Der Stuttgarter Friedenspreis 2014 – Edward Snowdens Worte des Dankes! – Deutsch – Video


Der Stuttgarter Friedenspreis 2014 - Edward Snowdens Worte des Dankes! - Deutsch
http://www.Wahrheitsbewegung.TV - Die Dankesrede von Edward Snowden, die am 23. November 2014 per Liveschalte ins Stuttgarter Theaterhaus bertragen wurde. In seiner Rede erinnert Snowden ...

By: Wahrheitsbewegung

Follow this link:
Der Stuttgarter Friedenspreis 2014 - Edward Snowdens Worte des Dankes! - Deutsch - Video

The Question of Edward Snowden by David Bromwich | The New …

Citizenfour

a film directed by Laura Poitras

At some point in the chase that led the documentary filmmaker Laura Poitras from America to Berlin and finally to the hotel room in Hong Kong where she would meet the whistle-blower who identified himself as Citizenfour, her unnamed informant sent this warning: I will likely immediately be implicated. This must not deter you.

What did he offer in return for the risk he hoped she would take? The answer was compelling. He knew things that the American public ought to know. The director of the National Security Agency, General Keith Alexander, had lied to Congress, which I can prove. Alexander denied under oath that the NSA had ever engaged in the mass surveillance of Americans that was then going forward under the codenames PRISM and XKeyscore. Citizenfour could also demonstrate that General James Clapper, the director of national intelligence, came no closer than General Alexander to telling the truth. When asked, under oath, by Senator Ron Wyden of Oregon whether the NSA collects data on millions or hundreds of millions of Americans, Clapper had answered: Not wittingly.

Clappers statement was false in every possible sense of the words not and wittingly. The agency was indeed collecting data, it was doing so in accordance with a plan, and the director had ordered no halt to the mass collection. The extraction of private information about Americans without our consent seems to have troubled Edward Snowden far back in his employment by the NSA. But there were other things that gave him pause: the astonishing license for ad hoc spying, for example, that was granted to those NSA data workers who had been awarded the relevant authoritiesa bureaucratic synonym for permissions. We could watch drone videos [of the private doings of families in Yemen, Afghanistan, and Pakistan] from desktops. This, Snowden has said, was one of those things that really hardened me.

Citizenfour, a documentary about the rise of mass, suspicionless surveillance and about the dissidents who have worked to expose it, naturally centers on Snowden; and most of the film concentrates on eight days in Hong Kong, during which Poitras filmed while the Guardian reporters Glenn Greenwald and Ewen MacAskill introduced themselves, conducted searching interviews and conversations with Snowden, and came to know something of his character. The focus on a single person is consistent with the design of all three of the extraordinary films in the trilogy that Poitras has devoted to the war on terror.

The first, My Country, My Country (2006), covered a short stretch in the life of an Iraqi doctor, Riyadh al-Adhadh, during the American occupation of Baghdad. In the months before the election of January 2005, al-Adhadh was beset by a family in bad straits and by patients whose physical and emotional state had suffered terribly in the war. He resolved at that exigent moment to help his country by standing as a candidate for the assembly. When his Sunni party withdrew from participation, he was left disappointed and uncertain, his commitment invalidated by the very people he hoped to serve.

The Oath (2010) offered a portrait of Abu Jandal, a taxi driver in Yemen, initially famous only by association as the brother-in-law of Osama bin Ladens driver Salim Ahmed Hamdan. It was Hamdan who suffered five years of imprisonment in Guantnamo before being tried on charges of conspiracy and material support of al-Qaeda. A deeply religious man, he was cleared by a military tribunal of the charge of conspiracy and transferred to Yemen, where he secluded himself and maintained an ascetic silence. (On October 16, 2012, the D.C. Circuit Court threw out Hamdans conviction on the remaining count, material support for terrorism, on the ground that it violated the constitutional ban on ex post facto prosecutions: the acts for which he was charged and convicted were not yet crimes when he performed them.)

As if between the lines of the film, it emerges that Abu Jandal himselfcharismatic, masculine, a hero to the intellectual Muslim radicals who seek him out, yet touchingly gentle in the work of raising his five-year-old sonhad been closer to bin Laden than the relative who was sent to Guantnamo. And even that is not the end: the protagonist is not what he seems at second glance any more than at first. He was once a committed jihadist, yet he was also full of doubts and capable of acting on his doubts. The film leaves him, as the earlier film had left the Iraqi doctor, uncertain and in suspense.

In the same way, we are left without a finished story at the end of Citizenfour. Snowden departs Hong Kong for Moscow, under the protection of human rights lawyers, hoping to fly from there to a Latin American country that will offer him refuge (probably Ecuador). But as we now know and the film reminds us, the US State Department revoked his passport and Snowden in Moscow is still in limbo. Though the film, in a kind of denouement, shows him reunited with his American girlfriend, visited by a political ally, Glenn Greenwald, and encouraged to hear that another whistle-blower has cropped up and disclosed the exorbitant scale of the American watch list, it is hard to know where his story will end.

The rest is here:
The Question of Edward Snowden by David Bromwich | The New ...

OSSMETER FP7 Project: Open Source Software Analysis – Alessandra Bagnato (Softeam) – Video


OSSMETER FP7 Project: Open Source Software Analysis - Alessandra Bagnato (Softeam)
Alessandra Bagnato Research Scientist Project Manager, SOFTEAM OSSMETER aims to extend the state-of-the-art in the field of automated analysis and measurement of open-source software ...

By: OpenWorldForum

Follow this link:
OSSMETER FP7 Project: Open Source Software Analysis - Alessandra Bagnato (Softeam) - Video

Global quantum communications: No longer the stuff of fiction?

Neither quantum computers nor quantum cryptography will become prevalent technologies without memory systems able to manipulate quantum information easily and effectively. The Faculty of Physics at the University of Warsaw has recently made inroads into popularizing quantum information technologies by creating an atomic memory with outstanding parameters and an extremely simple construction.

Following years of tests in physics laboratories, the first quantum technologies are slowly emerging into wider applications. One example is quantum cryptography - an encryption method providing an almost full guarantee of secure data transmission, currently being introduced by military forces and banking institutions. Processing quantum information and sending it over long distances has so far been severely limited due to a lack of adequate memories. A solution is now within reach: the Faculty of Physics at the University of Warsaw (FUW), Poland, has created a fully-functioning atomic memory with a simple, reliable construction and numerous potential applications, including in telecommunications.

"The greatest challenge in the construction of our quantum memory was the precise selection of system parameters that would allow it to save, store and read quantum information effectively. We have also found a novel way of reducing noise during detection," says Dr. Wojciech Wasilewski (FUW).

Contemporary fiber-optic communications involve the transmission of classical information using laser light propagated inside optical fiber cables. Attenuation causes the light signal in the optical fiber cable to weaken as the distance it travels increases. When long optical fiber cables are used, laser amplifiers multiplicating photons are placed along them at intervals of approximately 100 km. These turn a weak signal comprising a low number of photons into a strong signal with high numbers of photons.

However, in quantum communications it is the individual photons and their quantum states that are important. Here signal amplification of the signal does not simply mean increasing the number of photons, but rather preserving their original, undisturbed quantum states. Unfortunately, quantum information cannot be duplicated with impunity: performing any measurement of the quantum state of the photon will inevitably affect its original state. The impossibility of quantum cloning, co-discovered by the Polish physicist Prof. Wojciech urek, places fundamental limitations on the operations that can be conducted on quantum information.

In 2001, a team of physicists from the University of Innsbruck and Harvard University proposed the DLCZ quantum transmission protocol, making it possible to send quantum information over long distances. Under this protocol, quantum information reaching each relay point along the channel must be stored there for a sufficiently long time to ensure that attempts at transmitting it to the next node are successful, as confirmed via a normal signal. In such a protocol, therefore, a key role is played by quantum memory in which quantum information needs to be stored for a sufficiently long time.

"Until now, quantum memory required highly sophisticated laboratory equipment and complex techniques chilling the systems to extremely low temperatures approaching absolute zero. The atomic memory device we have been able to create operates at far higher temperatures, in the region of tens of degrees Celsius, which are significantly easier to maintain," notes Radek Chrapkiewicz, doctoral student at the Faculty and co-author of the paper in the journal Optics Express.

The main element of the memory device constructed by the University of Warsaw physicists is a glass chamber 2.5 cm in diameter and 10 cm long, with rubidium-coated sides, filled with a noble gas. When the tube is heated gently, rubidium pairs fill the inside, with the noble gas restricting their movement and thereby reducing noise. When quantum information is stored in such a memory, photons from the laser beam "imprint" quantum states on many rubidium atoms. Other photons are emitted at the same time; their detection confirms that the information has been saved. Information stored in the memory can then be retrieved using another specially selected laser pulse.

To record and retrieve quantum information, the researchers used advanced methods of light filtering (patent pending) and an innovative camera of their own design. This camera, able to detect individual photons, is characterized by extremely low noise levels and a speed tens of times higher than existing cameras.

"The stability of the quantum information stored in our memory lasts from a few microseconds up to tens of microseconds. You'd be forgiven for asking how such short-lived memory could be useful at all, but bear in mind that it depends on the application. In telecommunications, microsecond timescales are sufficient to conduct several attempts at transmitting a quantum signal to the next relay station," stresses Micha Dbrowski, a doctoral student from the Faculty.

See the original post here:
Global quantum communications: No longer the stuff of fiction?

Bluink Adds FIDO U2F Security Key Functionality to Injector with Elliptic Technologies’ Cryptography

Ottawa, ON (PRWEB) November 26, 2014

Bluink Ltd, the leading innovator in smartphone based digital identity management and strong authentication, today achieved FIDO Alliance Universal Second Factor (FIDO U2F) Ready status for its Injector (http://password-injector.com) mobile identity product, allowing Injector users to securely login to U2F supported online services.

Bluink has partnered with Elliptic Technologies to use its portable Ellipsys cryptographic libraries in Injector to provide a robust, trusted and fully compliant FIDO U2F solution. Injector already provides users with unparalleled convenience and security by managing static and one-time passwords while automating logins to machines, applications, networks and online services. Now with FIDO U2F, the same solution will also allow public key authentication to supporting online services, making Injector a truly universal secure authenticator.

FIDO U2F represents a significant step forward in web authentication. With the number of passwords that users need to have nowadays and the increasingly massive data breaches re-sulting from cyber attacks, password-based authentication is becoming a huge risk to individuals and businesses, said Larry Hamid, CTO of Bluink. FIDO authentication eliminates the need for passwords and we want Injector users to benefit as soon as possible.

Elliptic is a big believer in, and early supporter of, the FIDO U2F standards as an effective way to eliminate the risks of weak, overused passwords so commonly exploited in web attacks. Bluinks Injector replaces weak user identities with strong cryptographically authenticated indentities, with unguessable randomly generated passwords as a fallback for legacy services. Elliptic is proud to work with Bluink to bring this product to life, said Ogi Brkic, Elliptic VP of Marketing and Business Development. Injector makes it simple for people to protect their online identities with world class cryptography. Thanks to the ready portability of Ellipsys, Bluink will be able to offer Injector support on all the popular platforms quickly, easily and reliably.

The FIDO U2F capability in Injector will be released on iOS and Android before the end of this year.

About Injector Injector is a smartphone based identity manager and Bluetooth USB dongle that provides strong authentication and logins to almost anything.

About Bluink Bluink is an Engineering and Product Development company focused on security and solutions that leverage the power of mobile devices. From Injector to the award winning Shift-IT scheduling solutions, Bluinks products make peoples lives more secure, efficient and mobile.

About Ellipsys Cryptography Middleware Ellipsys Cryptography Middleware is a CAVP certified cryptographic library that is highly configurable for size or speed optimization. Ellipsys is written in portable C code and also includes platform specific optimizations for ARM, x86, x86_64 and PowerPC. Ellipsys contains a plug-in architecture for easy integration and offload of hardware devices.

About Elliptic Technologies Elliptic Technologies is a leading provider of security solutions for the connected world for chipset vendors, device manufacturers, service and content providers. Elliptics highly integrated solutions enable the most efficient silicon design and highest security levels for some of the worlds most popular products in markets such as mobile, networking, home entertainment, automotive, and the Internet of Things (IoT). Elliptic is leading the world in DRM and link protection solutions with flagship technology tVaultTM for downloading and sharing premium content between multiple devices, including Microsoft PlayReady, DTCP-IP and HDCP SDKs built for trusted execution environments used in consumer electronics.

See the article here:
Bluink Adds FIDO U2F Security Key Functionality to Injector with Elliptic Technologies’ Cryptography

Inside The Cicada 3301 Cabal

This story contains interviews with Tekknolagi, the student who solved the Cicada 3301 puzzle.

In January I wrote a story about the one person who is known to have made it further down the Cicada 3301 rabbit hole than anyone elseand my inbox has never been the same since.

For those that dont know, Cicada 3301 is a mysterious Internet puzzle that appears online every January. It consists of a highly complex series of riddles and enigmas that stretch from the digital world out into the real world. To solve these riddles you need to have expert skills in a varying range of disciplines including steganography, cryptography, and ancient Mayan numerology, as well as detailed understandings of 18th century European literature and even cyberpunk speculative fiction. And that was just for last years puzzle.

Thousands of cybersleuths try to solve Cicada each January (there have been three annual puzzles since 2012) but none are known to have solved it completely. And in this case, its not the journey that matters. The makers of Cicada promise "enlightenment" to those who can make it to the end. But whats more baffling than each riddle, or what "enlightenment" awaits those who solve them all, are the people behind Cicada.

No one knows if Cicada is a single person or a group of individuals, though evidence from the puzzle points to Cicada being more than one brilliant individual. The sheer scale of the riddles transcends cyberspace and requires participants to call dummy phone numbers set up in the real world and travel to up to 14 different countries to find QR codes that have been physically taped to telephone poles. This suggests Cicada is indeed a global network of individualsa cabal no one knows anything about.

And its this "unknown cabal" hypothesis that gets peoples minds racing as much as the Cicada 3301 puzzle itself. If Cicada is a group, how many members there are? Where they are based? What are their ultimate motives?

Which brings me back to my inbox...

Since writing my original story about Joel Eriksson, a cryptosecurity researcher from Sweden who was, until now, the only known person to make it further than any other in solving the Cicada 3301 puzzle, I get a few emails each week from people alleging they have information on who Cicada are.

Some emails are obviously fake. Theyre from fantasists that want to pretend they hold the hidden knowledge everyone desires. Some emails are downright strange, like the email I received a few weeks ago from a person who said he worked "for a component of the Intelligence Community of a 5-eyes country" and that this intelligence agency had reason to believe Cicada "may be the same group that was behind the 2007 cyberattacks in the Baltics." Then there are the emails that say Cicada are aliens, terrorists, Barack Obama.

But every once in a while Ill get an email that has the air of believability about it. These emails give me enough of a kick to look into not only the claims they make, but to investigate the person whos made them.

Continue reading here:
Inside The Cicada 3301 Cabal

Guardian’s Luke Harding wins prestigious James Cameron prize

Luke Harding. The prize's chair of judges says it recognises a journalist who writes in the Cameron spirit 'original, eloquent, iconoclasic rebellious.' Photograph: Murdo MacLeod for the Guardian

The Guardian foreign correspondent Luke Harding has won the prestigious James Cameron prize for 2014 for his work on Russia, Ukraine, Edward Snowden and WikiLeaks.

The honour is given in memory of the celebrated foreign correspondent and author James Cameron, who died in 1985.

George Brock, professor of journalism at City University, London, and chair of the judges, said the award recognised the work of a journalist who writes and thinks in the James Cameron spirit that is to say original, eloquent, iconoclastic, perhaps somewhat rebellious and wide-ranging.

He added: We looked for someone who brought a touch of incisive wisdom to bear on a variety of subjects. And we found one: this years winner has written at a variety of lengths up to and including books on subjects from WikiLeaks to the dismemberment of Ukraine and the surveillance revelations of Edward Snowden.

Harding was the Guardians Moscow bureau chief from 2007 until 2011, when the Kremlin expelled him from the country in the first case of its kind since the cold war. He has reported from Afghanistan, Iraq, Libya, eastern Ukraine and other war zones.

He is the author of several non-fiction books including Mafia State: How One Reporter Became an Enemy of the Brutal New Russia; WikiLeaks: Inside Julian Assanges War on Secrecy; and The Snowden Files,an account of the Edward Snowden revelations published in February.

The award was announced in central London shortly before an annual memorial lecture, delivered this year by Christine Ockrent, one of Frances best-known journalists, on the professions new risks and new rewards.

Harding is the latest in a number of Guardian and Observer writers to be recognised by the Cameron Trust. These include Gary Younge, Ghaith Abdul-Ahad, David Hirst, Martin Woollacott, Ed Vulliamy, Jonathan Steele, Maggie OKane, Suzanne Goldenberg, Neal Ascherson and Chris McGreal.

Other recipients have included Lyse Doucet, Michael Buerk, John Simpson, Robert Fisk, Charles Wheeler, Bridget Kendall, George Alagiah, Fergal Keane and Ann Leslie.

Read the rest here:
Guardian’s Luke Harding wins prestigious James Cameron prize

Hacker claims he stole from Wikileaks

Reuters

Former associate of Julian Assange, Sigurdur Thordarsson pleads guilty to embezzling from WikiLeaks after turning informant to the FBI.

An Icelandic computer hacker and former associate of Wikileaks founder Julian Assange unexpectedly pleaded guilty on Wednesday to embezzling 30 million Icelandic crowns (NZ$308,826) from the organisation.

Sigurdur Thordarsson's courtroom plea is the latest twist in the saga of Wikileaks, which released thousands of secret US embassy cables in 2010 and 2011, deeply embarrassing Washington.

Known as 'Siggi the Hacker', Thordarsson has previously said that he turned an informant for the US Federal Bureau of Investigation (FBI) in 2011, a year before Assange fled to the Ecuadorian embassy in London to avoid extradition to Sweden over sexual assault accusations that he has denied.

In the run up to his Iceland trial, Thordarsson rejected charges that he stole the proceeds of the sales of Wikileaks-branded items, and his U-turn on Wednesday was a surprise.

"After going over the charges thoroughly and speaking with my client, he has decided to plead guilty to all charges," Thordarsson's lawyer, Vilhjalmur Vilhjalmsson, told the court.

The lawyer would not make any comment after the court session, including why Thordarsson had changed his mind.

No date was set for sentencing in the case.

Thordarsson posted a long description of his ties to Wikileaks including photos of him with Assange, his dialogue with the FBI and his defence against the fraud charges, on an Icelandic news website in June 2013.

Continue reading here:
Hacker claims he stole from Wikileaks