannings would merit execution, and he should be grateful that he merely received a 35 year sentence. Instead, however, both the Times and the Obama administration treat him more like a messed-up kid than a soldier who betrayed his nation. Heres the Timesstake:

The decision by Mr. Obama rescued Ms. Manning, who twice tried to commit suicide last year, from an uncertain future as a transgender woman incarcerated at the male military prison at Fort Leavenworth, Kan. She has been jailed for nearly seven years, and her 35-year sentence was by far the longest punishment ever imposed in the United States for a leak conviction.

More:

The commutation also relieved the Department of Defense of the difficult responsibility of her incarceration as she pushes for treatment for her gender dysphoria including sex reassignment surgery that the military has no experience providing.

Manning isnt a woman in need of rescue. Hes a soldier who committed serious crimes. He wasnt a whistleblower, as many of his defenders claim. He just dumped hundreds of thousands of classified documents into the public domain for the purposes of worldwide discussion, debates, and reforms without the slightest regard for the lives of others. There is no excuse.

Manning is a traitor who pled guilty to a lesser offense to avoid the full penalty for his crimes. He has received too much mercy already. Obamas commutation of his sentence is a disgrace.

See original here:
Disgrace: Obama Commutes Bradley Manning's Sentence ...