Citizenfour – Wikipedia, the free encyclopedia

Citizenfour is a 2014 documentary film directed by Laura Poitras concerning Edward Snowden and the NSA spying scandal. Shot in the cinma vrit style,[2] the film had its U.S. premiere on October 10, 2014 at the New York Film Festival and its UK premiere on October 17, 2014 at the BFI London Film Festival. The film features Glenn Greenwald and was co-produced by Poitras, Mathilde Bonnefoy, and Dirk Wilutzky, with Steven Soderbergh and others serving as executive producers. Citizenfour won the Academy Award for Best Documentary Feature at the 2015 Oscars.

In January 2013, Laura Poitras received an encrypted e-mail from a stranger who called himself Citizen Four.[3] In it, he offered her inside information about illegal wiretapping practices of the US National Security Agency (NSA) and other intelligence agencies. Poitras had already been working for several years on a film about monitoring programs in the US that were the result of the September 11 attacks. In June 2013, accompanied by investigative journalist Glenn Greenwald and The Guardian intelligence reporter Ewen MacAskill,[4] she went to Hong Kong with her camera for the first meeting with the stranger, who identified himself as Edward Snowden. Several other meetings followed. The recordings gained from the meetings form the basis of the film.

By 2012, Laura Poitras had begun work on the third film in her 9/11 trilogy which she intended to focus broadly on the topic of domestic surveillance for which she interviewed Julian Assange, Glenn Greenwald, William Binney and Jacob Appelbaum.[5] She was first contacted by Edward Snowden in January 2013 after he was unable to establish encrypted communications with Greenwald.[6][7] She flew to Hong Kong in late May 2013, where over the course of eight days she filmed Snowden in his hotel room[5] at the Mira Hotel in Hong Kong. Later, she traveled to Moscow where she filmed a second interview with Snowden conducted by Greenwald.

Production company Praxis Films was involved in the production of the documentary. The film was distributed by RADIUS TWC in the US,[8]Britdoc Foundation and Artificial Eye in the UK[9] and Piffl Media in Germany. The broadcast rights for television were obtained by Channel 4 (United Kingdom), HBO Documentary Films (USA) and Norddeutscher Rundfunk (Germany).

The international film premiere took place on October 10, 2014 in the United States at the New York Film Festival. In Europe, the documentary was shown for the first time on October 17 at the London Film Festival. The first showing in Germany was on October 27 as part of the Leipzig Film Festival. The director Laura Poitras was present in Hamburg Abaton cinema for a preview on November 45 at the official Germany Premiere at Kino International. In German cinemas, the film has been running since November 6. Its widest release as of January 22, 2015 was 105 theaters, in the weekend of December 1218, 2014.[10]

It premiered on Home Box Office on February 23, 2015, the day after the 2015 Oscars[11] and was subsequently released for streaming on HBO Go.[12]Channel 4 broadcast it in the United Kingdom on February 25, 2015[13] and has released it for view-on-demand through March 4, 2015.[14]

Citizenfour received widespread critical acclaim. It has a 98% approval rating on Rotten Tomatoes, based on 124 critics, with an average score of 8.3/10. Metacritic gave the film an 88 out of 100 based on a normalized rating of 38 reviews.[15]

Ronnie Scheib of Variety wrote "No amount of familiarity with whistleblower Edward Snowden and his shocking revelations of the U.S. government's wholesale spying on its own citizens can prepare one for the impact of Laura Poitras's extraordinary documentary Citizenfour... far from reconstructing or analyzing a fait accompli, the film tersely records the deed in real time, as Poitras and fellow journalist Glenn Greenwald meet Snowden over an eight-day period in a Hong Kong hotel room to plot how and when they will unleash the bombshell that shook the world. Adapting the cold language of data encryption to recount a dramatic saga of abuse of power and justified paranoia, Poitras brilliantly demonstrates that information is a weapon that cuts both ways."[16]

Spencer Ackerman writes in The Guardian: "Citizenfour must have been a maddening documentary to film. Its subject is pervasive global surveillance, an enveloping digital act that spreads without visibility, so its scenes unfold in courtrooms, hearing chambers and hotels. Yet the virtuosity of Laura Poitras, its director and architect, makes its 114 minutes crackle with the nervous energy of revelation."[17]

Time magazine rated the film #8 out of its top 10 movies of 2014[18] and called the film "This Halloween's Scariest Chiller".[19]Vanity Fair rated it #4 out of its top 10[20] and Grantland rated it #3 of its top 10.[21] Writing for the Chicago Tribune, former Defense Department intelligence analyst Alex Lyda penned a negative review, calling Snowden "more narcissist than patriot".[22]David Edelstein reviewed the film mostly favorably, and jocularly advised viewers "don't buy your ticket online or with a credit card".[23]

Read more from the original source:
Citizenfour - Wikipedia, the free encyclopedia

IoT encryption: a revenue driver for CSPs

April 01, 2015 // By Pravin Mirchandani

Back in July 2014, an Intel study indicated that 41% of IT managers and directors identified data protection as a key obstacle to overcome before the Internet of Things (IoT) could be fully embraced. 44% cited data encryption as the answer to this problem.

Page 1 of 2

Since then, despite IoT dialogue intensifying, relatively little attention has been given to how IoT data from fleets of connected devices will be secured. Perhaps 'devices' is the wrong word. For manufacturing plants, together with hotels, gas stations, retailers and a host of other enterprise beneficiaries, IoT is less about investing in new technologies and more about retrofitting sensors to existing machines and other physical assets.

This matters because IoT sensors have limited processing power and, as a result, are incapable of performing heavy duty computational functions, like encryption. So where does this leave us? We know that encryption is a deal breaker for IT decision makers but, at the same time, it seems beyond reach.

Happily, the solution is also a revenue opportunity for communication service providers (CSPs), and involves encryption being performed at a central point before the data is transmitted across the WAN. After all, the biggest risk to corporate data security does not come from the factory floor, the hotel staff, or the gas station attendant; it comes from the threat of that data being intercepted by a third party as it is being transmitted across the web.

By using a customer premises-based router as a managed service delivery platform, CSPs can centralise all of a customers IoT data from across their sites and provide encryption as a service, pre-transmission. This means that the CSP can hold both the encryption and the decryption keys centrally and securely, on behalf of the customer. Whats more, because the customer-premises equipments (CPEs) functions are also managed by the CSP, it is about as tamper-resistant a piece of hardware as the enterprise is likely to find.

Back in July 2014, an Intel study indicated that 41% of IT managers and directors identified data protection as a key obstacle to overcome before the Internet of Things (IoT) could be fully embraced. 44% cited data encryption as the answer to this problem.

Since then, despite IoT dialogue intensifying, relatively little attention has been given to how IoT data from fleets of connected devices will be secured. Perhaps 'devices' is the wrong word. For manufacturing plants, together with hotels, gas stations, retailers and a host of other enterprise beneficiaries, IoT is less about investing in new technologies and more about retrofitting sensors to existing machines and other physical assets.

This matters because IoT sensors have limited processing power and, as a result, are incapable of performing heavy duty computational functions, like encryption. So where does this leave us? We know that encryption is a deal breaker for IT decision makers but, at the same time, it seems beyond reach.

Read more from the original source:
IoT encryption: a revenue driver for CSPs

Stanford crypto expert Dan Boneh wins $175K computer science award

Stanford University computer science professor Dan Boneh has been named as the recipient of the 2014 ACM-Infosys Foundation Award in Computing Sciences for his work in cryptography.

Bob Brown (Network World) on 31 March, 2015 23:57

Stanford University computer science professor Dan Boneh has been named as the recipient of the 2014 ACM-Infosys Foundation Award in Computing Sciences for his work in cryptography.

The Association for Computing Machinery/Infosys Foundation award, which includes a $175,000 prize, recognizes relatively recent contributions by young scientists and systems developers. Boneh, who leads the applied cryptography group at Stanford, was born in 1969 in Israel.

MORE AWARDS:Database pioneer Stonebraker rocks $1M "Nobel Prize in Computing"| Whirlwind tour of technology's major awards, honors and prizes

The award citation formally acknowledges Boneh "For ground-breaking contributions to the development of pairing-based cryptography and its application in identity-based encryption."

Pairing-based cryptography has flourished over the past decade, making security mechanisms easier to use and roll out.

ACM President Alexander L. Wolf said in a statement, "Boneh's work on pairing functions and their application to identity-based encryption has revolutionized cryptography. He has added greatly to our understanding of important problems underlying modern cryptography systems. Boneh has produced new directions and given the field a fresh start."

Boneh's work has been formalized in such industry standards as IEEE P1363.3 and several IETF RFCs. The holder of nine patents, Boneh also co-founded Voltage Security to commercialize identity-based encryption. HP bought Voltage earlier this year for an undisclosed amount.

You can see and hear Boneh discuss computer security in the Stanford video below. And if you're really interested in his take on things, you can sign up for his online Coursera courses this year on computer security and cryptography.

Follow this link:
Stanford crypto expert Dan Boneh wins $175K computer science award

EB72 – Siân Jones: Cryptocurrency Regulation Update: Uk, Isle Of Man, California, Bitlicense – Video


EB72 Sin Jones: Cryptocurrency Regulation Update: Uk, Isle Of Man, California, Bitlicense
Support the show, consider donating: 3HqLKkYSjzx6zmPN6jFt2R9XYw5BpooPjX (http://bit.ly/1bxn7fA) When one is busy driving a technological and societal revolution forward, complying with ...

By: Epicenter Bitcoin

Visit link:
EB72 – Siân Jones: Cryptocurrency Regulation Update: Uk, Isle Of Man, California, Bitlicense - Video

After Snowden, The NSA Faces Recruitment Challenge

Not many students have the cutting-edge cybersecurity skills the NSA needs, recruiters say. And these days industry is paying top dollar for talent. Brooks Kraft/Corbis hide caption

Not many students have the cutting-edge cybersecurity skills the NSA needs, recruiters say. And these days industry is paying top dollar for talent.

Daniel Swann is exactly the type of person the National Security Agency would love to have working for it. The 22-year-old is a fourth-year concurrent bachelor's-master's student at Johns Hopkins University with a bright future in cybersecurity.

And growing up in Annapolis, Md., not far from the NSA's headquarters, Swann thought he might work at the agency, which intercepts phone calls, emails and other so-called "signals intelligence" from U.S. adversaries.

"When I was a senior in high school I thought I would end up working for a defense contractor or the NSA itself," Swann says. Then, in 2013, NSA contractor Edward Snowden leaked a treasure-trove of top-secret documents. They showed that the agency's programs to collect intelligence were far more sweeping than Americans realized.

After Snowden's revelations, Swann's thinking changed. The NSA's tactics, which include retaining data from American citizens, raise too many questions in his mind: "I can't see myself working there," he says, "partially because of these moral reasons."

This year, the NSA needs to find 1,600 recruits. Hundreds of them must come from highly specialized fields like computer science and mathematics. So far, it says, the agency has been successful. But with its popularity down, and pay from wealthy Silicon Valley companies way up, agency officials concede that recruitment is a worry. If enough students follow Daniel Swann, then one of the world's most powerful spy agencies could lose its edge.

People Power Makes The Difference

Contrary to popular belief, the NSA's black buildings aren't simply filled with code-cracking supercomputers.

"There's no such thing as a computer that can break any code," says Neal Ziring, a technical lead in the agency's information assurance directorate. "People like to think there's some magic bullet here, and there isn't. It's all hard work."

See the original post:
After Snowden, The NSA Faces Recruitment Challenge

The NSA almost ended phone spying before Snowden leaks

The NSA consideredshutting down its clandestine call data collection program months before Edward Snowden leaked classified information in 2013. According to a report from the Associated Press, some people inside the agency were questioning the value of the program, believing that itsbenefits did not justify the costs.

Reportedly,internal critics were concerned with the rising costs of gathering and storing the to and from information from domestic landlines. Critics also pointed out the programs inability to capture most cellphone calls, as well as public outrage if the program were to ever go public. Arguably the biggest criticism, though, was the programs inability to play a crucial role in the unraveling of terrorist plots, stated the report.

Related:Tech giants demand end to NSA spying

The report, which cited current and former intelligence officials, also stated top managers in the agency were already discussing a proposal to shut down the program. However, Snowdens revelations changed things. Instead, NSA officials justified data collection, defending the programs effectiveness to Congress and the American public. Sources said that the proposal never made it to the desk of former NSA director Keith Alexander because officials doubted that he would sign off on it.

The argument against the bulk collection of call data was said to have been gaining momentum before the Snowden leaks. Aside from the concerns with costs, the program was also criticized for opening a growing number of loopholes that weakened its effectiveness.

By 2013, some NSA officials were ready to stop the bulk collection even though they knew they would lose the ability to search a database of U.S. calling records, the report read.

This new information comes as Congress is set to decide on whether to discontinue or reform the legal basis for the program. Sections 215 and 214 of the Patriot Act, which were first used in the wake of the 9/11 attacks, sunset on June 1. This effectively gives Congress its best shot of instituting changes into the NSA program. Previous attempts, like the USA Freedom Act, failed to move forward in spite of the outrage over the Snowden leaks.

See the article here:
The NSA almost ended phone spying before Snowden leaks

San Francisco Pride, Chelsea Manning, and Queer …

From FoundSF

"I was there..."

by Caitlin Carmody

In April 2013, San Francisco Pride seemed to take an exciting step with the nomination of queer military whistleblower Chelsea (ne Bradley) Manning as a grand marshal for the 2013 Pride parade. Manning would not have been present for the honor, as she was in military custody facing life in prison for revealing war crimes committed by the United States during the war in Iraq. But Daniel Ellsberg, fellow whistleblower and famed leaker of the Pentagon Papers, was happy to accept the honor on her behalf and represent her in the parade. In nominating a queer military whistleblower, Pride was making an important statement about the values of the gay rights movement; grand marshals are the public emissaries of Pride. They represent a mix of individuals and organizations that have made significant contributions to the lesbian, gay, bisexual, transgender community. With the help of community input, Pride selects these groups and individuals as Grand Marshals in order to honor the work they have put into furthering the causes of LGBT people.(1)

Manning contingent was the largest in SF Pride march, June 2013.

Photo: courtesy Private Manning.org

No sooner had this honor been bestowed upon Manning when San Francisco Pride Board President Lisa Williams released a statement revoking the honor. The statement indicated Manning's nomination had been an error committed by someone within Pride going rogue and never should have been allowed to happen. Williams wrote: "Bradley Manning(2) is facing the military justice system of this country. We all await the decision of that system. However, until that time, even the hint of support for actions which placed in harms [sic] way the lives of our men and women in uniform and countless others, military and civilian alike will not be tolerated by the leadership of San Francisco Pride. It is, and would be, an insult to every one [sic], gay and straight, who has ever served in the military of this country." The response to Williams' statement from the more radical edge of the gay rights movement in the Bay Area was swift and furious. Williams' statement seemed to many on the queer Left as horribly illustrative of an ongoing tension within the movement for gay rights: are we looking to join the system, imperialism, war, and all, or are we opposed to the rotten status quo and want to radically transform it? Had Manning not made significant contributions to the LGBT community in revealing U.S. war crimes in Iraq? Do queers not care about militarization, racism, imperialism, and massacre in the name of patriotism and freedom?

Pride president Lisa Williams said naming Manning as a grand marshal would be an insult to everyone who had ever served in the military; for me, what seemed the biggest insult was Pride taking the side of the U.S. military and its war crimes, elevating the military to untouchable status: Thou shalt not utter a word against war, was Pride's party line. It was alarming to see the leadership of one of the largest gay pride parades in the world completely uncritically endorsing what they called the military justice system, as if such a system dispenses what we all call justice. It was also alarming to hear them condemn Mannings actions, which they erroneously claim placed in harms way the lives of our men and women in uniform -- and countless others, military and civilian alike. Many people, including many former members of the military, characterized Mannings actions as an important act of dissidence, blowing the whistle on U.S. war crimes, and saving countless human lives by throwing a wrench in the U.S. war machine. It was not Mannings actions, but the U.S. military establishment, that place in harms way, and actively end, the lives of many people, civilian and military, U.S. and Iraqi alike (though Pride seemed not to care about dead Iraqi civilians). Prides statement via Williams was also alarmingly repressive: not a hint of support for Mannings actions would be tolerated. Hardly the endorsement of free speech and dissent one would hope for from gay rights leaders.

Video: courtesy Private Manning.org

Go here to see the original:
San Francisco Pride, Chelsea Manning, and Queer ...

Edward Snowden Attorney Ben Wizner Speaks at UVA Law – Video


Edward Snowden Attorney Ben Wizner Speaks at UVA Law
ACLU attorney Ben Wizner spoke at the University of Virginia School of Law on March 25 about protecting privacy in an era in which government organizations and businesses wish to gather increasing ...

By: University of Virginia School of Law

Read the original here:
Edward Snowden Attorney Ben Wizner Speaks at UVA Law - Video

NSA Considered Ending Phone Spying Before the Edward …

A new report by the Associated Press suggests that the National Security Agency mulled the possibility of abandoning its phone surveillance program just before the Edward Snowden's leaksthough ultimately the suggestion didn't progress fast enough.

The report explains that some officials at the NSA "believed the costs outweighed the meager counterterrorism benefits" that the program offered. Those internal critics pointed to ever-increasing costs of recording and storing information from phone calls which weren't successfully uncovering evidence of terrorism. Understandably, they also "worried about public outrage if the program ever was revealed," points out the AP.

Indeed, a proposal to scrap the system was apparently circualting within the NSA among "top managers" during 2013though it had yet to make it to the desk of the NSA director General Keith Alexander by the time that Snowden leaked its documents.

After the event, of course, the NSA strongly defended its practices over telephone surveillance, arguing that it was vital for routing out terrorist threats. This new report suggests that internal thinking may have been rather more conflicted.

Meanwhile, the NSA continues to collect and store phone call data under Section 215 of the Patriot Act. Presumably, plenty of people at the NSA still think it's a bad idea. [AP on Huffington Post]

Follow this link:
NSA Considered Ending Phone Spying Before the Edward ...