Timothy Olyphant joins Oliver Stone’s Edward Snowden movie

February 20, 2015 - 15:32 AMT

PanARMENIAN.Net - Justified star Timothy Olyphant has joined Oliver Stones untitled movie about whistleblower Edward Snowden, Variety reports.

Joseph Gordon-Levitt, Shailene Woodley and Melissa Leo are also signed up for the project with Open Road Films and Endgame Entertainment teaming on the U.S. release.

Stone and longtime producing partner Moritz Borman acquired the rights last year to two books Time of the Octopus, a novel written by Snowdens Russian lawyer Anatoly Kucherena, and Luke Hardings The Snowden Files, The Inside Story of the Worlds Most Wanted Man as sources for Stones screenplay. Borman is producing with Eric Kopeloff.

Snowden was charged in 2013 by the U.S. Department of Justice with two counts of violating the Espionage Act and theft of government property and his passport was revoked a week later by the U.S. Department of State. He was granted temporary asylum by Russia last year.

Olyphant has been cast as a CIA agent who befriended Snowden after Snowden released the classified documents. Leo will portray Laura Poitras, whose Snowden documentary Citizenfour is the frontrunner in the category at Sundays Academy Awards.

Olyphant starred in This Is Where I Leave You.

The news was first reported by Deadline.com.

More:
Timothy Olyphant joins Oliver Stone’s Edward Snowden movie

Designing an Efficient Image Encryption Then Compression System via Prediction Error Cluste – Video


Designing an Efficient Image Encryption Then Compression System via Prediction Error Cluste
Frontline offers Final Year IEEE Projects. Get the abstract, project source code, documentation ,ppt and UML Diagrams. Online Demo and Training Sessions available. Frontline India visit us...

By: IEEE Projects Karur Frontline

Go here to see the original:
Designing an Efficient Image Encryption Then Compression System via Prediction Error Cluste - Video

How to restore files from encryption program "Folder Protect" —Part 01 – Video


How to restore files from encryption program "Folder Protect" ---Part 01
In this first part we will talk about the problem of restoring the encrypted files by" Folder Protect" program and what are the problems encountered by the user when the forgotten password...

By: We Learn To Change For The Better

The rest is here:
How to restore files from encryption program "Folder Protect" ---Part 01 - Video

What President Obama is getting wrong about encryption

President Obama tried to walk a very fine line on encryption, the technology that secures much of the communications that occur online, during his recent visit to Silicon Valley -- saying that he is a supporter of "strong encryption," but also understands law enforcement's desire to access data.

"I lean probably further in the direction of strong encryption than some do inside of law enforcement," Obamasaid during aninterviewwith tech news site re/code. "But I am sympathetic to law enforcement because I know the kind of pressure theyre under to keep us safe. And its not as black and white as its sometimes portrayed."

But the technical aspects of encryption actually are quite black and white, experts say, adding thatthe example Obama usedto illustratethe risks of encryption doesn't match up with how tech companies are deploying the security measure for customers. Obamasuggestedthat the FBI might be blocked from discovering who a terrorist was communicating with by tech companies' recent efforts to beef up encryption. But that type of data would still remain available, technical experts say.

The White House declined to comment.

Tech companies have expandedtheir encryption offeringssincedetails about the National Security Agency's efforts to get around security practices were revealed by former National Security Agency contractor Edward Snowden. Perhaps most notably, Apple and Google have made it so they are unable to unlock many mobile devices that use their operating systems -- even if served with a warrant.

This has set up a conflict between tech companies and law enforcement officials, who warn such technology can allow bad guys to "go dark" and evade legitimate attempts at surveillance.

Obama tried to explain a scenario where this might harm national security during his re/code interview:

Lets say you knew a particular person was involved in a terrorist plot. And the FBI is trying to figure out who else were they communicating with, in order to prevent the plot. Traditionally, what has been able to happen is that the FBI gets a court order. They go to the company, they request those records the same way that theyd go get a court order to request a wiretap. The company technically can comply.

With the expansion of encryption, Obama said, a tech company may have secured that data so well that it would be inaccessible. But that's not actually how the iOS or Android default encryption works, technical experts say.

"The example he gives in his interview is one where encryption deployed by a company prevents them from being able to tell the government who someone is in contact with," said Christopher Soghoian,the principal technologist at the American Civil Liberties Union's Speech, Privacy and Technology Project. "That's not taking place right now."

Excerpt from:
What President Obama is getting wrong about encryption

NSA, Britain’s GCHQ allegedly seized encryption keys for millions of phones

British and American spy agencies allegedly hacked into a Dutch company that makes SIM cards to obtain encryption keys used to shield the cellphone communications of millions of customers around the world, according to a report in the Intercept.

Citing documentsobtained by former intelligence contractor Edward Snowden, the online publication reported Thursday that Britains GCHQ and the National Security Agency targeted Gemalto, the worlds largest manufacturer of SIM cards.

The multinational firms clients include AT&T, T-Mobile, Verizon and Sprint, as well as hundreds of wireless network providers around the world. It produces 2billion SIM cards a year, the Intercept reported.

The cards, which are chips barely larger than a thumbnail, are inserted into cellphones. Each card stores contacts, text messages, the users phone number and an encryption key to keep the data private.

Gemalto produces the SIM cards for cellphone companies, burns an encryption key onto each and sends a copy of the key to the provider so its network can recognize an individuals phone.

According to the Intercept, GCHQ targeted Gemalto employees, scouring their e-mails to find individuals who might have access to the companys core networks and systems that generate the encryption keys. The goal, the publication said, was to steal large quantities of keys as they were being transmitted between Gemalto and its wireless network providers.

The NSA did not immediately respond to a request for comment.

Stealing the encryption keys makes it possible to eavesdrop on otherwise-encrypted communications without undertaking the more difficult challenge of cracking the encryption. It also avoids alerting the wireless company or the person using the phone.

The NSAs interception of phone calls and other content is bound by different legal standards. A warrant is required to target an Americans calls and e-mails. In general, targeting a foreigners communications for collection overseas does not require a warrant.

The publication cited one 2010 GCHQ document that said that agency personnel developed an automated technique with the aim of increasing the volume of keys that can be harvested.

Read the original:
NSA, Britain’s GCHQ allegedly seized encryption keys for millions of phones

Spy agencies’ hacking of mobile encryption keys is no surprise, says security expert

The alleged hacking of Sim maker Gemalto by UK and US spy agencies to steal mobile communication encryption keys is not a huge surprise, according to a Europol adviser on cyber security.

If it is true, it is plausible that they would do this, but then I suspect every other significant communications interception intelligence agency will be doing the same, said Alan Woodward, cyber security expert and visiting professor at Surrey University.

But Woodward believes the journalists who first reported the hacking have their own political agenda. So one needs to calibrate the way it is written with that in mind, he told Computer Weekly.

There appears to be a desire in some quarters to conflate the ability to listen in on mobile calls with mass surveillance.I don't see that as the case.

If it is true, the joint GCHQ and NSA operation simply shows intelligence organisations adapting to new technologies as they come along to make sure they do not go blind, said Woodward.

If the encryption keys were stored on a computer network that the spy agencies hacked into, and Gemalto had no idea it had been hacked prior to the report by The Intercept, Woodward believes this suggests many others may have been into that same network for the same purpose.

I'm afraid it's what secret intelligence services do, and personally I'd rather my country was doing it where there is at least some oversight of such operations, he said.

But this again raises the whole issue of whether the UK government should be conducting such surveillance, even if it is under various rules.

Just like policing, it has to be done by consent, said Woodward. And, if the population were to turn to the government and say 'you must dismantle this capability', then it should be clearly understood that this will have security implications.

Woodward does not see this as a trade-off between privacy and security. He believes that although mass surveillance is undesirable, it is possible to have both privacy and security if there are appropriate rules and oversight.

Follow this link:
Spy agencies’ hacking of mobile encryption keys is no surprise, says security expert

Prevoty releases cryptography service to make encryption easier for developers at no cost

Los Angeles, CA (PRWEB) February 18, 2015

Prevoty, Inc., a new security software company providing runtime application security technology, today announced availability of the Prevoty Cryptography Service (PCS), a new free service providing sophisticated encryption, decryption and hashing for developers.

Implementing and using cryptographic functions within a single software development project, let alone a business application, is a complicated and error-prone process. A developer ultimately has to weigh the merits of various algorithms, select a particular algorithm, ensure its implementation is verifiably correct and pass the correct arguments for execution.

This, combined with the realization that the average developer is unlikely to be aware of exactly how cryptographic functions actually work, has resulted in secure data not being properly encrypted or data breaches exposing plain-text passwords. For larger organizations, having different developers make these decisions independently compounds that risk.

Few will disagree that encrypting sensitive data is really important, said Jamil Farshchi, Chief Information Security Officer at Time Warner, Inc. But a key challenge to realizing the value of encryption is standardizing the implementation and use of cryptographic functions across the entire suite of business applications.

PCS provides a cloud interface for developers to achieve industry-standard security. Applications enabled with the service have the ability to simply encrypt, decrypt, hash, and generate keys and random numbers in a manner that is both secure and verifiable.

PCS enables robust cryptography to be used across enterprises without developers needing to become security experts, said Kunal Anand, co-founder and CTO of Prevoty. Developers can trust that the supported cryptographic functions within PCS are always maintained and updated with the latest security guidance.

Applications developed in C#, Go, Java, node.js, PHP, Python and Ruby can take advantage of this service by including the appropriate Prevoty SDK and invoking the desired functions.

To reduce complexity, PCS has pre-built aliases for developers to accurately hash passwords and encrypt content without even having to specify an encryption key, cipherkey or initialization vector.

More information on PCS is available at https://www.prevoty.com/developer and developers can gain access to the Prevoty Cryptography Service for free at http://info.prevoty.com/free-developer-services.

More here:
Prevoty releases cryptography service to make encryption easier for developers at no cost

Monitoring Julian Assange has cost the UK government up to …

It's easy to forget that Julian Assange is still cooped up inside London's Ecuadorian embassy. The WikiLeaks founder entered the building back in June 2012 to escape extradition and ever since, Metropolitan Police officers have been stationed outside, waiting patiently just in case he ever decides to leave. It might not sound like the most costly operation, but over the years it's racked up quite a bill for the UK government. Earlier this month the Met revealed that policing the embassy had cost an estimated 9 million up until October last year. That equates to roughly 10,500 per day --- and if you project that forward, it means the entire affair has now crossed the 10 million mark. Of course, this is all merely an approximation, but it further highlights the costs involved in the Assange affair. Last summer, the man himself revealed that he would be leaving the embassy "soon," but since then there's been no sign of his imminent departure. Unless his health or legal circumstances change, the bill for the UK government is only going to increase.

[Image Credit: AP Photo / John Stillwell, POOL]

Follow this link:
Monitoring Julian Assange has cost the UK government up to ...