Julian Assange of WikiLeaks on Edward Snowden, Bradley/Chelsea Manning, and the PRISM Program. – Video


Julian Assange of WikiLeaks on Edward Snowden, Bradley/Chelsea Manning, and the PRISM Program.
Julian Assange of WikiLeaks on Edward Snowden, Bradley/Chelsea Manning, and the PRISM Program. In this short video we see Julian Assange, founder of WikiLeak...

By: cybersec101

Follow this link:
Julian Assange of WikiLeaks on Edward Snowden, Bradley/Chelsea Manning, and the PRISM Program. - Video

Eric Holder’s lasting damage to press freedom

The fact that outgoing Attorney General Eric Holder has prosecuted more people under the Espionage Act than all previous attorneys general combined is an inescapable legacy of his time in office. All of those cases were brought against government workers or contractors accused of leaking classified information to the media, which led Trevor Timm, co-founder of the Freedom of the Press Foundation, to call Holder the worst Attorney General for the press in a generation.

Recently, Holder has seemed intent on escaping that title. Several weeks after announcing his plans to step down, he said during an interview at the Washington Ideas Forum that his biggest mistake in office was naming Fox News reporter James Rosen as a co-conspirator to commit espionage in one of the leak investigations.

And in the latter half of his time in office, Holder has expressed support for a media shield law and rewritten the Department of Justices guidelines to tighten rules for subpoenaing reporters during criminal investigations.

But the Obama administration has undoubtedly tilted the legal landscape against leakers and national security reporters. If Holder wants to change that, he will have to unpave a long road of specific policies laid down by the DOJ during his tenure, not simply express remorse and draw up broad new guidelines.

In 2010, Thomas Drake, Shamai Leibowitz, Chelsea Manning, Stephen Kim, and Jeffrey Sterling were all charged under the Espionage Act. Taken as a block, those prosecutions set the precedent that the government could use a law written in 1917 with double agents in mind as a weapon in the fight against modern leakers of national security information.

With the Espionage Act, Holder chose a tool that could potentially be very dangerous to journalists, because it is vague enough to criminalize all kinds of information dissemination. Writing specifically about Mannings disclosures to Wikileaks, Benjamin Wittes, editor in chief of the Lawfare blog, notes that by its terms, it criminalizes not merely the disclosure of national defense information by organizations such as Wikileaks, but also the reporting on that information by countless news organizations.

That was not a problem in several of the early cases. Leibowitz quickly pled guilty and was sentenced to 20 months in prison. The charges against Drake fell apart in 2011, and he pled guilty to a misdemeanor. In 2012, John Kiriakou, a CIA officer, was charged under the Espionage Act but convicted under a different law and sentenced to 30 months in prison. The investigations into Sterling, Kim, and Manning, however, have dragged on much longer and carry implications for press freedoms beyond their membership in the group of Espionage Act cases.

The investigation of CIA officer Jeffrey Sterling is based on a chapter in a 2006 book by New York Times reporter James Risen, in which he writes about American attempts to undermine Irans nuclear program. Risen was first subpoenaed to testify against his source for the chapter, suspected to be Sterling, under the Bush administration, but he fought the order until it expired in 2009.

In 2010, however, Holders DOJ renewed the subpoena against Risen. Soon after, the government anticipated and began arguing against Risens attempt to quash the subpoena on the grounds of his reporters privilege. In an argument filed in May 2011, the DOJ wrote, there exists neither a First Amendment nor a common law reporters privilege that shields a reporter from his obligation to testify, even if the reporters testimony reveals confidential sources and information.

The government was still making that argument in the spring of 2013, when Holders pattern of involving journalists in leak investigations took center stage in the national media.

View original post here:
Eric Holder’s lasting damage to press freedom

Edward Snowden: A ‘Nation’ Interview | The Nation

(All photos byNicola Cohen)

On October 6, Nation editor and publisher Katrina vanden Heuvel and contributing editor Stephen F. Cohen (professor emeritus of Russian studies at New York University and Princeton) sat down in Moscow for a wide-ranging discussion with Edward Snowden. Throughout their nearly four-hour conversation, which lasted considerably longer than planned (see below for audio excerpts), the youthful-appearing Snowden was affable, forthcoming, thoughtful and occasionally humorous. Among other issues, he discussed the price he has paid for speaking truth to power, his definition of patriotism and accountability, and his frustration with Americas media and political system. The interview has been edited and abridged for publication, compressing lengthy conversations about technological issues that Snowden has discussed elsewhere.

The Nation: Its very good to be here with you. We visit Moscow often for our work and to see old friends, but you didnt choose to be in Russia. Are you able to use your time here to work and have some kind of social life? Or do you feel confined and bored?

Snowden: I describe myself as an indoor cat, because Im a computer guy and I always have been. I dont go out and play football and stuffthats not me. I want to think, I want to build, I want to talk, I want to create. So, ever since Ive been here, my life has been consumed with work thats actually fulfilling and satisfying.

The Nation: You have everything you need to continue your work?

Snowden: Yes. You know, I dont spend all day running hand-on-hat from shadowy figuresIm in exile. My government revoked my passport intentionally to leave me exiled. If they really wanted to capture me, they wouldve allowed me to travel to Latin America, because the CIA can operate with impunity down there. They did not want that; they chose to keep me in Russia.

The Nation: We understand youre not a person who gives a high priority to social life, but do you have some here in Moscow?

Snowden: Yeah, Ive got more than enough for my needs, lets put it that way.

The Nation: If you feel like just getting together and chatting with people, you can?

Snowden: Yeah, I can. And I do go out. Ive been recognized every now and then. Its always in computer stores. Its something like brain associations, because Ill be in the grocery store and nobody will recognize me. Even in my glasses, looking exactly like my picture, nobody will recognize me. But I could be totally clean-shaven, hat on, looking nothing like myself in a computer store, and theyre like, Snowden?!

Original post:
Edward Snowden: A ‘Nation’ Interview | The Nation

Why the surveillance state lives on

The Snowden revelations have fizzled politically, and reform isnt coming any time soon.

Once upon a time, Glenn Greenwald was a lonely voice in the blogging wilderness, and Edward Snowden was an isolated functionary at the heart of the American national-security state. Then everything seemed to change at once. Snowden, who was desperate to tell his fellow Americans of the evils of NSA surveillance, revealed his secrets to Greenwald, Congress erupted, the entire world got angry, and Greenwald won a Pulitzer and a fat media contract from a billionaire eBay founder Pierre Omidyar while Snowden became the most famous exile in the world.

Now it looks very much like Greenwald is becoming a voice in the blogging wilderness again, and Snowden is watching from Moscow, once again isolated, as his explosive revelations fizzle out politically. On Tuesday, led by Republicans voting en masse, the US Senate defeated a motion to vote on the USA Freedom Act, which would have curbed the NSA's bulk collection of Americans' phone records. The new, harder-line Republican Congress coming in January doesnt seem likely to pass the bill either, to the point where Greenwald lamented in blog post Wednesday that it was self-evidently moronic to rely on the US government to fix the US government. Governments dont walk around trying to figure out how to limit their own power, and thats particularly true of empires, he wrote. The entire system in D.C. is designed at its core to prevent real reform. This Congress is not going to enact anything resembling fundamental limits on the NSAs powers of mass surveillance.

Nor does Greenwald think that the courts, especially the Supreme Court, will do the trick, despite a Dec. 2013 district court ruling against the NSAs phone-data collection program: When it comes to placing real limits on the NSA, I place almost as little faith in the judiciary as I do in the Congress and executive branch. As for the noble libertarian entrepreneurs of Silicon Valley, theyre also dealing falsely with us, Greenwald said. The big internet companies deliberately supported a watered-down bill to point to something called reform so they can trick hundreds of millions of current and future users around the world into believing that their communications are now safe if they use Facebook, Google, Skype and the rest, he wrote.

Of course, by the entire system in DC and Americas entire private sector Greenwald is suggesting that pretty much everybodythe whole republicis failing him and isnt going to deliver the changes he believes are necessary. Thats a bit of an odd conclusion, considering that Snowden and Greenwald were, not long ago, waxing triumphant about the way their revelations were changing the conversation. Their fundamental premise: If only people could be awakened to the horrific extent of the national-security state, they could be depended upon to act on their own. For me, in terms of personal satisfaction, the missions already accomplished, Snowden told Barton Gellman of the Washington Post in December of last year. As soon as the journalists were able to work, everything that I had been trying to do was validated. Because, remember, I didnt want to change society. I wanted to give society a chance to determine if it should change itself. All I wanted was for the public to be able to have a say in how they are governed.

But society doesnt appear now to be pushing much for change, and the public seems to have spoken on Nov. 4, the first time the nation had gone to the federal ballot box since the Snowden revelations broke. One of the less-noted messages out of the midterm election was that virtually every NSA supporter was re-elected handily, and some of the most vociferous proponents of tighter restrictions on surveillance, like Sen. Mark Udall (D-Colo.) and Sen. Mark Begich (D-Alaska), lost in surprising upsets. Even more to the point, an issue that only a year ago had Congress in an uproarwith members getting earfuls about NSA intrusions at constituent town meetingswas almost a complete no-show issue in the election, the first to be held since the Snowden revelations. Very few candidates brought the NSA up.

A few things, of course, have changed in the year or so since the Snowden revelations startled Washington and set the legislation in motion. For one thing, the NSA has begun internal reform under the direction of the White House, although Obama left to Congress such critical issues as how the NSA should collect telephone metadata. Meanwhile the rise of new violent groups like ISIS, with their seemingly regularly scheduled beheadings of hostages, has given NSA hawks new ammunition. In a Wall Street Journal op-ed on Tuesday, former NSA director Michael Hayden and attorney general Michael Mukasey called the USA Freedom Act NSA reform that only ISIS could love.

But perhaps the more profound trend is that Americans just dont seem to care as much as we once thought a year agoan outcome that Snowden himself feared, once talking of NSA fatigue. With the most sensational revelations past us, the lingering concern over NSA surveillance has become diluted by a general sense of resignation over the loss of privacy. This is not much of a surprise, frankly. We already live in an EZ-Pass world, one in which we are willing to let the government keep a record of everywhere we drive in exchange for the mere convenience of getting through the toll booth more quickly. We shop online despite knowing that the commercial world will track our buying preferences. We share our personal reflections and habits not only with Facebook and Google but also (often unknowingly) with thousands of online marketers who want our information. One thing I find amusing is the absolute terror of Big Brother, when weve all already gone and said, Cuff me, to Little Brother, John Arquilla, an intelligence expert at the Naval Postgraduate School in Monterey, Calif., told me in 2013 shortly after the Snowden story came out.

A remarkable study published earlier this month by the Michigan-based Ponemon Institute, which conducts independent research on privacy and data collection, found that in the year and a half since the Snowden revelations only a relatively small number of Americans, about 14 percent, care enough about their privacy on a consistent basis to change their behavior so as to preserve it. That number is unchanged from a Poneman study done in 2012, before the Snowden revelations. These motivated few are the people who will not buy a book on Amazon because they would have to surrender information about themselves, or who dont go to certain websites if they fear theyre going to be behaviorally profiled, or wont contribute to political campaigns for the same reason. By contrast, a substantial majority of Americans, about 63 percent, say they care about their privacy, but theres no evidence to suggest theyre going to do anything different to preserve it, says Larry Ponemon, who runs the institute. Its very troubling to me, to be honest. People talk a good game. They tell us they are really concerned about what the NSA is doing, but in the end they dont really care enough to take a stand.

The Pew Research Center has also just published a study, Public Perceptions of Privacy and Security in the Post-Snowden Era, which concludes that even though across the board, there is a universal lack of confidence among adults in the security of everyday communications channels, people dont really have a strong sense of how to act to change that. According to the Pew survey, 61 percent of adults say they would like to do more to protect do more to protect their privacy but they feel overwhelmed, and they dont know where to begin, says Mary Madden, the principle author of the Pew survey.

Read the original here:
Why the surveillance state lives on

The World Wide Whisper – WhatsApp Introduces End-to-End Encryption for 500 Million Users – Video


The World Wide Whisper - WhatsApp Introduces End-to-End Encryption for 500 Million Users
Today, on Dev, Rob talks about the new encryption being integrated into WhatsApp, the popular Facebook-owned messaging service, and explains how it keeps your messages private.

By: LearnToProgram: You Can Code.

Original post:
The World Wide Whisper - WhatsApp Introduces End-to-End Encryption for 500 Million Users - Video

Unofficial CM12 for Android One, Disabling Encryption on Nexus 6, Jolla Tablet Announced! – Video


Unofficial CM12 for Android One, Disabling Encryption on Nexus 6, Jolla Tablet Announced!
Android One devices have received an Unoffical CyanogenMod 12 build! That and much more news is covered by Jordan when he reviews all the important stories from this weekend. Included in this...

By: xdadevelopers

Original post:
Unofficial CM12 for Android One, Disabling Encryption on Nexus 6, Jolla Tablet Announced! - Video

Hacker Lexicon: What Is End-to-End Encryption?

Plenty of companies brag that their communications app is encrypted. But that marketing claim demands a followup question: Who has the key? In many cases, the company itself holds the cryptographic key data that lets it decrypt your messagesand so, therefore, does any hacker who compromises the company or government official standing over its shoulder.

But increasingly, privacy-conscious communications tools are rolling out a feature known as end-to-end encryption. That end-to-end promise means that messages are encrypted in a way that allows only the unique recipient of a message to decrypt it, and not anyone in between. In other words, only the endpoint computers hold the cryptographic keys, and the companys server acts as an illiterate messenger, passing along messages that it cant itself decipher.

That notion of the decryption key never leaving the users device might seem like a paradox. If the companys server can never see the key, then how does it get onto the device when the user installs the app in the first place?

The answer is possible because of another crypto trick known as public-key encryption. In public key crypto systems, a program on your computer mathematically generates a pair of keys. One, called the private key or secret key, is used for decrypting messages sent to you and never leaves your device. The other, called the public key, is used for encrypting messages that are sent to you, and its designed so that only the corresponding private key can decrypt those messages. That key can be shared with anyone who wants to encrypt a message to you. Think of the system like a lockbox on your doorstep for the UPS delivery man: anyone with your public key can put something in the box and lock it, but only you have the private key to unlock it.

The first free, widely used end-to-end encrypted messaging software was PGP, or Pretty Good Privacy, a program coded by Phil Zimmermann and released in 1991. But its taken decades for that complete encryption tunnel to reach the masses. Programs like the Off The Record plugin for Jabber instant-messaging applications and TextSecure for text messaging have made end-to-end encryption far easier to use. Apple uses a form of end-to-end encryption in its iMessage app. (Though some security researchers have pointed to flaws in its implementation that might allow its messages to be decrypted.) Google is experimenting with an end-to-end encryption email plugin for Chrome. And just last week smartphone messaging app Whatsapp integrated TextSecure into its Android software, turning on end-to-end encryption for hundreds of millions of users.

Even end-to-end encryption isnt necessarily impervious from snooping. Rather than try to actually break the encryption, for instance, an eavesdropper may try to impersonate a message recipient so that messages are encrypted to their public key instead of the one the sender intended. After decrypting the message, the snoop can then encrypt it to the recipients actual public key and send it on again to avoid detection; this is whats known as a man-in-the-middle attack. To combat that tactic, some end-to-end encryption programs generate unique one-time strings of characters based on the two users public keys. The two people communicating read out that passphrase to each other before starting their conversation. If the characters match, they can be reassured theres no man in the middle.

Of course, there are still two vulnerable points left in even perfect end-to-end encryption systems: the ends. Each users computer can still be hacked to steal his or her cryptographic key or simply read the recipients decrypted messages. Even the most perfectly encrypted communication pipe is only as secure as the mailbox on the other end.

Hacker Lexicon is WIREDs explainer series that seeks to de-mystify the jargon of information security, surveillance and privacy.

More:
Hacker Lexicon: What Is End-to-End Encryption?