Chelsea Manning Petition Reaches Threshold for White House …

Imprisoned U.S. soldier Chelsea Manning US Army - AFP - Getty Images

Manning was arrested in 2010 for leaking more than 700,000 military and State Department documents to Wikileaks and sentenced to 35 years in 2013 in military court. At the time she was known as Bradley Manning and has been held in a men's prison facility.

President Obama and his administration have 39 more days in office before the inauguration of President-elect Donald Trump.

The American Civil Liberties Union

"The sole relief that Ms. Manning is seeking is to be released from military prison after serving over six years of confinement longer than any whistleblower in the history of our country," the ACLU said in the letter which was co-signed by more than a dozen gay-rights groups.

Manning's lawyers formally petitioned President Obama to commute her sentence in November, according to a statement

A military doctor treating Manning

Manning

Go here to read the rest:
Chelsea Manning Petition Reaches Threshold for White House ...

Wikileaks Reveals Long List of Media Canoodling with Hillary …

SIGN UP FOR OUR NEWSLETTER

Here is a list of some of media actions that have been exposed, so far.

SIGN UP FOR OUR NEWSLETTER

Spanish Language network Univision went on the offensive against Donald Trump almost immediately, leading to a contentious relationship that led to anchor Jorge Ramos being tossed from a Trump a news conference in Iowa in August, 2015.

Now the Miami Herald has reported that Univisions chairman and Hollywood media mogul Haim Saban pushed the Clinton campaign to take on Trump.

Now, a series of emails pirated from the Democratic National Committee and published in the past week by the anti-secrecy website WikiLeaks show that within days of Trumps June 16, 2015, announcement of his candidacy, Univisions chairman, Haim Saban, was urging the Clinton campaign to take a tougher stance on Trumps anti-immigrant agenda.

Haim thinks we are underreacting to Trump/Hispanics. Thinks we can get something by standing up for Latinos or attacking Rs (Republicans) for not condemning, Clinton campaign Chairman John Podesta wrote July 3, 2015, in an email to other Clinton staffers.

The email drew an immediate response from Jennifer Palmieri, a former White House spokeswoman who is communications director for the Clinton campaign: Haim is right we should be jamming this all the time.

In statement, Sabans spokeswoman, Stephanie Pillersdorf, acknowledged Saban has been a supporter of Hillary separate and way before his involvement with Univision, but said that played no factor in Univision coverage and emphasized that point by saying, Not even one iota. Zero, zero, zero.

Saban also denied any influence over the company hes chairman of in another email Wikileaks published. The Herald reports:

When the conservative Hot Air website published an article headlined Univisions pro-Hillary boosterism that called the network Clintons not-so-secret weapon, Saban jotted a quick email to the campaigns staff: I have nothing to do with it. I NEVER tell our news DEP what to cover . . . unlike some of my peers.

That brought a response from Huma Abedin, a close aide to Clinton: Welcome to our world!

But BloombergBusinessWeek magazine put Saban on its cover in October, while highlighting his close ties to Clinton and his business and political clashes with Donald Trump.

Last year, Univision disclosed that it had a plan to enable Televisa, which now owns almost 10percent of the company, to increase its position to as much as 40percent. But that would require the approval of the Federal Communications Commission, which must review any proposal to raise foreign ownership of a U.S. broadcast company beyond 25percent. To pull this off, Saban needs a supportive administration in Washington. Hillary is more likely to bless any expansion of foreign ownership between the two than Trump is, says veteran media analyst Porter Bibb.

John Harwood is a liberal contributor to The New York Timesand a CNBC correspondent who was chosen to moderate one of the Republican primary debates. Wikileakss emails have shown he tried to be an informal advisor to Hillary Clintons campaign.

One topic of concern was the scandal over Hillary Clintons private email server. As Breitbart News reported:

On July 24, 2015, the day that theTimes and other news outlets reported that an investigation by the inspectors general of the State Department and other federal agencies had concluded that Clinton had classified information on her private email server, contrary to her earlier public statements, Harwood emailed Podesta and Clinton aide Jake Sullivan, reassuringly: set aside process if theres any specific/plausible suggestion of nefarious email @HillaryClinton was trying to hide, I havent heard it.

On Oct. 1, the day after the State Department released another batch of Clintons recovered emails, Harwood emailed Podesta: how are you feeling about where things stand? Podesta replied: Battered but ok. Harwood replied: Sounds right to me.

Later that month, on Oct. 28, Harwood would go on to moderate the third Republican primary debate, and delivered a performance so obviously biased that even liberal commentators had to admit he had proven conservative suspicions correct. Harwood did not ask about Clintons emails.

Harwoods co-moderator at that Republican Primary Debate was Rebecca Quick, the co-host of CNBCs Squawk Box and anchorwoman of On the Money.

One Wikileaks email revealed Quicks pledge to cheerlead for Sylvia Mathews Burwell, President Barack Obamas nominee for the secretary of the Department of Health and Human Services.As Breitbart News reported:

In the April 11, 2014, e-mail, [Erskine] Bowles wrote to Quick to praise Burwell in the wake of the negative news coverage surrounding the appointment. I listen to some of the talk today about Sylvias move to HHS, wrote Bowles. As you may recall, I picked Sylvia and John Podesta to be my two Deputy Chiefs of Staff. I picked Sylvia not only because she is brilliant (Rhodes), really Becky Quick like nice, informed and smart, but most importantly to me she knows how to run a large organization and run it effectively. Regardless of your politics, any American should be glad that the President picked someone so competent to head such a critically important agency.

Less than three minutes later, Quick promised to defend Burwell. Thanks so much for the noteanyone with your recommendation is good by me, wrote Quick. Wish Id seen this earlier while we were still blabbering! Im out the first two days of next week but will make sure to defend her when things get further along in the nomination process.

Bowles later forwarded the e-mails to Podesta, who thanked him, writing, This will help a lot and I think at the end of the day most of these Senators will come through At any rate, thanks for coming thru as you always do. Love to Crandall and hope youll come to the Casa Podesta upcoming dinner to celebrate Sylvias swearing in.

Erskine Bowles is the former president of the University of North Carolina and the former chairman of Obamas National Commission on Fiscal Responsibility and Reform.

Glenn Greenwald and Lee Fang reported at The Intercept on documents that they were given exclusively by hacker Guccifer 2.0 which detailed how political writer Maggie Haberman has helped the Clinton family.

OneJanuary 2015 strategy document designed to plant stories on Clintons decision-making process about whether to run for president singled out reporter Maggie Haberman, then of Politico, now covering the election for the New York Times, as a friendly journalistwho has teed up stories for them in the past and never disappointed them. Nick Merrill, the campaign press secretary, produced the memo, according to the document metadata.

That strategy document plotted how Clinton aides could induce Haberman to write a story on the thoroughness and profound introspection involved in Clintons decision-making process. The following month,when she was at the Times, Haberman published two stories on Clintons vetting process; in this instance, Habermansstories were more sophisticated, nuanced, and even somewhat more critical than what the Clinton memo envisioned.

The story from The Interceptalso shows how the Clinton campaign plants surrogates in the media, often who are on the Family Team.

Other documents listed those whom the campaign regarded as their most reliable surrogates such as CNNs Hilary Rosen and Donna Brazile, as well as Center for American Progress President Neera Tanden but then also listed operatives whom they believed were either good progressive helpers or more potentially friendly media figureswho might beworth targeting with messaging. The metadata of the surrogate document shows the file was authored by Jennifer Palmieri, the communications director of the campaign. As The Intercept previously reported, pundits regularly featured on cable news programs were paid by the Clinton campaign without any disclosure when they appeared; several of them are included on this surrogates list, including Stephanie Cutter and Maria Cardona.

In March 2015, The New York Times reported that Bill Clinton was causing trouble for the campaign by speaking off-script. In response, John Harris, Politicos top editor, sent an email to Jennifer Palmieri, Clinton chief flack.

*From:* John Harris

*Date:* March 29, 2015 at 12:03:13 PM CDT

*To:* jennifer.m.palmieri@gmail.com *Cc:* tom@tfreedmanconsulting.com

*Subject:* *You should hire me for this*

WILL BILL GET A MINDER? NYT A1, Clinton Team Hopes to Keep Bill at His Best, by Patrick Healy and Amy Chozick: In hopes of collaborating with Mr. Clinton better than in 2008 advisers to Mrs. Clinton are involving him more closely in early campaign planning, and they are discussing whether to deploy a senior aide to travel with him to keep him focused on his wifes central message.

It is not clear if the email was a tongue-in-cheek joke by a journalist seeking to break news whenever Clinton went off-script, or insider ingratiation with Palmieri, or a coy request for a job. But Palmieri forwarded the email to Podesta, with her judgement of Harriss trustworthiness: Harris is volunteering. Seems sound.

Longtime Clinton ally Donna Brazile, then a CNN contributor but now acting head of the Democratic National Committee, appears to have emailed members of the Clinton campaign to tip them off about a question that would be asked at Clintons debate with Bernie Sanders.

In this case, the cover-up is also at least as bad as the crime.

From time to time I get the questions in advance, was the subject line of an alleged email in which Brazile gave Clintons campaign the heads up for a question on the death penalty.

In a statement released Tuesday afternoon, Brazile denied leaking questions, sayingI often shared my thoughts with each and every campaign, and any suggestions that indicate otherwise are completely untrue.

However, as Hadas Gold at Politico wrote:

The email obtained by POLITICO was written by town hall co-moderator Roland Martin on the day of the town hall to CNN producers. But it shows him using word for word the language of a question that Brazile appeared to have sent to the Clinton campaign a day earlier. That email, from Brazile to the campaign, was included in yesterdays release of hacked emails by Wikileaks of Clinton campaign chair John Podesta.

Heres what the record shows: On March 12, Brazile, then vice chair of the DNC and a CNN and ABC contributor, allegedly wrote an email with the subject line From time to time I get the questions in advance. It continues:

> Heres one that worries me about HRC.

> DEATH PENALTY

> 19 states and the District of Columbia have banned the death penalty. 31 states, including Ohio, still have the death penalty. According to the National Coalition to Abolish the Death Penalty, since 1973, 156 people have been on death row and later set free. Since 1976, 1,414 people have been executed in the U.S. Thats 11% of Americans who were sentenced to die, but later exonerated and freed. Should Ohio and the 30 other states join the current list and abolish the death penalty?

Jennifer Palmieri, director of communications for the Clinton campaign, wrote back within three hours, seemingly not as worried:

Hi. Yes, it is one she gets asked about. Not everyone likes her answer but can share it.

She then instructs a copied employee to share the campaigns standard answer to the question to Brazile.

The next day, Roland Martin, a host on the TV One cable network who was co-hosting the town hall with CNNs Jake Tapper, sent an email to CNN producers with three questions, the third of which dealt with the death penalty. POLITICO obtained that email, and heres the text of the third question:

> DEATH PENALTY

> 19 states and the District of Columbia have banned the death penalty. 31 states, including Ohio, still have the death penalty. According to the National Coalition to Abolish the Death Penalty, since 1973, 156 people have been on death row and later set free. Since 1976, 1,414 people have been executed in the U.S. Thats 11% of Americans who were sentenced to die, but later exonerated and freed. Should Ohio and the 30 other states join the current list and abolish the death penalty?

The wording, spacing, capitalization are identical.

CNNs Jake Tapper told Larry OConnor on his WMAL radio show Thursday morning that he believes the leak, including the word-for-word question, must have come from Martins camp, telling OConnor, My understanding is the email toDonna came from either Roland Martin or someone around Roland Martin. Tapper went on to say:

Its horrifying. Journalistically its horrifying and Im sure it will have an impact onpartnering with this organization in the future and Im sure it will have and effect on Donna Brazile is no longer with CNN because shes with the DNC right now, but Im sure it will have some impact on Donna Brazile.

One would hope it would have some impact, since the current DNC head appears to be telling a story that directly contradicts all available evidence.

Hours after Wikileaks dropped the material, Brazile issued a statement saying I never had access to questions and would never have shared them with the candidates if I did.

Roland Martin himself was more cagey, as Brian Stetler reports:

Martin did not deny sharing information with Brazile. Instead, when asked by CNNMoney, he said my questions were shared with my executive producer and several members of my TV One team.

When asked in a followup question if he would explicitly rule out any sharing of questions with Brazile, Martin did not respond.

The Wikileaks drop also shows that Hillary Clinton has a real fondness for CNN pool reporter Dan Merica.

The Daily Caller reported that Clintons director of Latino outreach Lorella Preali wrote to press secretary Nick Merrill on February 26, 2016 to describe a campaign trip to Georgia in the weeks leading up to the state primary.

Praeli described how Clintonaddressed the Democratic Caucus at the Statehouse.

Clinton did a short version of her stump that was very crisp, she explained. People loved it. There were no press in the room.

Praeli next described how the former secretary of state took many a selfie while wading through throngs of people, with more pouring over the balconies, and headed to Octane coffee shop for an OTR.

At the coffee shop, Dan Merica asked her if she was jealous that she didnt get Chris Christies endorsement, after he dropped out of the Republican primary.

She responded with a prolonged smile (you could see the gears turning), and then said, Dan, I really like you. I really, really like you, she continued. They are basically courting each other at this point.

Previous hacked emails showthis wasnt the Clinton campaigns soleinstance of targeting Merica.

Pritchard is the Op-Ed editor for Boston Globe and she appears to have gone above and beyond the call of duty, helpfully suggesting to th Clinton campaign when it could run to have maximum impact for Clinton.

In this email, Pritchard makes suggestions about the timing of an editorial;

Hi John,

Just wondering if we are still on for that piece. Brian said last week it

was ready and just needed approval. It would be good to get it in on

Tuesday, when she is in New Hampshire. That would give her big presence on

Tuesday with the piece and on Wednesday with the news story.

Please let me know.

Thanks,

Marjorie

Louise Mensch is the editor of Heat Street, Rupert Murdochs latest site, which is targeted at conservatives. Yet the Wikileaks drop shows Mensch is a fan of Hillary Clinton, so much so that she furtively tried to write campaign ads for Clinton.

As Breitbart News reported:

Mrs. Mensch runs the Rupert Murdoch-backed blog Heat Street, which claims to stand against identity politics and what it labels social justice warriors under the slogan no safe spaces.

However, its editor in chief, Mrs. Mensch, was caught writing a campaign advertisement script for the Democratic candidate a woman who has traded off identity politics and social justice warrior politics. The ad appears to be based on the idea that Mrs. Clinton should be in office simply because she is female and is supported by multiracial women.

much rather have your girl Hillary, Mrs. Mensch wrote in an email to Michael Kives of Creative Arts Agency (CAA), a former Clinton campaign advocate.

The email reads:

Subject: Hillary ad

Dear Michael, As you will know from Arnold I am a committed Republican (or would be if I had the vote this year). But I worry no end about Donald Trump becoming our President much rather have your girl Hillary.

Anyway, the politician in me thinks Lena Dunham and Gloria Steinem are nails on a chalkboard to the average American woman AND I think Hillary is not capitalizing on the yearning that we have to see a woman as President properly.

Her competence and intelligence are beyond doubt, her problem is warmth.

If I may, here is an ad I would love to see run;

OUR TIME

A succession of mostly young women, a few old women, one with a baby daughter, multiracial and multi-occupation, to include a nurse and a woman in uniform of some kind where permitted

one after the other, smiling and looking to camera and saying Its our time.

and the last woman says, Its our time. Im with her.

fade to banner credit Hillary 2016

-

That would be inspirational, aspirational, and the kind of riff you really need on Yes we can.

Best, Louise

HeatStreet cant claim to be above using Wikileaks a a source, since it has done cover stories based on the Wikileaks release.

Finally, in the names of balance its important to note that its not all wine and roses for Podesta and the media, as another email shows that Podesta and other members of the team express frustration about Clinton advisor and journalist Sidney Blumenthal.

Go here to see the original:
Wikileaks Reveals Long List of Media Canoodling with Hillary ...

United States diplomatic cables leak – Wikipedia

Cablegate Description Release of 251,287 United States diplomatic cables Dates of cables 19662010 Period of release 18 February 2010 1 September 2011 Key publishers El Pas, Der Spiegel, Le Monde, The Guardian, The New York Times, WikiLeaks Related articles Afghan War documents leak, Iraq War documents leak Subject Data protection, First Amendment, freedom of information, freedom of speech

The United States diplomatic cables leak, widely known as Cablegate, began on Sunday, 28 November 2010[1] when WikiLeaksa non-profit organization that publishes submissions from anonymous whistleblowersbegan releasing classified cables that had been sent to the U.S. State Department by 274 of its consulates, embassies, and diplomatic missions around the world. Dated between December 1966 and February 2010, the cables contain diplomatic analysis from world leaders, and the diplomats' assessment of host countries and their officials.[2] According to WikiLeaks, the 251,287 cables consist of 261,276,536 words, making Cablegate "the largest set of confidential documents ever to be released into the public domain."[3] Today, more recent leaks have surpassed that amount.

The first document, the so-called Reykjavik 13 cable, was released by WikiLeaks on 18 February 2010, and was followed by the release of State Department profiles of Icelandic politicians a month later.[4] Later that year, Julian Assange, WikiLeaks' editor-in-chief, reached an agreement with media partners in Europe and the United States to publish the rest of the cables in redacted form, removing the names of sources and others in vulnerable positions. On 28 November, the first 220 cables were published under this agreement by El Pas (Spain), Der Spiegel (Germany), Le Monde (France), The Guardian (United Kingdom) and The New York Times (United States).[5] WikiLeaks had planned to release the rest over several months, and as of 11 January 2011, 2,017 had been published.

The remaining cables were published in September 2011 after a series of events compromised the security of a WikiLeaks file containing the cables. This included WikiLeaks volunteers placing an encrypted file containing all WikiLeaks data online as "insurance" in July 2010, in case something happened to the organization.[6] In February 2011 David Leigh of The Guardian published the encryption passphrase in a book; he had received it from Assange so he could access a copy of the Cablegate file, and believed the passphrase was a temporary one, unique to that file. In August 2011, a German magazine, Der Freitag, published some of these details, enabling others to piece the information together and decrypt the Cablegate files. The cables were then available online, fully unredacted. In response, WikiLeaks decided on 1 September 2011 to publish all 251,287 unedited documents.[7]

The publication of the cables was the third in a series of U.S. classified document "mega-leaks" distributed by WikiLeaks in 2010, following the Afghan War documents leak in July, and the Iraq War documents leak in October. Over 130,000 of the cables are unclassified, some 100,000 are labeled "confidential", around 15,000 have the higher classification "secret", and none are classified as "top secret" on the classification scale.[5] Reactions to the leak in 2010 varied. Western governments expressed strong disapproval, while the material generated intense interest from the public and journalists. Some political leaders referred to Assange as a criminal, while blaming the U.S. Department of Defense for security lapses. Supporters of Assange referred to him in November 2010 as a key defender of free speech and freedom of the press.[8] Reaction to the release in September 2011 of the unredacted cables attracted stronger criticism, and was condemned by the five newspapers that had first published the cables in redacted form in November 2010.[9]

In June 2010, the magazine Wired reported that the U.S. State Department and embassy personnel were concerned that Chelsea (then known as Bradley) Manning, a United States Army soldier charged with the unauthorized download of classified material while stationed in Iraq, had leaked diplomatic cables. WikiLeaks rejected the report as inaccurate: "Allegations in Wired that we have been sent 260,000 classified U.S. embassy cables are, as far as we can tell, incorrect".[10][11]

However, by June 2010, The Guardian had been offered "half a million military dispatches from the battlefields of Afghanistan and Iraq. There might be more after that, including an immense bundle of confidential diplomatic cables", and Alan Rusbridger, the editor of The Guardian had contacted Bill Keller, editor of The New York Times, to see if he would be interested in sharing the dissemination of the information.[12]

Manning was suspected to have uploaded all that was obtained to WikiLeaks, which chose to release the material in stages so as to have the greatest possible impact.[13]

According to The Guardian, all the diplomatic cables were marked "Sipdis", denoting "secret internet protocol distribution", which means they had been distributed via the closed U.S. SIPRNet, the U.S. Department of Defense's classified version of the civilian internet.[14] More than three million U.S. government personnel and soldiers have access to this network.[15] Documents marked "top secret" are not included in the system. Such a large quantity of secret information was available to a wide audience because, as The Guardian alleged, after the 11 September attacks an increased focus had been placed on sharing information since gaps in intra-governmental information sharing had been exposed.[14] More specifically, the diplomatic, military, law enforcement and intelligence communities would be able to do their jobs better with this easy access to analytic and operative information.[14] A spokesman said that in the previous weeks and months additional measures had been taken to improve the security of the system and prevent leaks.[14]

On 22 November, an announcement was made via WikiLeaks's Twitter feed that the next release would be "7the size of the Iraq War Logs".[16][17] U.S. authorities and the media had speculated, at the time, that they could contain diplomatic cables.[18] Prior to the expected leak, the government of the United Kingdom (UK) sent a DA-Notice to UK newspapers, which requested advance notice from newspapers regarding the expected publication.[19]Index on Censorship pointed out that "there is no obligation on [the] media to comply".[19] Under the terms of a DA-Notice, "[n]ewspaper editors would speak to [the] Defence, Press and Broadcasting Advisory Committee prior to publication".[19]The Guardian was revealed to have been the source of the copy of the documents given to The New York Times in order to prevent the British government from obtaining any injunction against its publication.[20] The Pakistani newspaper Dawn stated that the U.S. newspapers The New York Times and The Washington Post were expected to publish parts of the diplomatic cables on 28 November, including 94 Pakistan-related documents.[21]

On 26 November, Assange sent a letter to the U.S. Department of State, via his lawyer Jennifer Robinson, inviting them to "privately nominate any specific instances (record numbers or names) where it considers the publication of information would put individual persons at significant risk of harm that has not already been addressed".[22][23][24]Harold Koh, the Legal Adviser of the Department of State, rejected the proposal, stating: "We will not engage in a negotiation regarding the further release or dissemination of illegally obtained U.S. Government classified materials".[24] Assange responded by writing back to the U.S. State Department that "you have chosen to respond in a manner which leads me to conclude that the supposed risks are entirely fanciful and you are instead concerned to suppress evidence of human rights abuse and other criminal behaviour".[25][26] Ahead of the leak, United States Secretary of State Hillary Clinton and other American officials contacted governments in several countries about the impending release.[27]

Nov: Bradley Manning allegedly contacts WikiLeaks.

18 Feb: WikiLeaks releases Reykjavik 13 cable.

29 Mar : WikiLeaks releases State Dept profiles of Icelandic politicians.

26 May: Manning arrested in Iraq.

30 July: Wikileaks posts 1.4 gigabyte encrypted file containing WL material on several Internet exchange platforms as "insurance."

Aug: Julian Assange gives The Guardian's David Leigh the Cablegate file's encryption passphrase.

15 Sep: Daniel Domscheit-Berg formally leaves WikiLeaks.

Sep: WikiLeaks volunteer gives Heather Brooke Cablegate file access.

28 Nov: 220 redacted cables published by five newspapers.

11 Jan: Redacted publication continues; 2,017 cables published as of this date.

1 Feb: David Leigh and Luke Harding publish Cablegate passphrase in a book, believing it no longer in use.

25 Aug: Der Freitag reports file and passphrase are online; does not reveal passphrase.

Aug: Others piece details together; gain access.

1 Sep: WikiLeaks releases all 251,287 unredacted cables.

The five newspapers that had obtained an advance copy of all leaked cables began releasing the cables on 28 November 2010, and WikiLeaks made the cables selected by these newspapers and redacted by their journalists available on its website. "They are releasing the documents we selected", Le Monde's managing editor, Sylvie Kauffmann, said in an interview.[28]

WikiLeaks aimed to release the cables in phases over several months due to their global scope and significance.[29] The first batch of leaks released comprised 220 cables.[29] Further cables were subsequently made available on the WikiLeaks website. The full set of cables published by WikiLeaks can be browsed and searched by a variety of websites, see Sites offering search capabilities.[30]

The contents of the U.S. diplomatic cables leak describe in detail events and incidents surrounding international affairs from 274 embassies dating from 28 December 1966 to 28 February 2010. The diplomatic cables revealed numerous unguarded comments and revelations: critiques and praises about the host countries of various U.S. embassies, discussion and resolutions towards ending ongoing tension in the Middle East, efforts for and resistance against nuclear disarmament, actions in the War on Terror, assessments of other threats around the world, dealings between various countries, U.S. intelligence and counterintelligence efforts, U.S. support of dictatorship and other diplomatic actions.

The leaked cables revealed that diplomats of the U.S. and Britain eavesdropped on Secretary General Kofi Annan in the weeks before the U.S.-led invasion of Iraq in 2003, in apparent violation of international treaties prohibiting spying at the UN.[31]

The Guardian released its coverage of the leaked cables in numerous articles, including an interactive database, starting on 28 November.[32]

Der Spiegel also released its preliminary report, with extended coverage promised for the next day.[33] Its cover for 29 November was also leaked with the initial report.[34]

The New York Times initially covered the story in a nine-part series spanning nine days, with the first story published simultaneously with the other outlets.[35]The New York Times was not originally intended to receive the leak, allegedly[36] due to its unflattering portrayal of the site's founder, but The Guardian decided to share coverage, citing earlier cooperation while covering the Afghan and Iraqi war logs.

The Washington Post reported that it also requested permission to see the documents, but was rejected for undisclosed reasons.[36]

El Pas released its report[37] saying there was an agreement between the newspapers for simultaneous publication of the "internationally relevant" documents, but that each newspaper was free to select and treat those documents that primarily relate to its own country.[38]

Several of the newspapers coordinating with WikiLeaks have published some of the cables on their own websites.[39]

The Lebanese daily newspaper Al-Akhbar published about 183 cables on 2 December 2010.[40][41]

The Swedish newspapers Svenska Dagbladet and Aftonbladet started reporting on the leaks early December.[42] In Norway Verdens Gang (VG) brought the first leaks concerning USA and the Norwegian government on 7 December.[43]

Aftenposten, a Norwegian daily newspaper, reported on 17 December 2010 that it had gained access to the full cable set of 251,287 documents.[44] While it is unclear how it received the documents, they were apparently not obtained directly from WikiLeaks. Aftenposten started releasing cables that are not available in the official WikiLeaks distribution.[45] As of 5 January 2011[ref], it had released just over one hundred cables unpublished by WikiLeaks, with about a third of these related to Sri Lanka, and many related to Norway.[45]

Politiken, a Danish daily newspaper, announced on 8 January 2011 that it had obtained access to the full set of cables.[46]

NRC, a Dutch daily newspaper, and RTL Nieuws, a Dutch television news service, announced on 14 January 2011 that they had gained access to the about 3,000 cables sent from The Hague, via Aftenposten.[47]NOS announced on the same day that it had obtained these same cables from Wikileaks.[48]

Die Welt, a German daily newspaper, announced on 17 January 2011 that they had gained access to the full set of cables, via Aftenposten.[49]

Australian-based Fairfax Media obtained access to the cables under a separate arrangement.[50] Fairfax newspapers began releasing their own stories based on the leaked cables on 7 December 2010. Unlike other newspapers given access, Fairfax originally had not posted any of the original cables online, citing the need to maintain its competitive advantage over other Australian newspapers.[51] However, on 16 December 2010, Fairfax reversed its position, and began publishing the cables used in its stories.[52]

The Russian weekly newspaper Russky Reporter ( )[53] has published a large number of cables, both in English and in Russian translation.[54]

The Cuban government-run website Razones de Cuba[55] started publishing Spanish translations of WikiLeaks documents on 23 December 2010.[56]

The Costa Rican newspaper La Nacin announced on 1 March 2011 it had received 827 cables from WikiLeaks which it started publishing the next day. 764 of these were sent from the U.S. Embassy in San Jos while 63 were sent from other embassies and deal with Costa Rican affairs.[57]

CNN was originally supposed to receive an advance copy of the documents as well, but did not after it refused to sign a confidentiality agreement with WikiLeaks.[58]The Wall Street Journal also refused advance access, apparently for similar reasons as CNN.[59]

The Ecuadorian newspaper El Universo started releasing 343 cables related to the Ecuadorian government or institutions on 6 April 2011.[60] The publication was done the day after the Spanish newspaper El Pas published a cable in which the ambassador Heather Hodges showed concerns regarding corruption in the Ecuadorian National Police, especially of Gral. Jaime Hurtado Vaca, former Police commander. The ambassador was later declared persona non grata and requested to leave the country as soon as possible.[61]

In August 2010, Assange gave Guardian journalist David Leigh an encryption key and a URL where he could locate the full Cablegate file. In February 2011, shortly before Domscheit-Berg's book appeared, he and Luke Harding, another Guardian journalist, published WikiLeaks: Inside Julian Assange's War on Secrecy via Guardian Books. In it, Leigh revealed the encryption key Assange had given him.[7]

"Denn der Freitag hat eine Datei, die auch unredigierte US-Botschaftsdepeschen enthlt. [...] Die Datei mit dem Namen "cables.csv" ist 1,73 Gigabyte gro. [...] Das Passwort zu dieser Datei liegt offen zutage und ist fr Kenner der Materie zu identifizieren."

"Because der Freitag have discovered a file on the internet which includes the unredacted embassy files. [...] The file is called "cables.csv" and is 1.73 gigabytes in size. [...] The password for this file is plain to see and identifiable for someone familiar with the material."

It is not yet clear how or when the encrypted file itself was released inadvertently. So far it appears that it was released to bittorrent as part of a mirror file for the WikiLeaks web server[63] on which it had been placed to aid in transferring the file from WikiLeaks to Leigh, and either not removed due to oversight, or mirrored by other WikiLeaks staff before it could be removed. The password leaked in Leigh's book is not the password for the whole of the "insurance file" which WikiLeaks published in a separate event. It also remains unclear if during the transfer process the file was exposed publicly under the assumption that it is acceptable to transfer an encrypted file in plain sight so long as the key remains secret.

On 25 August 2011, the German magazine Der Freitag published an article about it,[62] and while it left out the crucial details, there was enough to allow others to piece the information together. The story was also published in the Danish newspaper Dagbladet Information the same day.[64] By 1 September, the encrypted Cablegate file had been decrypted and published by a Twitter user, and WikiLeaks therefore decided to publish all the diplomatic cables unredacted. Their reasoning, according to Glenn Greenwald in Salon, was that government intelligence agencies were able to find and read the files, while ordinary people-including journalists, whistleblowers, and those directly affected-were not. WikiLeaks took the view that sources could better protect themselves if the information were equally available.[7] The archive includes 34,687 files on Iraq, 8,003 on Kuwait, 9,755 on Australia, and 12,606 on Egypt.[65] According to The Guardian, it includes more than 1,000 cables containing the names of individual activists, and around 150 identifying whistleblowers.[66]

Leigh disclaimed responsibility for the release, saying Assange had assured him the password would expire hours after it was disclosed to him.[67]The Guardian wrote that the decision to publish the cables was made by Assange alone, a decision that it-and its four previous media partners-condemned. The partners released a joint statement saying the uncensored publication put sources at risk of dismissal, detention and physical harm,[68] while other commentators have agreed with WikiLeaks' rationale for the release of unredacted cables.[7][69] Leigh was nevertheless criticized by several commentators, including Glenn Greenwald, who called the publication of the password "reckless", arguing that, even if it had been a temporary one, publishing it divulged the type of passwords WikiLeaks was using.[7] WikiLeaks said it was pursuing pre-litigation action against The Guardian for an alleged breach of a confidentiality agreement.[70]

An investigation into two senior Zimbabwe army commanders who communicated with US Ambassador Charles A. Ray was launched, with the two facing a possible court martial.[71] On September 14 the Committee to Protect Journalists said that an Ethiopian journalist named in the cables was forced to flee the country[72] but WikiLeaks accused the CPJ of distorting the situation "for marketing purposes".[73]Al Jazeera replaced its news director, Wadah Khanfar, on September 20 after he was identified in the cables.[74] The naming of mainland China residents reportedly "sparked an online witch-hunt by Chinese nationalist groups, with some advocating violence against those now known to have met with U.S. Embassy staff."[75]

About an hour prior to the planned release of the initial documents, WikiLeaks announced it was experiencing a massive distributed denial-of-service attack (DDoS),[76] but vowed to still release the cables and documents via pre-agreed prominent media outlets El Pas, Le Monde, Der Spiegel, The Guardian, and The New York Times.[77]

According to Arbor Networks, an Internet-analyst group, the DDoS attack accounted for between two and four gigabits per second (Gbit/s) of additional traffic to the WikiLeaks host network, compared to an average traffic of between twelve and fifteen Gbit/s under ordinary conditions.[78] The attack was slightly more powerful than ordinary DDoS attacks, though well below the maximum of 60 to 100Gbit/s of other major attacks during 2010.[78] The attack was claimed to have been carried out by a person by the name of "Jester", who describes himself as a "hacktivist". Jester took credit for the attack on Twitter, stating that WikiLeaks "threaten[ed] the lives of our troops and 'other assets'".[78][79]

On 2 December 2010, EveryDNS, who provide a free DNS hosting service, dropped WikiLeaks from its entries, citing DDoS attacks that "threatened the stability of its infrastructure",[80] but the site was copied and made available at many other addresses, an example of the Streisand effect.[81]

John Perry Barlow, co-founder of the Electronic Frontier Foundation, wrote a tweet saying: "The first serious infowar is now engaged. The field of battle is WikiLeaks. You are the troops."[82]

Amazon.com removed WikiLeaks from its servers on 1 December 2010 at 19:30 GMT, and the latter website was unreachable until 20:17 GMT when the site had defaulted to its Swedish servers, hosted by Bahnhof.

U.S. Senator Joe Lieberman, among the members of the U.S. Senate Homeland Security and Governmental Affairs Committee who had questioned Amazon in private communication on the company's hosting of WikiLeaks and the illegally obtained documents, commended Amazon for the action;[83] WikiLeaks, however, responded by stating on its official Twitter page that "WikiLeaks servers at Amazon ousted. Free speech the land of the freefine our $ are now spent to employ people in Europe",[84] and later that "If Amazon are so uncomfortable with the first amendment, they should get out of the business of selling books".[85]

On December 2, 2010, Tableau Software withdraw its visualizations from the contents of the leak, stating that it was directly due to political pressure from Joe Lieberman.[86][87]

On 4 December, Paypal cut off the account used by WikiLeaks to collect donations.[88]

On 6 December, the Swiss bank PostFinance announced that it had frozen the assets of Assange;[89] on the same day, MasterCard stopped payments to WikiLeaks,[90] with Visa following them on 7 December.[91]

Official efforts by the U.S. government to limit access to, conversation about, and general spread of the cables leaked by WikiLeaks were revealed by leading media organizations. A 4 December 2010 article by MSNBC,[92] reported that the Obama administration has warned federal government employees and students in educational institutions studying towards careers in public service that they must refrain from downloading or linking to any WikiLeaks documents. However, State Department spokesman P.J. Crowley denied ordering students, stating, "We do not control private networks. We have issued no authoritative instructions to people who are not employees of the Department of State." He said the warning was from an "overzealous employee."[93] According to a 3 December 2010 article in The Guardian,[94] access to WikiLeaks has been blocked for federal workers. The U.S. Library of Congress, the U.S. Commerce Department and other government agencies have confirmed that the ban is already in place.

A spokesman for Columbia University confirmed on 4 December that its Office of Career Services sent an e-mail warning students at Columbia's School of International and Public Affairs to refrain from accessing WikiLeaks cables and discussing this subject on the grounds that "discourse about the documents would call into question your ability to deal with confidential information".[95] However, this was quickly retracted on the following day. SIPA Dean John Henry Coatsworth wrote that "Freedom of information and expression is a core value of our institution, [...] thus, SIPA's position is that students have a right to discuss and debate any information in the public arena that they deem relevant to their studies or to their roles as global citizens, and to do so without fear of adverse consequences."[96]

The New York Times reported on 14 December[97] that the U.S. Air Force bars its personnel from access to news sites (such as those of The New York Times and The Guardian) that publish leaked cables.

On 18 December, the Bank of America stopped handling payments for WikiLeaks.[98] Bank of America is also blocking access to WikiLeaks from its internal network preventing employees from accessing WikiLeaks.[citation needed]

In response to perceived federal and corporate censorship of the cable leaks, internet group Anonymous attacked several of such websites via DDOS attacks. So far, the websites of the Swedish prosecutor, PostFinance (the Swiss post-office banking company), MasterCard and Visa have all been targeted.[99]

The websites of the government of Zimbabwe were targeted by Anonymous with DDoS attacks due to censorship of the WikiLeaks documents.[100] The websites of the government of Tunisia were targeted by Anonymous due to censorship of the WikiLeaks documents and the Tunisian revolution.[100] Tunisians were reported to be assisting in these denial-of-service attacks launched by Anonymous.[101] Anonymous's role in the DDoS attacks on the Tunisian government's websites have led to an upsurge of internet activism among Tunisians against the government.[102] Anonymous released an online message denouncing the government clampdown on recent protests and posted it on the Tunisian government website.[103] Anonymous has named their attacks as "Operation Tunisia".[104] Anonymous successfully DDoSsed eight Tunisian government websites. They plan attacks in Internet Relay Chat networks. Someone attacked Anonymous's website with a DDoS on 5 January.[105]

On 9 December 2010, major Pakistani newspapers (such as The News International, The Express Tribune and the Daily Jang) and television channels carried stories that claimed to detail U.S. diplomats' assessments of senior Indian generals as "vain, egotistical and genocidal", also saying "India's government is secretly allied with Hindu fundamentalists", and that "Indian spies are covertly supporting Islamist militants in Pakistan's tribal belt and Balochistan."[106] However, none of the cables revealed any such assessments. The claims were credited to an Islamabad-based news service agency that frequently ran pro-Pakistan Army stories.[106]

Later, The News International admitted the story "was dubious and may have been planted", and The Express Tribune offered "profuse" apologies to readers.[107]Urdu-language papers such as the Daily Jang, however, declined to retract the story.[107]

On 14 December 2010, a U.S. federal court subpoenaed Twitter for extensive information regarding WikiLeaks, but also put on a gagging order. The order was said to be part of an "ongoing criminal investigation", and required information regarding the Twitter accounts of WikiLeaks, Assange, Manning, Rop Gonggrijp, Jacob Appelbaum and Birgitta Jonsdottir. According to Salon.com journalist Glenn Greenwald, the court "gave Twitter three days to respond and barred the company from notifying anyone, including the users, of the existence of the Order."[108] Twitter requested that it be allowed to notify the users, giving them ten days to object. The court order was unsealed on 5 January 2011, and Jonsdottir decided to publicly fight the order.[109]

Elected representatives of Iceland have declared such actions by the U.S. government "serious", "peculiar", "outlandish", and akin to heavy breathing on the telephone.[110] The published subpoena text demands "you are to provide ... subscriber names, user names ... mailing addresses, residential addresses, business addresses ... telephone number[s] ... credit card or bank account number[s] ... billing records", "as well as 'destination email addresses and IP addresses".[111] As of 10 January 2011, there were 636,759 followers of the WikiLeaks Twitter feed with destination email addresses and IP addresses.[112][113]

The cable leaks have been pointed to as a catalyst for the 20102011 Tunisian revolution and government overthrow. Foreign Policy magazine said, "We might also count Tunisia as the first time that WikiLeaks pushed people over the brink."[114] Additionally, The New York Times said, "The protesters...found grist for the complaints in leaked cables from the United States Embassy in Tunisia, released by WikiLeaks, that detailed the self-dealing and excess of the president's family."[115][116][117]

It is widely believed that the Tunisian revolution then spread to other parts of the Middle East, turning into the Arab Spring.[118]

Originally posted here:
United States diplomatic cables leak - Wikipedia

Bradley Manning trial may include Navy SEAL from Osama bin …

Of the 22 charges US Army Pfc. Bradley Manning faces for allegedly leaking classified information to the whistleblower website WikiLeaks, none is more serious than aiding the enemy in wartime.

Although military prosecutors could have sought the death penalty on this charge which violates both the Espionage Act of 1917 and the Uniform Code of Military Justice (UCMJ) they are pushing for a life sentence.

In a court-martial pretrial hearing Tuesday, Col. Denise Lind, the military judge in the case, ruled that the US government must prove that Manning knew he was aiding the enemy when he took steps to make public hundreds of thousands of Iraq andAfghanistanbattlefield reports,State Departmentdiplomatic cables, files on detainees at the Guantnamo BayUS naval base, other classified records, and battlefield video clips the most controversial of which showed US attack helicopter pilots in Iraq killing what turned out to be a group of unarmed civilian men, including two journalists from theReutersnews agency.

Colonel Lind said the prosecution must show evidence that Manning had "reason to believe such information could be used to the injury of the US," by an armed group like Al Qaeda or another nation, Agence France-Presse reported Wednesday.

Prosecutors reportedly are preparing evidence including testimony from a US Navy SEAL who was one of those involved in the raid that killed Al Qaeda leader Osama bin Laden in May 2011 to show that the information leaked by Manning was found in Mr. bin Ladens compound in Abbotttabad, Pakistan, and thus aided a terrorist organization.

As Mannings pretrial hearing continued Wednesday, Lind ruled against the defense, which had tried to block such testimony on grounds that it would be prejudicial to Mannings case.

The ruling means prosecutors can call the witness during the "merits," or main, phase of the trial. They otherwise could have used his testimony only for sentencing purposes, according to the Associated Press.

The witness has been publicly identified only as "John Doe" and as a Defense Department "operator," a designation given to SEALs. Prosecutors say he participated with SEAL Team Six in their assault on the compound which resulted in the death of bin Laden. Such testimony would help establish a chain of custody for the evidence from its recovery to its analysis by a computer expert.

Lind is weighing options for protecting the witness's identity, the AP reports. They could include moving the trial to a secure location to hear his testimony, or having him wear a disguise. Lind also must decide what limits to place on any defense cross-examination of John Doe, as well as three other unidentified "special witnesses," to protect national security.

Wednesdays hearing was the first since a group pressing for more government transparency flouted a military ban by releasing a secretly-recorded audio clip of Manning's testimony in February, according to the AFP report.

"To say that the judge was unhappy about this violation of the rules of the court would be an understatement," a military spokeswoman told reporters covering the hearing.

As a result, mobile phones and recording devices, previously only banned inside the courtroom, are now outlawed in the press gallery as well, where the hearing is being broadcast, AFP reports.

"This media operation center is a privilege, not a requirement. Privileges can be taken away," the spokeswoman said.

Specifically, Manning is charged with aiding the enemy; wrongfully causing intelligence to be published on the Internet knowing that it is accessible to the enemy; theft of public property or records; transmitting defense information; fraud and related activity in connection with computers; and for violating Army Regulations 25-2 Information Assurance and 380-5 Department of the Army Information Security Program.

In February, Manning pleaded guilty to 10 of 22 charges against him specifically acknowledging that he had misused classified documents by sending them toWikiLeaks, the website founded by controversial Internet activistJulian Assange. Those 10 charges could result in a 20-year sentence.

Mannings trial is scheduled to start June 3 at Fort Meade in Maryland. It could last for 12 weeks.

View original post here:
Bradley Manning trial may include Navy SEAL from Osama bin ...

Use FileVault to encrypt the startup disk on … – Apple Support

FileVault full-disk encryption(FileVault 2) usesXTS-AES-128 encryption with a 256-bit key tohelppreventunauthorizedaccess to the information on your startup disk.

Turn onFileVault

Reset password

Turn offFileVault

FileVault 2 is availablein OS X Lion or later.When FileVault is turned on, your Mac always requires that you log in with your account password.

If other users have accounts on your Mac, you might see a message that each user must type in their password before they will be able to unlock the disk. For each user, click the Enable User button and enter the user's password. User accounts that you add after turning on FileVault are automatically enabled.

Choose how you want to be able to unlock your disk and reset your password, in case you ever forget your password:

If you lose or forget both your account password and your FileVault recovery key, you won't be able to log in to your Mac or access the data on your startup disk.

When FileVault setup is complete, your Mac restarts and asks you to log in with your account password. Your password unlocks your disk and allows your Mac to finish starting up.FileVault requires that you log in every time your Mac starts up, and no account is permitted to log in automatically.

After your Mac starts up, encryption of your startup disk occurs in the background as you use your Mac. This takes time, and it happens only while your Mac is awake and plugged in to AC power. You can check progress in the FileVault section of Security & Privacy preferences. Any new files that you create are automatically encrypted as they're saved to your startup disk.

If you forget your account password or it doesn't work, you might be able toreset your password.

If you want to change the recovery key used to encrypt your startup disk, turn off FileVault in Security & Privacy preferences. You can then turn it on again to generate a new key and disable all older keys.

If you no longer want to encrypt your startup disk, you can turn off FileVault:

After your Mac starts up, decryption of your startup disk occurs in the background as you use your Mac. This takes time, and it happens only while your Mac is awake and plugged in to AC power. You can check progress in the FileVault section of Security & Privacy preferences.

* If you storeyour recovery key with Apple or your iCloud account, there's no guarantee that Apple will be able to give you the key if you lose or forget it. Notall languages and regions are serviced byAppleCareor iCloud, and not allAppleCare-serviced regionsoffer support in every language. If youset up your Mac for a languagethat AppleCare doesn't support, then turn on FileVault and store your key with Apple (OS X Mavericks only),your security questions and answers could be in a language that AppleCare doesn't support.

Published Date: Dec 9, 2016

Link:
Use FileVault to encrypt the startup disk on ... - Apple Support

HP Secure Encryption | HPE

Do you need to deal with data privacy challenges? Are you worried about meeting compliance regulations? HP Secure Encryption helps you accomplish this with data encryption keys to secure your sensitive data at rest. HP Secure Encryption is available for both local and remote deployments. Local Key Management mode provides a single server deployment. Remote Key Management mode allows for central management for enterprise-wide deployment. Both Local Key Management mode and Remote Key Management mode requires the HP Smart Storage Administrator (SSA) version 1.60.17.0 or later, Smart Array Px3x controllers or later, and Smart Array firmware version 1.50 or later. For Remote Key Management mode, the HP Enterprise Secure Key Manager (ESKM) 3.1 or later manages all the keys and will help you scale to over 25,000 servers and millions of keys.

Broad Encryption Coverage

HP Secure Encryption encrypts the data on both the attached bulk storage and cache module of the HP Smart Array Px3x controller. It supports any hard disk drive or Solid State Drive in the Smart Drive portfolio for HP ProLiant Gen8 Servers (or later) or supported storage enclosures.

High Availability and Scalability

HP Secure Encryption easily scales with your business from single server deployment to enterprise-wide deployment of over 25,000 servers via the HP Enterprise Secure Key Manager (ESKM) 3.1 or later. ESKM manages all the keys centrally and when deployed in a clustered configuration, it maximizes uptime.

Simplified Deployment and Management

The HP Smart Storage Administrator configures the cryptographic features of HP Secure Encryption associated with the HP Smart Array Px3x or later controllers. Although an activation key is not required to enable the features, a license is required per encrypted drive.

The ESKM manages all the keys across all HP Secure Encryption deployments.

Support compliance requirements like HIPAA and Sarbanes-Oxley

HP Secure Encryption helps enterprises comply with data privacy requirements associated with HIPAA and Sarbanes-Oxley Acts.

HP ESKM version 3.1 has achieved FIPS 140-2 Level-2 validation.

HP has applied for FIPS 140-2 Level-2 validation for the Smart Array Px3x family of Controllers and is currently listed on the NIST pending site.

HP has completed FIPS 140-2 Level 2 certification # 2735. HP has applied for FIPS 140-2 Level1 validation for the HP Smart Array Px4x family of controllers and is currently listed for FIPon the NIST pending site.

Follow this link:
HP Secure Encryption | HPE

5 Common Encryption Algorithms and the Unbreakables of the Future

Mchten Sie diesen Beitrag in Deutsch zu lesen? Lesen Sie die Deutsch-Version hier.

While security is an afterthought for many PC users, its a major priority for businesses of any size. It has to be when the Ponemon Institute tells us that security breaches are costing companies millions every year.

Even if you dont have millions to lose, protecting what you do have should be a high priority.

There are several forms of security technology available, but encryption is one that everyday computer users should know about.

Encryption is an interesting piece of technology that works by scrambling data so it is unreadable by unintended parties. Lets take a look at how it works with the email-friendly software PGP (or GPG for you open source people).

Say I want to send you a private message, so I encrypt it using either one of these programs. Heres the message:

wUwDPglyJu9LOnkBAf4vxSpQgQZltcz7LWwEquhdm5kSQIkQlZtfxtSTsmaw q6gVH8SimlC3W6TDOhhL2FdgvdIC7sDv7G1Z7pCNzFLp0lgB9ACm8r5RZOBi N5ske9cBVjlVfgmQ9VpFzSwzLLODhCU7/2THg2iDrW3NGQZfz3SSWviwCe7G mNIvp5jEkGPCGcla4Fgdp/xuyewPk6NDlBewftLtHJVf =PAb3

Once encrypted, the message literally becomes a jumbled mess of random characters. But, equipped with the secret passcode I text you, you can decrypt it and find the original message.

Come on over for hot dogs and soda!

Whether its in transit like our hot dog party email or resting on your hard drive, encryption works to keep prying eyes out of your business even if they happen to somehow gain access to your network or system.If you want to learn more about how encryption helps protect business data,you can read our article on how encryption aids cloud security.

The technology comes in many forms, with key size and strength generally being the biggest differences in one variety from the next.

Triple DES was designed to replace the original Data Encryption Standard (DES) algorithm, which hackers eventually learned to defeat with relative ease. At one time, Triple DES was the recommended standard and the most widely used symmetric algorithm in the industry.

Triple DES uses three individual keys with 56 bits each. The total key length adds up to 168 bits, but experts would argue that 112-bits in key strength is more like it.

Despite slowly being phased out, Triple DES still manages to make a dependable hardware encryption solution for financial services and other industries.

RSA is a public-key encryption algorithm and the standard for encrypting data sent over the internet. It also happens to be one of the methods used in our PGP and GPG programs.

Unlike Triple DES, RSA is considered an asymmetric algorithm due to its use of a pair of keys. Youve got your public key, which is what we use to encrypt our message, and a private key to decrypt it. The result of RSA encryption is a huge batch of mumbo jumbo that takes attackers quite a bit of time and processing power to break.

Blowfish is yet another algorithm designed to replace DES. This symmetric cipher splits messages into blocks of 64 bits and encrypts them individually.

Blowfish is known for both its tremendous speed and overall effectiveness as many claim that it has never been defeated. Meanwhile, vendors have taken full advantage of its free availability in the public domain.

Blowfish can be found in software categories ranging from e-commerce platforms for securing payments to password management tools, where it used to protect passwords. Its definitely one of the more flexible encryption methods available.

Computer security expert Bruce Schneier is the mastermind behind Blowfish and its successor Twofish. Keys used in this algorithm may be up to 256 bits in length and as a symmetric technique, only one key is needed.

Twofish is regarded as one of the fastest of its kind, and ideal for use in both hardware and software environments. Like Blowfish, Twofish is freely available to anyone who wants to use it. As a result, youll find it bundled in encryption programs such as PhotoEncrypt, GPG, and the popular open source software TrueCrypt.

The Advanced Encryption Standard (AES) is the algorithm trusted as the standard by the U.S. Government and numerous organizations.

Although it is extremely efficient in 128-bit form, AES also uses keys of 192 and 256 bits for heavy duty encryption purposes.

AES is largely considered impervious to all attacks, with the exception of brute force, which attempts to decipher messages using all possible combinations in the 128, 192, or 256-bit cipher. Still, security experts believe that AES will eventually be hailed the de facto standard for encrypting data in the private sector.

Cyber attacks are constantly evolving, so security specialists must stay busy in the lab concocting new schemes to keep them at bay. Expert observers are hopeful that a new method called Honey Encryption will deter hackers by serving up fake data for every incorrect guess of the key code. This unique approach not only slows attackers down, but potentially buries the correct key in a haystack of false hopes. Then there are emerging methods like quantum key distribution, which shares keys embedded in photons over fiber optic, that might have viability now and many years into the future as well.

Whether its protecting your email communications or stored data, some type of encryption should be included in your lineup of security tools. Successful attacks on victims like Target show that its not 100 percent bulletproof, but without it, youre offering up convenient access to your data. Find some tools that give you a piece of mind and stick with em!

Continued here:
5 Common Encryption Algorithms and the Unbreakables of the Future

Chelsea Manning | Democracy Now!

You turn to Democracy Now! for ad-free news you can trust. Maybe you come for our daily headlines. Maybe you come for in-depth stories that expose corporate and government abuses of power. Democracy Now! brings you crucial reporting like our coverage from the front lines of the standoff at Standing Rock or news about the movements fighting for peace, racial and economic justice, immigrant rights and LGBTQ equality. We produce our daily news hour at a fraction of the budget of a commercial news operationall without ads, government funding or corporate sponsorship. How is this possible? Only with your support. If every visitor to this site in December gave just $10 we could cover our basic operating costs for 2017. Pretty exciting, right? So, if you've been waiting to make your contribution to Democracy Now!, today is your day.It takes just a couple of minutes to make sure that Democracy Now! is there for you and everybody else in 2017.

We rely on contributions from you, our viewers and listeners to do our work. If you visit us daily or weekly or even just once a month, now is a great time to make your monthly contribution.

Please do your part today.

See the original post:
Chelsea Manning | Democracy Now!

What Is Bitcoin Cryptocurrency? Webopedia Definition

Main TERM B

By Vangie Beal

Bitcoin is a digital payment currency that utilizes cryptocurrency (a digital medium of exchange) and peer-to-peer (P2P) technology to create and manage monetary transactions as opposed to a central authority. The open source Bitcoin P2P network creates the bitcoins and manages all the bitcoin transactions.

Often referred to as "cash for the Internet," Bitcoin is one of several popular digital payment currencies along with Litecoin, Peercoin and Namecoin. When the word Bitcoin is capitalized, it usually refers to the software and systems used for bitcoin (in lowercase it means the actual currency).

Bitcoin is considered the biggest cryptocurrency. It was first introduced in 2009 and is the most widely-traded cryptocurrency. Bitcoin as an implementation of the cryptocurrency concept was described by Wei Dai in 1998 on the cypherpunks mailing list. Dai suggested a new form of money that uses cryptography to control its creation and transactions, rather than a central authority. In 2009, the Bitcoin specification and proof of concept was published in a cryptography mailing list by Satoshi Nakamoto. As noted in the Official Bitcoin FAQ, Satoshi Nakamoto left the project in late 2010 without revealing much about himself.

Payments are made via a Bitcoin wallet application that resides on a user's computer or mobile device, and a person only needs to enter the recipient's Bitcoin address information and payment amount before pressing send to complete payment.

New bitcoins are created by a competitive and decentralized process called "mining". Bitcoin miners are processing transactions and securing the network using specialized hardware and are collecting new bitcoins in exchange. The Bitcoin protocol ensures new bitcoins are created at a fixed rate, making the process of bitcoin mining a very competitive business.

According to eWeek, efforts to improve Bitcoin mining are now under way, working under the basic assumption that the cheaper you can mine Bitcoins, the more money you can make.

While attackers are going after Bitcoin-related sites, there is an important distinction between the security of the Bitcoin network and the Bitcoin exchanges. According to InternetNews.com, no one has ever found a critical vulnerability within the Bitcoin protocol itself that would allow a user within the Bitcoin network to fraudulently create coins or forge transactions. That said, there have been compromises of various Bitcoin exchanges throughout the virtual currency's lifetime, and as the value of a Bitcoin increases, so does the risk in using exchanges.

TECH RESOURCES FROM OUR PARTNERS

Stay up to date on the latest developments in Internet terminology with a free weekly newsletter from Webopedia. Join to subscribe now.

Read this article:
What Is Bitcoin Cryptocurrency? Webopedia Definition

NSA spying – The Huffington Post

People think telephone surveillance is a new thing but then, they're not old enough to have grown up with a party line. Eat your heart out, NSA. Sixty years ago, the entire country was listening in on each other's phone conversations.

Inga

Newspaper columnist and freelancer, author of book Inga Tells All. Lives in San Diego, CA with husband Olof and granddog Winston

In a stunning announcement, Eric Schmidt, head of Alphabet, Inc., the holding company that owns Google, said today in a press conference at Google's headquarters in Mountain View, California, that at midnight on New Year's Eve of this year, the iconic Google search engine will become property of a new nonprofit organization called Unlimited Years of Search, or UYS.

This week is #BannedBooksWeek and if you're wondering why we need an entire week to celebrate banned books you're probably one of those millennials who doesn't read anything longer than 140 characters.

Zac Thompson

Outspeak Editor - in partnership with The Huffington Post

Sanjay Goel, University at Albany, State University of New York With the release of a new film about Edward Snowden, the man who revealed secret doc...

The Conversation US

Independent source of news and analysis, from experts in the academic community.

Snowden is a helluva movie, kicking an audience's ass on a number of levels. I had a chance to see the film at a preview event; it opens everywhere on September 16. Go see it.

Peter Van Buren

Author of the forthcoming "Hooper's War," "Ghosts of Tom Joad: A Story of the #99Percent" and "We Meant Well"

Oliver Stone has never met an American fiasco he didn't like, lament, and, with any luck, lambaste in one of his films.

We need Snowden in America - for many good reasons. For those who see him as an enemy, we have always been taught to keep our enemies close to us and there is no logic to be found in forcing him into unsavory hands far from home.

Mark Weinstein

Leading privacy advocate, visionary social media pioneer, and founder of MeWe.

Co-authored by Pedram Gholipour Since Direct Recording Electronic voting machines first came into vogue in the U.S. in 2002, a team of cyber-academic...

Daniel Wagner

Managing Director of Risk Cooperative / Co-author of "Global Risk Agility and Decision Making".

In the ninety odd days before the election, a huge data dump of American secrets would strongly and negatively influence the election.

Admiral Michael Rogers has quite a task afoot, as Director of the National Security Agency and the military's Cyber Command Mission Force. Speaking at a luncheon organised by retired Captain Kevin Wensing, Admiral Rogers said that the agency will eventually contain 6200 dedicated computer personnel split into 133 teams.

Anna Wilding

White House Correspondent, Director, Film Executive, Producer, Actress,

If you were Vladimir Putin, or President Xi of China, what would you do if you had the entire archive of Hillary Clinton's emails, classified and unclassified, "deleted" and not, in your hands? What value to you would that be in your next round of negotiations with the president of the United States?

Peter Van Buren

Author of the forthcoming "Hooper's War," "Ghosts of Tom Joad: A Story of the #99Percent" and "We Meant Well"

The right to privacy is a constitutional gem. In the recent past its been assaulted and fraught with all manner of conspiracy theory. We are s...

Anurag Harsh

SVP & Founding Exec of Ziff Davis the world's largest tech, gaming and men's lifestyle digital publisher. Musician & Author. @anuragharsh

Even in the era of widening partisan gaps, it would be ill-advised to throw around indictments willy-nilly. Voters use James Comey's statements for the insights on Clinton's fitness for the presidency, not prison.

Anhvinh Doanvo

Writer @ The Hill. Former counterterrorism researcher at the Global Initiative. Graduate Thomas R. Pickering Fellowship finalist. @anhvinhdoanvo

In addition to its discussion of Saudi Consulate official Fahad Thumairy, there is also an FBI and CIA report that indicates that Khallad bin Attash was in Los Angeles in June 2000 -- compliments of "diplomatic arrangements" provided by Fahad Thumairy. To understand the relevance of this key piece of information, it is necessary to have some context.

If I had to choose one phrase to sum up America's efforts against terrorism since 9/11, it would be that lay definition of mental illness, doing the same thing over and over expecting different results.

Peter Van Buren

Author of the forthcoming "Hooper's War," "Ghosts of Tom Joad: A Story of the #99Percent" and "We Meant Well"

In the wake of yet another bizarre and uniquely American mass shooting, we once again we find ourselves bombarded by copypasta Facebook rants and half-literate pleas by experts on television.

Read the original:
NSA spying - The Huffington Post