Chelsea Manning – Wikipedia, den frie encyklopædi

Chelsea Manning (fdt Bradley Manning, 17. december 1987 i Crescent, Oklahoma, USA) er en amerikansk soldat og whistleblower, der i 2010 blev anklaget for at have lkket fortrolig information. Information der menes at vre givet til WikiLeaks.[1] Den endelige anklage ld p 22 forbrydelser, heriblandt videregivelse af national forsvarsinformation til en uautoriseret kilde og hjlp til fjenden.[2]

Manning var udstationeret ved en hrenhed nr Bagdad, hvor hun havde adgang til databaser, der blev brugt af den amerikanske regering til, at sende klassificeret information. Hun blev anholdt efter hackeren Adrian Lamo, havde fortalt FBI, at Manning overfor ham, i onlinechats, havde fortalt at hun havde downloadet materiale fra disse databaser og videregivet det til WikiLeaks. Indeholdt i materialet var videoen af Luftangrebet i Bagdad den 12. juli 2007 og en video af Luftangrebet p Garani i Afghanistan i 2009, 250.000 dokumenter fra amerikanske ambassader, samt 500.000 hrrapporter, der senere blev kendt som henholdsvis Krigsdagbgerne fra Irak og Krigsdagbgerne fra Afghanistan. Samlet set var det det strste antal fortrolige dokumenter, der nogensinde er lkket til offentligheden. Meget af det blev efter flgende publiceret af WikiLeaks eller deres mediepartnere mellem april og november 2010.[3]

Den amerikanske filminstruktr Michael Moore og den amerikanske akademiker Daniel Ellsberg har sammen dannet en forening, der sger at f Manning lsladt.

Den 21. august 2013 blev hun idmt 35 rs fngsel og blev afskediget i unde fra den amerikanske hr. Det forventes at hun vil appelere dommen, som hun ellers ville kunne opn prvelsladelse fra efter udstelse af en tredjedel.[4]

Manning har siden barndommen flt sig transknnet og dagen efter domfldelsen udsendte hun en meddelelse, hvor hun identificerede sig som kvinde, ndrede sit navn til Chelsea Manning og udtrykte nske om hormonbehandling.[5]

Read more from the original source:
Chelsea Manning - Wikipedia, den frie encyklopædi

UK spent $15.6 million guarding embassy housing Julian Assange

Scotland Yard has spent at least $15.6 million guarding the Ecuadorean embassy in London where WikiLeaks founder Julian Assange has been holed up fornearly 1,000 days.

Assange was granted asylum there and could be arrested if he leaves the embassy. Swedish authorities want to question him about an alleged sexual assault in Stockholm in 2010; he says the sex was consensual. A Swedish court upheld an arrest warrant last year, and British courts have said he should be extradited to Sweden.

"[Sweden is]hardly an illiberal rogue state. Of course the right thing for him to do is face justice in a country where due process is well established," British Deputy Prime Minister Nick Clegg said Thursday.

The costs, more than $15,000 daily, cover policing and overtime. The figures were first reported by LBC Radio of London, which obtained the data under open records laws. The station said the price tag, at least through October 2014, amounted to the cost of 343 patrol officers for a year.

"It is embarrassing to see the UK government spending more on surveillance and detaining an uncharged political refugee than on its investigation into the Iraq war, which killed hundreds of thousands," Kristinn Hrafnsson, a WikiLeaks spokesman, said.

Assange has not been formally charged with a crime. According to Assange's own September 2013 affidavit, he said that the women he slept with specifically said they were not accusing him of rape and that police made up the charges.

If extradited to Sweden, the 43-year-old Assange fears he might then be sent to the United States and prosecuted forpostingclassified US military documents on the secret-spilling site.

In a September telephone interview with Ars, the Australian briefly spoke of being trapped in the embassy."For security reasons, I can't tell you which sections of the embassy I utilize," he said. "As to the rest, in a way, it's a perfectly normal situation. In another way, it's one of the most abnormal, unusual situations that someone can find themselves in."

The US government's WikiLeaks investigation began in 2010 after WikiLeaks distributed tens of thousands of US secrets obtained by Chelsea Manning, an Army private sentenced to 35 years in prison after being convicted of espionage and other charges.In addition to leaking thousands of diplomatic documents, Manning's most famous leak was a video of a 2007 Apache helicopter attack that killed civilians and a Reuters journalist in Iraq. The video ultimately became known as the "collateral murder" video.

Google, meanwhile, said last month that ithanded over data to USauthorities about three WikiLeaks staffers as part of the government's espionage probe of Assange and the site.

See the original post here:
UK spent $15.6 million guarding embassy housing Julian Assange

Chelsea Manning — Wikipédia

Un article de Wikipdia, l'encyclopdie libre.

Chelsea Manning, n Bradley Manning le 17 dcembre 1987 Crescent, Oklahoma (tats-Unis), est un ancien analyste militaire de l'arme des tats-Unis de nationalit amricano-britannique[1].

Manning est connu pour avoir transmis WikiLeaks diffrents documents militaires classifis: arrt et inculp en 2010, il est condamn le 21 aot 2013 trente-cinq ans de prison.

Au lendemain de sa condamnation, Manning a dclar tre transgenre et a entam des dmarches pour changer d'identit et prendre le prnom de Chelsea[2]. Le 23 avril 2014, la justice amricaine a reconnu le changement de nom de Manning, qui s'appelle dsormais officiellement Chelsea Elizabeth Manning[3], mais demeure de sexe masculin aux yeux des autorits militaires[4].

Manning est n Crescent dans l'Oklahoma, de Susan Fox, originaire du pays de Galles, et son mari, Brian Manning. Brian a rejoint l'US Navy en 1974 19 ans, et y a travaill pendant cinq ans en tant qu'analyste des services de renseignements. Il rencontre Susan dans un Woolworth's alors qu'il est stationn Cawdor Barracks(en) au pays de Galles. Ils ont un premier enfant, Casey, en 1976. Le couple rentre aux tats-Unis en 1979, emmnageant d'abord en Californie, puis dans une maison deux tages en dehors de Crescent, avec une piscine et 2 hectares de terrain o ils lvent des cochons et des poulets[pertinence conteste][5].

Casey il a 11 ans la naissance de Bradley a tmoign la cour martiale que leurs deux parents taient alcooliques, et que leur mre avait t sole sans arrt alors qu'elle tait enceinte du capitaine Manning. David Moulton, un psychiatre de la marine amricaine, a tmoign la cour que les traits du visage de Manning prsentaient des signes du syndrome d'alcoolisation ftale[6]. Casey devient la principale personne qui s'occupera de lui, en se levant la nuit pour lui prparer le biberon. Manning est nourri uniquement au lait et la nourriture pour bb jusqu' ses deux ans; petit pour son ge, particulirement pour un garon, il atteint 1,57 m l'ge adulte avec un poids de 47,6 kg[7],[8].

Le pre de Manning travaille en tant que chef de projet en technologie de l'information pour une agence de location de voitures, et est souvent en dplacement. La maison familiale se trouve plusieurs miles de la ville et la mre de Manning est incapable de conduire. Elle passe ses journes boire, alors que Manning tait largement laiss lui-mme, jouant aux legos ou l'ordinateur. Brian s'approvisionnait en nourriture avant ses voyages, et laissait des chques pr-signs pour les enfants et pour payer les factures. Une voisine a dit que lorsque l'cole primaire de Manning faisait une sortie avec les lves, elle donnait son fils de la nourriture supplmentaire ou de l'argent pour s'assurer que Manning ait quelque chose manger[9].

Trs indpendant dans son enfance, il est athe et ouvertement oppos aux religions, ce qu'il dmontre plusieurs reprises en restant silencieux durant la partie du Serment d'allgeance au drapeau des tats-Unis qui se rfre Dieu. Son pre raconte PBS qu'il excellait au saxophone, en science, l'ordinateur, crant son propre site Web dix ans. Il a appris lui-mme utiliser Power Point, et a gagn trois annes de suite le grand prix un exposcience local, et en sixime anne aprs la maternelle, obtient le premier prix un quiz bowl.

13 ans il commence s'interroger sur son orientation sexuelle. C'est cette poque que ses parents divorcent, et Manning et sa mre dmnagent dans un appartement Crescent. L'instabilit de la mre continue et en 1998 elle fait une tentative de suicide; Casey doit la conduire lhpital, avec Manning assis l'arrire essayant de s'assurer que leur mre continue respirer. Brian Manning se remarie avec une femme nomme aussi Susan, qui a un fils d'une relation prcdente. Manning ragit apparemment mal quand le fils de celle-ci prend lui aussi le patronyme de Manning; il dclare sa mre: Je ne suis plus personne maintenant.[pertinence conteste]

En novembre 2001, Manning et sa mre quittent les tats-Unis et emmnagent Haverfordwest, au pays de Galles, o sa mre a de la famille. Manning va l'cole secondaire de Tasker Milward. Un camarade de classe au collge Ed Caesar a dit au Sunday Times que la personnalit de Manning tait unique, vraiment unique. Trs excentrique, il avait des avis sur tout, trs politique, trs intelligent, et s'exprimait bien. Son intrt pour les ordinateurs ne l'a pas quitt, et en 2003 lui et un ami ont mis en place un site Web, angeldyne.com, un forum qui offrait des jeux et de la musique en tlchargement.

The rest is here:
Chelsea Manning — Wikipédia

In Search Of A Transgender Pronoun

"To live is to change, and to be perfect is to have changed often." So said John Henry Newman, the Victorian-era Anglican priest who became a Roman Catholic cardinal. A trans-Christian, you might say.

I take his words to heart as I try to change myself with respect to people who are changing more than their vestments.

We live in a time when gender is fluid. Mount Holyoke College, the alma mater of Emily Dickinson and Gov. Ella Grasso, recently canceled its annual production of Eve Ensler's "The Vagina Monologues" because it's not fair to women who don't have vaginas. Mount Holyoke is one of several all-women schools to begin admitting women who don't have vaginas, which is to say people who skew male, anatomically, but identify as women.

Another way of thinking about them is: male-to-female transgendered people who have not had "the lower surgery," a term I picked up watching "Transparent," the excellent Amazon TV series in which Jeffrey Tambor plays such a person. Tambor won a Golden Globe for his work, over the groans of a trans community inflamed by television's failure to cast a transgendered actor in the role.

It's not the same, I said in one discussion, as casting a white actor as Othello. Oh yes it is, I was told. I'm usually wrong in these discussions.

I'm trying to learn.

In 2013, Bradley Manning's attorney sent a press release to the Today Show announcing Manning's intention to become a woman named Chelsea and asking that the news media refer to Manning with a female pronoun.

I balked, just a little. First of all, I refuse to do anything just because Savannah Guthrie says I have to. Also, in the case of a public figure, the job of the press is to be skeptical. Ronald Reagan claimed to be a born-again Christian. I always regarded that as unproven and subject to verification, but Reagan had more to go on. He was at least anatomically a born-again Christian.

You see what I mean? We can't accept every claim that public figures make about themselves. Dennis Rodman may claim he's Jewish, and Chris Christie might announce that he's nice. We have to check this stuff out.

With everybody else, we can be cool. Let people make their transitions, even if that means denying the reality of their assigned genitals. So what? There's way too much fussing about who uses which restroom. What is it you go in there to do, anyway? Assert your sexual identity or make pee-pee?

Visit link:
In Search Of A Transgender Pronoun

Edward Snowden – Wikipedia, la enciclopedia libre

Para el artculo sobre sus revelaciones vase Datos acerca de la vigilancia mundial de 2013.

Edward Joseph Snowden (Elizabeth City, 21 de junio de 1983) es un consultor tecnolgico estadounidense, informante, antiguo empleado de la CIA (Agencia Central de Inteligencia) y de la NSA (Agencia de Seguridad Nacional).[2][3] En junio de 2013, Snowden hizo pblicos, a travs de los peridicos The Guardian y The Washington Post, documentos clasificados como alto secreto sobre varios programas de la NSA, incluyendo los programas de vigilancia masiva PRISM y XKeyscore.[3][4][5][6][7]

Actualmente, se cree que Snowden huy de Hong Kong (China) hacia Rusia; Snowden ha solicitado a Ecuador que le conceda asilo.[8] El Departamento de Justicia de Estados Unidos ha clasificado la participacin de Snowden en el programa de vigilancia PRISM como un asunto criminal, por lo que no est clara la suerte que correr.[9]

Tambin ha solicitado asilo a Espaa, Venezuela, Bolivia o Cuba entre un total de 21 pases.[10] El 5 de julio de 2013 el presidente de Venezuela, Nicols Maduro, ofreci asilo humanitario a Snowden,[11] pero al mismo tiempo, el presidente de la Repblica de Nicaragua, Daniel Ortega, dijo en el Acto del 34 aniversario del repliegue tctico a Masaya (Nicaragua) que se considerara brindar asilo a Snowden y afirm que Nicaragua ya haba recibido la carta de peticin de asilo en su embajada en Mosc.

Snowden naci en Elizabeth City, Carolina del Norte.[12] Su padre, un residente de Pensilvania, fue oficial de la Guardia Costera de Estados Unidos;[13] y su madre, residente de Baltimore, es una empleada del Tribunal Federal de Distrito para el Distrito de Maryland.[14][12] Tiene una hermana mayor que es abogada.[12]

En 1999, se mud con su familia a Ellicott City, Maryland, junto a donde estudi computacin en el Anne Arundel Community College de Maryland con el fin de conseguir los crditos necesarios para obtener el diploma de bachillerato.[15] Posteriormente obtuvo la certificacin GED.[7][16]

El 7 de mayo de 2004, Snowden se alist en el Ejrcito de los Estados Unidos con la esperanza de llegar a incorporarse a las Fuerzas Especiales.[1] Se le otorg una licencia tras romperse ambas piernas en un accidente durante un entrenamiento el 28 de septiembre de ese ao.[1] Pas a trabajar como guardia de seguridad para unas instalaciones secretas de la NSA en la Universidad de Maryland.[17] Posteriormente empez a trabajar en la CIA como experto en seguridad informtica.[18]

En 2007, la CIA lo destin a Ginebra, Suiza, como agente con proteccin diplomtica. All era responsable de administrar la seguridad de la red informtica.[19] Tras abandonar la CIA en 2009, pas a trabajar para una consultora privada dentro de unas instalaciones de la NSA en una base militar estadounidense en Japn.[7]

Cuando abandon Estados Unidos en mayo de 2013, haba estado trabajando para el contratista de defensa Booz Allen Hamilton durante menos de tres meses como administrador de sistemas, dentro de la NSA, en Hawi.[20][21] Describe una vida muy cmoda, viviendo con su novia y percibiendo un salario de unos 200000dlares estadounidenses.[7]

El peridico britnico The Guardian describe a Snowden como alguien apasionado por la privacidad; su ordenador porttil est adornado con pegatinas de organizaciones que apoyan la libertad en internet, como la Electronic Frontier Foundation (EFF) y el proyecto Tor.[7] Segn el peridico Snowden dej pocos rastros de s mismo en el entorno virtual; mnimos detalles sobre su familia y no dej nuevas fotografas, o actualizaciones de Facebook o Twitter si es que tena una cuenta, y ninguna relacin con compaeros de la escuela secundaria.[22]

The rest is here:
Edward Snowden - Wikipedia, la enciclopedia libre

27 Edward Snowden Quotes About U.S. Government Spying That …

Would you be willing to give up what Edward Snowden has given up? He has given up his high paying job, his home, his girlfriend, his family, his future and his freedom just to expose the monolithic spy machinery that the U.S. government has been secretly building to the world. He says that he does not want to live in a world where there isnt any privacy. He says that he does not want to live in a world where everything that he says and does is recorded. Thanks to Snowden, we now know that the U.S. government has been spying on us to a degree that most people would have never even dared to imagine. Up until now, the general public has known very little about the U.S. government spy grid that knows almost everything about us. But making this information public is going to cost Edward Snowden everything. Essentially, his previous life is now totally over. And if the U.S. government gets their hands on him, he will be very fortunate if he only has to spend the next several decades rotting in some horrible prison somewhere. There is a reason why government whistleblowers are so rare. And most Americans are so apathetic that they wouldnt even give up watching their favorite television show for a single evening to do something good for society. Most Americans never even try to make a difference because they do not believe that it will benefit them personally. Meanwhile, our society continues to fall apart all around us. Hopefully the great sacrifice that Edward Snowden has made will not be in vain. Hopefully people will carefully consider what he has tried to share with the world. The following are 27 quotes from Edward Snowden about U.S. government spying that should send a chill up your spine

#1 The majority of people in developed countries spend at least some time interacting with the Internet, and Governments are abusing that necessity in secret to extend their powers beyond what is necessary and appropriate.

#2 I believe that at this point in history, the greatest danger to our freedom and way of life comes from the reasonable fear of omniscient State powers kept in check by nothing more than policy documents.

#3 The government has granted itself power it is not entitled to. There is no public oversight. The result is people like myself have the latitude to go further than they are allowed to.

#4 I cant in good conscience allow the US government to destroy privacy, internet freedom and basic liberties for people around the world with this massive surveillance machine theyre secretly building.

#5 The NSA has built an infrastructure that allows it to intercept almost everything.

#6 With this capability, the vast majority of human communications are automatically ingested without targeting. If I wanted to see your e-mails or your wifes phone, all I have to do is use intercepts. I can get your e-mails, passwords, phone records, credit cards.

#7 Any analyst at any time can target anyone. Any selector, anywhere I, sitting at my desk, certainly had the authorities to wiretap anyone, from you or your accountant, to a federal judge, to even the President

#8 To do that, the NSA specifically targets the communications of everyone. It ingests them by default. It collects them in its system and it filters them and it analyzes them and it measures them and it stores them for periods of time simply because thats the easiest, most efficient and most valuable way to achieve these ends. So while they may be intending to target someone associated with a foreign government, or someone that they suspect of terrorism, they are collecting YOUR communications to do so.

#9 I believe that when [senator Ron] Wyden and [senator Mark] Udall asked about the scale of this, they [the NSA] said it did not have the tools to provide an answer. We do have the tools and I have maps showing where people have been scrutinized most. We collect more digital communications from America than we do from the Russians.

Go here to see the original:
27 Edward Snowden Quotes About U.S. Government Spying That ...

Edward Snowden according to Oliver Stone

From Steven Rea's

"On Movies Online"

philly.com/onmovies

Now, Oliver Stone, the director with a string of controversial takes on recent American history - JFK, Nixon, W., World Trade Center - plans to bring the Snowden story to the big screen.

Joseph Gordon-Levitt has been cast as Snowden, the intelligence and security contractor who holes up in a Hong Kong hotel while Poitras films him angsting over the release of documents, as investigative reporters Glenn Greenwald and Ewen MacAskill look on.

Joining Gordon-Levitt in Stone's dramatization - adapted from the books Time of the Octopus by Snowden's Russian lawyer, Anatoly Kucherena, and The Snowden Files: The Inside Story of the World's Most Wanted Man, by Luke Harding - are Shailene Woodley as Snowden's longtime girlfriend, Lindsay Mills; Melissa Leo as filmmaker Poitras; Zachary Quinto (Spock in the Star Trek reboots) as Greenwald, and Tom Wilkinson as British journalist MacAskill.

Expect a 2016 release.

More:
Edward Snowden according to Oliver Stone

McAfee—Antivirus, Encryption, Firewall, Email Security …

Backed by an award-winning research team, McAfee security technologies use a unique, predictive capability that is powered by McAfee Global Threat Intelligence enabling home users and businesses to stay one step ahead of online threats.

McAfees security products and solutions span the following areas:

For Consumers McAfee enables users to safely connect to the Internet, and securely surf and shop the web. With McAfee All Access, McAfee Total Protection, McAfee Internet Security, and McAfee AntiVirus Plus, consumers get complete antimalware and antispyware protection, along with an integrated firewall to ensure their computer systems remain virus-free. Additionally, McAfees virus removal service helps you easily clean viruses and spyware from your PC all from the comfort of your home. Try out McAfee software by downloading our free antivirus trials.

McAfee Mobile Security provides comprehensive mobile device protection with antivirus, anti-theft, and web and app protection for smartphones and Android tablets. Get a free trial of McAfee Mobile Security.

For Businesses McAfee solutions deliver the highest levels of threat visibility and antimalware protection, including comprehensive system and endpoint protection, network security, cloud security, database security, and data protection. McAfees complete security solutions extend beyond virus software to next-generation firewall (NGFW), SIEM, and intrusion prevention systems. Backed by McAfee Global Threat Intelligence, our solutions help companies enhance visibility into their security postures, allowing business to embrace Web 2.0 technology, virtualization, cloud computing, and personal and mobile devices, while protecting critical assets and sensitive data.

Our industry-leading security offerings include:

View original post here:
McAfee—Antivirus, Encryption, Firewall, Email Security ...

Google Open Source Blog

The time has finally come to announce the Google Code-in 2014 Finalists and Grand Prize Winners. With 658 students completing a whopping 3,236 tasks in the seven week open source contest, this was the largest and most exciting contest to date. Students wrote code, added features to software, fixed bugs, created documentation, designed logos, and found fun new ways to introduce other students to open source software development. The quality of the work the teens submitted was as inspiring as it was impressive.

A big congratulations to all of the students who participated in this years contest! We hope you enjoyed learning more about the open source organizations you worked with and will continue contributing to open source in the years to come.

The 24 Grand Prize Winners are listed below alphabetically by first name with their home country and the organization they worked with during the Google Code-in 2014 contest.

Aleksandar Ivanov, Bulgaria - Mifos Initiative

Anurag Sharma, India - Sahana Software Foundation

Chaitya Shah, United States - OpenMRS

Danny Wu, Australia - Wikimedia Foundation

Dariel Kremov, Bulgaria - Copyleft Games Group

Getulio Sanchez, Paraguay - Drupal

Ignacio Rodrguez, Uruguay - Sugar Labs

Read more from the original source:
Google Open Source Blog

Why even strong crypto wouldn’t protect SSNs exposed in Anthem breach

Steven M. Bellovin is a professor in the computer science department at Columbia University. This post was originally published on his blog. This essay quickly generated a vigorous debate among security experts on Twitter.

Another day, another data breach, and another round of calls for companies to encrypt their databases. Cryptography is a powerful tool, but in cases like this, it's not going to help. If your OS is secure, you don't need the crypto; if it's not, the crypto won't protect your data.

In a case like the Anthem breach, the really sensitive databases are always in use. This means that they're effectively decrypted: the database management systems (DBMS) are operating on cleartext, which means that the decryption key is present in RAM somewhere. It may be in the OS, it may be in the DBMS, or it may even be in the application itself (though that's less likely if a large relational database is in use, which it probably is). What's to stop an attacker from obtaining that key, or perhaps from just making database queries?

The answer, in theory, is other forms of access control. Perhaps the DBMS requires authentication, or operating system permissions will prevent the attacker from getting at the keys. Unfortunatelyand as these many data breaches showthese defenses are not configured properly or aren't doing the job. If that's the case, though, adding encryption isn't going to help; the attacker will just go around the crypto. There's a very simple rule of thumb here:Encryption is most useful when OS protections cannot work.

What do I mean by that? The most obvious situation is where the attacker has physical access to the device. Laptop disks should always be encrypted; ditto flash drives, backup media, etc. Using full disk encryption on your servers' drives isn't a bad idea, since it protects your data when you discard the media, but you then have to worry about where the key comes from if the server crashes and reboots.

Cloud storage is a good place for encryption, since you don't control the machine room and you don't control the hypervisor. Again, your own operating system isn't blocking a line of attack. (Note: I'm not saying that the cloud is a bad idea; if nothing else, most cloud sysadmins are better at securing their systems than are folks at average small companies.) E-mail is another good use for encryption, unless you control your own mail servers. Why? Because the data is yours, but you're storing it on someone else's computer.

Encryption is a useful tool (and a fun research area), but like all tools, it's only useful if properly employed. If used in inappropriate situations, it won't provide protection and will create operational headaches and perhaps data loss from mismanaged keys.

Protecting large databases like Anthem's is a challenge. We need better software security, and we need better structural tools to isolate the really sensitive data from average, poorly protected machines. There may even be a role for encryption, but simply encrypting the social security numbers isn't going to do much.

Original post:
Why even strong crypto wouldn’t protect SSNs exposed in Anthem breach