EDITORIAL: Young, voting-age Americans give the NSA the thumbs-up

EDITORIAL: Young, voting-age Americans give the NSA the thumbs-up

A June 9, 2013 photo provided by The Guardian Newspaper in London shows Edward Snowden in Hong Kong.

GLENN GREENWALD AND LAURA POITRAS, ASSOCIATED PRESS

Say what you will about Edward Snowden, the computer specialist who leaked informaton from the National Security Agency.

He played a big game. No, not a game to take down the U.S. government or even to take down the surveillance-industrial complex.

Mr. Snowdens true gambit was to dramatically change public opinion about how the Internet should be governed. Even if you didnt hold as critical views of our foreign policy as Edward Snowden, you might very well have been shocked by his disclosures and concerned that, without some better legislation, too many of our taken-for-granted freedoms would disappear online.

But in order for public opinion to shift as swiftly and decisively as that kind of change required, Mr. Snowden had to do more than change the minds of elites. He had to create a groundswell among the Americans who spent the most time immersed in online technology. He had to hit a home run with millennials.

Well, the data is in, and guess what? He struck out.

The latest polling from Pew paints a stark picture: Young people are more likely than older Americans to view the intelligence agency positively, the organization reports. About six-in-10 (61 percent) of those under 30 view the NSA favorably, compared with 40 percent of those 65 and older.

Thats a remarkable set of figures. Not only do the youngest of voting-age Americans give the NSA the thumbs-up possibly excusable given the level of news ignorance prevalent among teenagers but even those well into their twenties support the NSA in a landslide.

Excerpt from:
EDITORIAL: Young, voting-age Americans give the NSA the thumbs-up

CSE Tracks Millions Of Downloads Daily: Snowden Documents

Canada's electronic spy agency sifts through millions of videos and documents downloaded online every day by people around the world, as part of a sweeping bid to find extremist plots and suspects, CBC News has learned.

Details of the Communications Security Establishment project dubbed "Levitation" are revealed in a document obtained by U.S. whistleblower Edward Snowden and recently released to CBC News.

Under Levitation, analysts with the electronic eavesdropping service can access information on about 10 to 15 million uploads and downloads of files from free websites each day, the document says.

"Every single thing that you do in this case uploading/downloading files to these sites that act is being archived, collected and analyzed," says Ron Deibert, director of the University of Toronto-based internet security think-tank Citizen Lab, who reviewed the document.

In the document, a PowerPoint presentation written in 2012, the CSE analyst who wrote it jokes about being overloaded with innocuous files such as episodes of the musical TV series Glee in their hunt for terrorists.

CBC analyzed the document in collaboration with the U.S. news website The Intercept, which obtained it from Snowden.

The presentation provides a rare glimpse into Canada's cyber-sleuthing capabilities and its use of its spy partners' immense databases to track the online traffic of millions of people around the world, including Canadians.

That glimpse may be of even greater interest now that the Harper government plans to introduce new legislation increasing the powers ofCanada's security agencies.

Though Canadas always been described as a junior partner in the Five Eyes spying partnership, which includes the U.S., Britain, NewZealandand Australia, this document shows it led the way in developing this new extremist-tracking tool.

View original post here:
CSE Tracks Millions Of Downloads Daily: Snowden Documents

Be Anonymous Online Part 5.1 (Email) PGP | GnuPG | Openpgp.js Encryption – Video


Be Anonymous Online Part 5.1 (Email) PGP | GnuPG | Openpgp.js Encryption
In this tutorial you will know how Free email providers or spy agency dig into your email, and how you can protect your mails using Encryption also demonstrate how you can use PGP in Browser...

By: Anish Mandal

Read the original:
Be Anonymous Online Part 5.1 (Email) PGP | GnuPG | Openpgp.js Encryption - Video

Global Encryption Software Market is Expected to Reach $2.16 Billion by 2020 – Allied Market Research

PORTLAND, Oregon, January 28, 2015 /PRNewswire/ --

According to a new report by Allied Market Research titled, "Global Encryption Software Market - Size, Industry Analysis, Trends, Opportunities, Growth and Forecast, 2013 - 2020",the global encryption software market is expected to reach $2.16 billion by 2020, registering a CAGR of 14.27% during 2014 - 2020. Software based encryption is gaining prominence as one of the end point security solutions, as it is increasingly being adopted by the organizations worldwide. With data protection and data privacy compliance becoming a high priority, organizations have started viewing encryption as an enabler to achieve compliance and data security and at the same time mitigate the data breach risks associated with the adoption of advanced technologies, particularly cloud services and mobility.

(Logo: http://photos.prnewswire.com/prnh/20140911/647229 )

To view the report, visit the website at http://www.alliedmarketresearch.com/encryption-software-market

From the application perspective, encryption is used across all the industries to secure both data-at-rest (data stored in data stored in files/folders and disks); and data-in-transit (email messages travelling over the network). The adoption of software-based encryption for protecting data-at-rest is higher as compared to the adoption of the same for data-in-transit. Data-at-rest encryption software accounts for approx. 93.5% of the total encryption software market by value. For data-at-rest, the two most commonly used encryption software methods include Full Disk Encryption (FDE) and File Level Encryption (FLE), with Full Disk Encryption software being the most widely deployed method for protecting data against theft and ensuring compliance with the data privacy and data breach notification laws. Full Disk Encryption is preferred over the File Level Encryption, primarily due to the two major advantages such as ease of deployment and management and complete security.

Presently, software based encryption enjoys the highest adoption in the Financial Services sector with a growing acceptance in the Healthcare Sector. Financial sector accounts for approximately 44% of global encryption software market amongst all the other industries. Entities operating in the sector are mandated by the data privacy regulations to adopt effective security measures in their organization and need to ensure that the personally identifiable data (PII) of the customers is protected from any unauthorized or unintended disclosure/access.

View all reports related to information and communication technologies at http://www.alliedmarketresearch.com/information-&-communication-technology-&-media-market-report

Key findings of the study:

The evolving data protection regulatory landscape, burgeoning number of data breaches coupled with the increasing adoption of technologies particularly cloud are driving the adoption of encryption software worldwide. A large number of organisations are adopting an enterprise wide encryption strategy plan rather than informal policies. With the rapidly increasing adoption of cloud services in all the sectors, the organisations are now looking at encryption solutions that would ensure data security and compliance with the data privacy regulations for their data in the cloud. Furthermore, the highest interest will be in encryption solutions from cloud security vendors.

About Us:

See the original post here:
Global Encryption Software Market is Expected to Reach $2.16 Billion by 2020 - Allied Market Research

Quantum Entanglement Now On-a-Chip

PORTLAND, Ore. -- Quantum computing promises to revolutionize future computers, enabling pint-sized hardware to outperform room-filing supercomputers, plus offers uncrackable encryption that foils all hackers no matter how skillful they are. The missing piece of the quantum puzzle was called "spooky action at a distance" by Einstein, namely a reliable source of entangled photons who mirror each others' state no matter how far apart on standard CMOS silicon chips.

Now Italian scientists at the Universit degli Studi di Pavia, in cooperation with the University of Glasgow and the University of Toronto, claim to have surmounted this last engineering hurdle.

"The idea is that pumping laser light inside a tiny ring enhances the probability of two photons interacting. We therefore decided that this enhancement could be used, in particular, for the production of entangled photon pairs," professor Daniele Bajoni at the Universit degli Studi di Pavia told EE Times. "In previous works, we discovered that confining light inside a ring resonator greatly enhances the interaction between light and matter, but our new results were realized by design, not by chance."

The most immediate application of quantum entanglement on a chip is uncrackable encryption, since all the chip maker has to do is build the silicon photon ring oscillator and use a popular quantum cryptography algorithm for entanglement which have already been proven in the lab (using bulky expensive equipment instead of a cheap silicon chip).

"The most typical algorithm for quantum cryptography using entanglement is the so-called Eckert protocol. In essence two parties (generally named Alice and Bob) exchange a set of entangled photon pairs, let us say idler photons are sent to Alice and signal photons are sent to Bob. Alice performs certain measurements on her photons, obtaining random results (let us say 1100101). If Bob performs the correct measurements on his photons, because of the entanglement, he will get the same string of random bits as Alice. The two can then use this string of random bits to encrypt signals to be sent on normal channels," Bajoni told us. "If someone eavesdrops the exchange of entangled photons between Alice and Bob, this action will change the properties of the photons, so that Alice and Bob can know if there is an eavesdropper: this makes the communication intrinsically secure."

For the future, the research group plans to add the other silicon photonics parts, using known means, to make a complete on-chip entanglement engine that can be used by others to realize specific encryption applications that have been dreamt of for decades, but which may now be realizable due to the new entangled photon source these researchers have invented.

"The obvious next steps will be to further integrate components on the chip. In our result we use the silicon ring resonator as a source of entangled photon, but then the filtering of the emitted light and the measurement of the entanglement is done via an external experimental set-up. All this external set-up can, ultimately, be integrated on a silicon chip too," Eckert told us. "And in related work, done with different authors in different collaborations, we have shown how to integrate spectral filters alongside the ring resonator. In the future we want to build the necessary interferometers and, if possible, the detectors, in a fully integrated platform. The final goal will be to have two chips, linked by fiber optics, performing key exchange for a complete quantum cryptography solution.

R. Colin Johnson, Advanced Technology Editor, EE Times

Related articles:

Link:
Quantum Entanglement Now On-a-Chip

Rooting Out Malware With a Side-Channel Chip Defense System

The world of malware has been turned on its head this week, as a company in Virginia has introduceda new cybersecurity technology that at first glance looks more like a classic cyberattack.

The idea hatched by PFP Cybersecurity of Vienna, Va., is taken from the playbook of a famous cryptography-breaking scheme called the side channel attack. All malware, no matter the details of its code, authorship, or execution, must consume power. And, as PFP has found, the signature of malwares power usage looks very different from the baseline power draw of a chips standard operations.

So this week, PFP is announcing a two-pronged technology (called P2Scan and eMonitor) that physically sits outside the CPU and sniffs the chips electromagnetic leakage for telltale signatures of power consumption patterns indicating abnormal behavior.

The result, they say, is a practically undetectable, all-purpose malware discovery protocol, especially for low-level systems that follow a predictable and standard routine. (Computers with users regularly attached to them, like laptops and smartphones, often have no baseline routine from which abnormal behavior can be inferred. So, PFP officials say, their technology is at the moment better suited to things like routers, networks, power grids, critical infrastructure, and other more automated systems.)

On average, malware exists on a system for 229 days before anyone ever notices anything is there, Thurston Brooks, PFPs vice president of engineering and product marketing told IEEE Spectrum. Whats really cool about our system is we tell you within milliseconds that something has happened.

PFPan acronym for power fingerprintingrequires that its users establish a firm baseline of normal operations for the chips the company will be monitoring. So they begin with P2Scan, a credit-card-size physical sensor that monitors a given chip, board, device, embedded system, or network router for its electromagnetic fingerprints when running normally.

Unlike most malware strategies in the marketplace today, PFP takes a strikingly software-agnostic tack to besting malware, hardware Trojans, and other cyberattacks.

Were not trying to actually understand whats going on inside the machine, like the hackers are, says Brooks. Were trying to define what normal behavior looks like. Then, knowing [that], we can detect abnormal behavior.

The view of malware as seen from outside the chip, in other words, can be a refreshing one. Hackers cant detect this type of surveillance, because the scanning tools never actually interact with the chips operations. And hackers can be as clever as the most sophisticated programmers in the world. Yet, their code will still very likely be detected because, simply by virtue of performing different tasks than the chip normally performs, it will have a different power profile.

I am a signal processing guy, says PFP president Jeff Reed, who is also a professor in the ECE department at Virginia Tech. Our approach is a very different approach than a person whos normally schooled in securityWere trying to understand a disturbance in the signal due to the inclusion of malware.

Read this article:
Rooting Out Malware With a Side-Channel Chip Defense System