Chelsea Manning To Be ‘Guardian’ Columnist

Updated at 11:33 a.m., Wednesday

Chelsea Manning, the former Army intelligence analyst, who was sentenced to 35 years in prison for being behind the biggest leak of classified information in U.S. history, will write an opinion column for The Guardian's U.S. website, the site's editor-in-chief said.

Politico, quoting a Guardian memo, reported the announcement was one of several hires at the organization. Manning, who is serving her sentence at Fort Leavenworth, Kan., will not be paid, Guardian US Editor-in-Chief Katharine Viner said in a tweet. Also, Manning's columns won't be on a set schedule.

In this undated file photo provided by the U.S. Army, Pfc. Chelsea Manning poses for a photo wearing a wig and lipstick. AP hide caption

In this undated file photo provided by the U.S. Army, Pfc. Chelsea Manning poses for a photo wearing a wig and lipstick.

In a column last year for The New York Times, Manning outlined the rationale for her actions, saying she leaked the documents out of "a love for my country and a sense of duty to others."

In a subsequent column for The Guardian, Manning wrote about the U.S. strategy against the self-described Islamic State, noting that "only a very focused and consistent strategy of containment can be effective in reducing the growth and effectiveness of [the group] as a threat." In another column for The Guardian, this one in December, Manning wrote about the challenges of being a transgender woman.

Manning began the transition last year.

Visit link:
Chelsea Manning To Be 'Guardian' Columnist

Chelsea Manning to join The Guardian as an opinion writer

Katharine Viner, editor-in-chief at The Guardian U.S., announced today that Chelsea Manning will join the publication as a contributing opinion writer.

Manning will write from Fort Leavenworth prison in northeast Kansas, where she is serving a 35-year sentence for leaking national security documents to WikiLeaks in 2010. She will not be paid for the work, Politico reported.

Manning, who served in the military under her birth name Bradley, was deployed in Iraq for a year and a half before her arrest in May 2010. After her sentencing in 2013, Manning announced that she was a transgender woman, and last May U.S. Secretary of Defense Chuck Hagel approved a plan to assist her gender transition while in prison. In September, the American Civil Liberties Union filed a lawsuit for Manning against Hagel and other government officials, saying that she had not yet received the treatment she was promised.

Manning wrote an essay for The Guardian in December outlining some of the challenges that transgender people face in the U.S. legal system. She wrote:

Despite ample evidence that trans people have existed in most cultures throughout history, and the medical consensus that trans people can live healthy, productive lives, many governments continue to impose barriers on trans people that can make it almost impossible to survive.

Read more from the original source:
Chelsea Manning to join The Guardian as an opinion writer

CIA Whistleblower John Kiriakou on Edward Snowden: He Will Not Get a Fair Trial – Video


CIA Whistleblower John Kiriakou on Edward Snowden: He Will Not Get a Fair Trial
http://democracynow.org - In a broadcast exclusive interview, Democracy Now! interviews John Kiriakou, a retired CIA agent who blew the whistle on torture. In 2007, Kiriakou became the first...

By: democracynow

More:
CIA Whistleblower John Kiriakou on Edward Snowden: He Will Not Get a Fair Trial - Video

Watching the whistleblower: Behind Edward Snowden doco Citizenfour

Adam Berry

Filmmaker Laura Poitras accepts the Carl von Ossietzky journalism prize on December 14, 2014 in Berlin.

Edward Snowden's decision to release explosive revelations and his own identity were captured by American film-maker Laura Poitras for new feature documentary Citizenfour. She talks to Steve Dollar.

Nothing in her career as a documentary film-maker could quite prepare Laura Poitras for an encounter in a luxury hotel room in Hong Kong in June 2013. It was there, amid absolute secrecy and after months of encrypted communications, that she met Edward Snowden. The once-anonymous contractor for the National Security Agency was about to become the world's most famous whistleblower, leaking classified documents that exposed the unprecedented global and domestic reach of the agency's surveillance programmes.

"Being in the hotel room, I had an experience I had never had before," says the director of feature documentary Citizenfour. "There were things I filmed that I couldn't remember that I filmed, and I saw them later in the footage. I just blocked them."

Although she remains behind the camera, Poitras was joined in the sessions by journalists Glenn Greenwald - to whom Snowden had likewise reached out and the film-maker had persuaded to participate - and Ewen MacAskill of The Guardian. They would become the conduits for the release of Snowden's explosive revelations. "There's a conversation when Glenn talks to Snowden about coming forward, and the camera goes back and forth, and I actually didn't remember I filmed that, and for me it's the most powerful scene in the film," says Poitras, 52.

In the scene, Snowden insists he will go public as the source of the NSA leaks that the journalists will release regardless of the consequences. It's a palpably electric sequence, which would be the core of any fictional drama. In this case, though, the action is perilously real, and the camera isn't only capturing a historical event, it's part of the making of it.

"The choice that he's making could end his life," Poitras says. "I've worked in war zones with bombs going off, and I know, 'OK, that's the moment'. I know that's the one where all the emotion is contained. In this case, my brain, whatever those defences were, just blocked it out. I felt we were in a state of free fall, not knowing what kind of landing we'd encounter."

When Citizenfour, which takes its title from a codename used by Snowden to identify himself to Poitras, begins screening today it will introduce audiences to a mild-mannered and quick-witted computer expert who is variously considered a traitor or a hero but whose image has been inevitably distorted by much of the news media.

"I think there's enough evidence on the table [that] you can make your own decision," says Poitras, whose measured approach frames in intimate and vulnerable terms what might have been sensationalised. "We wanted not to be influenced or feed into the frenzy around us, but stay true to material and the human drama. It's really about Snowden and what he chose to do."

Here is the original post:
Watching the whistleblower: Behind Edward Snowden doco Citizenfour

Judge Lets NSA Continue Spying on US Citizens

A federal judge in the Northern District of California just ruled that he can't rule in a case accusing the NSA of spying on Americans. This lack of a ruling means the NSA may continue with its activities. But the really disappointing and weird part is how the judge justified his stance.

The judge said the case couldn't continue because it might lead to the possible disclosure of state secrets. In other words, you can't stop the NSA from running its secret program even if that program violates the Fourth Amendment because the program is secret. It's the most vicious of cycles.

The case in question is Jewel vs. NSA. It's civil liberties organization Electronic Frontier Foundation's longest standing challenge to the NSA's practice of intercepting internet communications, and understandably, EFF was not happy with the ruling. The organization's Kurt Opsahl wrote in a blog post:

EFF will keep fighting the unlawful, unconstitutional surveillance of ordinary Americans by the U.S. government. Today's ruling in Jewel v. NSA was not a declaration that NSA spying is legal. The judge decided instead that "state secrets" prevented him from ruling whether the program is constitutional.

It would be a travesty of justice if our clients are denied their day in court over the "secrecy" of a program that has been front-page news for nearly a decade. Judge White's ruling does not end our case.

Just to recap, a federal court can't decide whether a government spy agency's actions are constitutional because they're too secret. Isn't this sort of thing what the Bill of Rights is supposed to prevent from happening? Either way, it doesn't look like President Obama is going to reform this twisted situation. [Reuters, EFF]

Read the rest here:
Judge Lets NSA Continue Spying on US Citizens

US judge backs NSA in people vs privacy case

A US JUDGE HAS ruled in favour of the National Security Agency (NSA) in a personal privacy case, despite the protests of rights group the Electronic Frontier Foundation (EFF).

Jewel vs the NSA was ruled on by judge Jeffrey White in Oakland, California, who told plaintiffs that they had failed to prove that the government violated a long established hope that a man's home is his castle', or rather the Fourth Amendment.

The EFF expressed its disappointment at the latest stage in a case in which it has been involved for some time.

"EFF will keep fighting the unlawful, unconstitutional surveillance of ordinary Americans by the US government," the group said in a statement.

"Today's ruling was not a declaration that NSA spying is legal. The judge decided instead that 'state secrets' prevented him from ruling whether the programme is constitutional.

"It would be a travesty of justice if our clients are denied their day in court over the secrecy' of a programme that has been front page news for nearly a decade.

"Judge White's ruling does not end our case. The judge's ruling only concerned upstream internet surveillance, not the telephone records collection nor other mass surveillance processes that are also at issue."

The EFF has looked to crack open the government during the case and get it to talk more openly about surveillance sweeps.

"The American people know that their communications are being swept up by the government under various NSA programmes," it said.

"The government's attempt to block true judicial review of its mass, untargeted collection of content and metadata by pretending that the basic facts about how the spying affects the American people are still secret is outrageous and disappointing."

See more here:
US judge backs NSA in people vs privacy case

D.C. mayor to end controversial encryption of firefighter radios

D.C. Mayor Muriel E. Bowsers administration announced Wednesday that the District will abandon its new system of encrypting radio communications among firefighters and paramedics.

The Districts encryption came under intense scrutiny last month when Metro officials said they found changes to firefighter radio settings related to encryption following a widespread radio failure during Metros fatal Jan.12 smoke incident.

In that incident, D.C. firefighters could not communicate with supervisors above ground when they learned that a train was trapped in a smoke-filled tunnel south of the LEnfant Plaza station with more than 200 passengers aboard.

D.C. firefighters and the citys homeland security agency have disputed that encryption played any part in the radio failure.

In a statement on Wednesday, Rashad Young, Bowsers city administrator, said the encryption issue had been under review since before Bowser was inaugurated Jan.2. Going forward, he said, encryption would be only used on a case-by-case basis.

After a thorough review that began in December, Mayor Bowser has decided that it is in the best interest of the District and its residents to change encryption protocols, Young said.

Two administration officials who spoke to the Post about the upcoming change on Tuesday stressed that the move was not an acknowledgment that encryption hampered rescue efforts last month, when Metro passengers waited for more than 35 minutes for help.

It has nothing to do with the Metro incident, said one of the two officials. Both spoke on the condition of anonymity because they did not want to be seen as preempting Bowsers announcement. The impending announcement was first reported by WRC (Channel 4).

The timing of the announcement has in fact been complicated because we dont want to suggest in any way that it is connected to the outstanding allegation that [encryption and the Metro incident] are connected, the official said.

The District began work to encrypt its radio transmissions after the 2013 rampage at the Navy Yard. The shooting that left 12 dead prompted a dangerous search by police as they hunted the gunman before fatally shooting him. Although communication involving federal and local police agencies could not be heard by outsiders, the fire department scanner widely available over the Internet provided an account of some of the behind-the-scenes activities. Firefighters were not in the building when the manhunt was underway.

See the article here:
D.C. mayor to end controversial encryption of firefighter radios

Encryption Wouldn’t Have Stopped Anthem’s Data Breach

To prevent breaches companies must strictly control which employees can access sensitive data.

The recent data breach at health insurer Anthem saw criminals access the personal details and Social Security numbers of more than 80 million peoplethe biggest health-care data theft to date. Medical and payment data was not compromised, but the names, addresses, birthdays, and Social Security numbers accessed can be used by criminals to commit various types of fraud.

Many people have been surprised to hear that this sensitive data was not encrypted and that the federal mandate for securing health-related data, HIPAA, does not require it to be. In fact, HIPAA only strongly encourages encryption. Organizations that choose not to use encryption are supposed to document the reasons why not and implement an equivalent alternative measure if reasonable and appropriate. The vagueness of this requirement is the crux of class action and other lawsuits being filed against Anthem.

But even if Anthem had used encryption, the data could have still have been compromised. Encryption is just one part of the arsenal that organizations need to deploy to secure sensitive data. Encryption is great for securing data in transit and at rest, but if the credentials and keys are compromised it does little to protect the data.

The bigger issue in many breaches is that organizations havent properly implemented data access security controls. They need to have safeguards in place in case attackers can bypass perimeter defenses and compromise administrator level credentials.

This is precisely what happened to Anthem, which says its attackers gained access to at least five sets of employee credentials.

Its ridiculously easy for cybercriminals to find the information they need to compromise almost any organization. A quick look at Anthem job postings and LinkedIn profiles was enough for me to identify the software Anthem uses for its data warehouse.

From there, I could easily identify more than 100 people, such as system architects and database administrators, who would have privileged access to the data warehouse storing tens of millions of sensitive personal records. This was probably the first thing Anthems attackers researched before conducting a phishing campaign to distribute the malware used to harvest employee credentials.

An attacker who can compromise a system via the credentials of a user with administrator-level access to the data warehouse can easily steal more credentials, find monetizable information, and exfiltrate unencrypted data.

So what should organizations do to secure sensitive customer data? Sophisticated attackers with enough time and resources can get into any organization eventually. Cybercriminals are fully aware of the constant trade-offs that organizations make to balance security with operational efficiency, and theyve repeatedly demonstrated that theyre fully capable of exploiting even tiny security weaknesses.

Read the original:
Encryption Wouldn’t Have Stopped Anthem’s Data Breach

Box delivers encryption management to boost security for enterprise customers

Home News Cloud Box delivers encryption management to boost security for enterprise customers Box believes it has cracked one of the last remaining concerns for security conscious and heavily regulated industries with the introduction of an Enterprise Key Management product.

Share

Box Enterprise Key Management (EKM), currently in beta, gives businesses the ability to maintain exclusive control over their encryption keys. The technology is currently being delivered via Amazon Web Services and Gemalto.

"In the old days, if you wanted to encrypt and protect data inside your organisation, IT could set it up," said Rand Wacker, Box's vice president of enterprise products. "But if you tried to share something across organisations, that's usually where stuff broke down."

Aimed at users in highly regulated industries such as finance, government, legal and healthcare as well as geographies such as Germany, Box EKM is designed to help enterprises reap the rewards of cloud computing while still maintaining control over encryption, he said.

Box, which IPO'd last month, and has its European HQ in London, already makes sure all content it stores is already encrypted, Wacker noted. What's new is that Box EKM externalises management of the associated encryption keys.

"When a customer uploads a file, it's encrypted with a unique key for that file," he said. "What happens today is that the file-specific key is encrypted by an internal key-management system."

With the new capability, however, customers get control over that key and the auditing of it.

The key infrastructure is provided by a dedicated AWS CloudHSM appliance leveraging Gemalto's SafeNet Hardware Security Modules (HSM) for key encryption and protection. Customers retain full control of their keys and cryptographic operations while Amazon manages and maintains the hardware.

Box EKM not only separates encrypted data and the keys used to manage it, but also creates an audit log for the customer's review.

Read more here:
Box delivers encryption management to boost security for enterprise customers