Half of Americans Condemn WikiLeaks Release; Britons and Canadians Split

The online publication of thousands of classified documents has been decried by half of Americans, but people in Canada and Britain are not as strong in their condemnation of the actions of WikiLeaks, a new Angus Reid Public Opinion poll has found.

The online survey of representative national samples shows that practically half of respondents in the United States (47%) are following the WikiLeaks story very closely or moderately closely, compared to 44 per cent in both Canada and Britain.

Half of Americans (51%) believe WikiLeaks as wrong to publish tens of thousands of classified U.S. diplomatic cables, while one-in-five (19%) agree with its actions.

The views of respondents in the other two countries are definitely more nuanced. In Canada, 36 per cent of respondents say WikiLeaks was wrong, while 30 per cent claim it was right. Britain posts very similar numbers, with 38 per cent of respondents stating that WikiLeaks was wrong, and 33 per cent saying it was right.

At least three-in-five respondents in the three countries believe the release of these documents will damage diplomatic relations between the U.S. and other countries (BRI 65%, CAN 61%, USA 60%) and majorities also state that the release of these documents will make it harder for the U.S. to advance its foreign policy goals (BRI 60%, USA 59%, CAN 57%). However, while three-in-five Americans (62%) fear that the WikiLeaks release will put peoples lives at risk, including U.S. diplomats and soldiers, this view is shared by about half of Britons (51%) and Canadians (48%).

The WikiLeaks Justification

In August, a spokesman for WikiLeaks justified the websites actions, stating: Knowledge about ongoing issues like the war in Afghanistan is the only way to help create something like safety. Hopefully with this understanding, public scrutiny will then influence governments to develop better politics.

A third of Americans (32%) agree with this justification, while almost half (47%) disagree with it.

Full Report, Detailed Tables and Methodology (PDF)

Mario Canseco, Vice President, Communications & Media Relations +877 730 3570 mario.canseco@angus-reid.com

View post:
Half of Americans Condemn WikiLeaks Release; Britons and Canadians Split

Citizenfour asks is Edward Snowden a hero or traitor …

The new documentary Citizenfour peels back the curtain on what life was like for Edward Snowden and the journalists who risked all to reveal some unsettling government secrets.

In May 2013 Laura Poitras, award winning director, producer and cinematographer, began receiving encrypted anonymous emails from someone calling himself Citizenfour. She became intriguedby allegations that theNSA along with other government entities were monitoring communications worldwide. US communications giants like Verizon and AT&T were also involved by giving access to their customer records. Was there risk in finding out the truth to these allegations? Yes there was. Was Laura Poitras willing to take these risks? Hell Yes.

Citizenfour tells the incredible true story of Edward Snowden, the infamous whistleblower who blew the lid off of the United States covert monitoring operations, and the journalists, including Glenn Greenwald and Jeremy Scahill, who risked everything to verify and report the story even as Snowden was being labeled an enemy of the United States.

The film follows the journalists as they travel the world to obtain the proof of Snowdens monumental allegations, and while some viewers may find these moments tedious, I found it fascinating to see what someone on the run does (the same every day things we do but with a large target drawn squarely on each of their backs), the nearparanoia of thinking at any moment someone will burst in the door with guns drawn. I could feel the intensity of it all.

These people were willing to put their lives on the line to stand up for what they believed in.

We also learn that government of the United States had publicly supported a policy of transparency all the while carrying out various covert and dangerous activities in the name of national security. When Snowden leaked classified NSA documents, Poitras, Greenwald and fellow journalist Jeremy Scahill were instrumental in getting many of them published on their on-line media venture called The Intercept. I found it interesting that these people were willing to put their lives on the line to stand up for what they believed in. Their perfect use of mass and social media made sure that they could not be silenced nor discredited.

Citizenfourisstrong, gritty, andin your face.

I liked the way the director laid out the movie. It was strong, it was gritty, it was in your face. This man had to make a life changing decision to report to the world the secret surveillance of the American public and the rest of the world. Poitras had to comb through hundreds of hours of footage to get it just right without taking away the real nature of what it was like to be on the run from the United States of America while trying to pursue truth and justice. She achieved that goal.

I saw strength of purpose and integrity in the man they called a traitor.

Read more:
Citizenfour asks is Edward Snowden a hero or traitor ...

Top UK spy: Twitter, Facebook are jihadi ‘command and control networks’

A daily roundup of terrorism and security issues.

In the latest warning from European officials concerned with online recruiting of fighters for extremist groups like Islamic State, the new director of Britains surveillance agency said social media have become the command and control networks of choice for terrorists. He also said that US-based technology companies must work more closely with security and law enforcement agencies worldwide.

GCHQ director Robert Hannigans comments highlight the tension between government intelligence and Internet privacy more than a year after US contractor Edward Snowden leaked evidence of US and British government surveillance.

Mr. Hannigan wrote in the Financial Times that the skills of the so-called Islamic State in usingthe Internet for recruitment have exceeded those from any previous terrorist group. It relies on social media, mobile technology, and apps like Twitter, Facebook, and WhatsApp to spread its message in a language their peers understand, he wrote.

GCHQ and its sister agencies, MI5 and the Secret Intelligence Service, cannot tackle these challenges at scale without greater support from the private sector, including the largest US technology companies which dominate the web. I understand why they have an uneasy relationship with governments. They aspire to be neutral conduits of data and to sit outside or above politics. But increasingly their services not only host the material of violent extremism or child exploitation, but are the routes for the facilitation of crime and terrorism. However much they may dislike it, they have become the command-and-control networks of choice for terrorists and criminals, who find their services as transformational as the rest of us.

Social media companies including Twitter and Facebook have not publicly commented on Hannigans statements. According to the Financial Times, many US Internet companies have complied in the past with Western government requests for information. However, in the past 18 months US technology companies have become less co-operative with foreign intelligence agencies.

Intelligence leaks by Edward Snowden, whose findings like US spying on world leaders and foreign citizens were published in newspapers internationally, caused global uproar. According to the FT:

Three UK security officials said that US technology companies such as Google and Facebook have curbed the ability of UK intelligence to tap valuable electronic data in the wake of the Snowden leaks. The UK has had the most to lose [from Snowden], said one.

This isnt Britains first foray into Internet surveillance. Over the summer, the government passed emergency legislation to ensure communications companies kept records of e-mails, texts and phone calls for a year to help law-enforcement agencies track and catch terrorists and other criminals, Bloomberg reports.

The role of the Internet and social media in recruitment has becoming increasingly obvious with the rise of the Islamic State terrorist group, which is fighting in Iraq and Syria. The Christian Science Monitors Sara Miller Llana writes about their utility in drawing young Europeans to fight in Syria:

Read this article:
Top UK spy: Twitter, Facebook are jihadi 'command and control networks'

Report: Russia Yanks Jobs Memorial After Cook Comes Out

There is some confusion of whether the statue's removal was due to homophobia, NSA spying, or repairs.

Russia is not taking Tim Cook's coming out announcement very well. In the country's latest protest of the Apple CEO's now-public sexual orientation, a giant iPhone statue erected in memory of Steve Jobs has been removed.

The Western European Financial Union (ZEFS), which installed the memorial early last year, has dismantled the interactive monumentbecause Cook is "promoting homosexuality."

As reported by the Ekho Moskvy news site, ZEFS disconnected the statue "pursuant to Russian federal law on the protection of children from information that promotes the denial of traditional family values."

The 6-foot-6-inch installation, which stood in the courtyard of the National Research University of Information Technologies, Mechanics and Optics (ITMO) in St. Petersburg, was built to teach students about the life and work of Jobs, who passed away in 2011.

Tim Cook took over as Apple CEO several months before Jobs's death, and has thus far kept his personal life private despite running one of the most scrutinized companies in the world. Cook broke his silence last week, though, to announce that he is gay.

"I've come to realize that my desire for personal privacy has been holding me back from doing something more important," Cook wrote in an op-ed for Bloomberg.

"I don't consider myself an activist, but I realize how much I've benefited from the sacrifice of others," he continued. "So if hearing that the CEO of Apple is gay can help someone struggling to come to terms with who he or she is, or bring comfort to anyone who feels alone, or inspire people to insist on their equality, then it's worth the trade-off with my own privacy."

The news was not well-received by Vitaly Milonov, Deputy of the Legislative Assembly of St. Petersburg and notable homophobe, who quickly proclaimed that he wants a lifetime prohibition on Cook's entrance into Russia.

ZEFS has taken a similarly unsupportive approach, claiming that Cook "has publicly called for sodomy."

Read the original here:
Report: Russia Yanks Jobs Memorial After Cook Comes Out

Privacy Tools: The Best Encrypted Messaging Programs

98 Twitter Facebook Email

A new ranking of popular encrypted messaging programs finds the ones that are most effective at protecting users' privacy.

A new ranking of popular encrypted messaging programs finds the ones that are most effective at protecting users privacy.

by Julia Angwin ProPublica, Nov. 4, 2014, 9 a.m.

Enable Social Reading

Ever since former National Security Agency consultant Edward Snowden revealed mass governmental surveillance, my inbox has been barraged with announcements about new encryption tools to keep people's communications safe from snooping.

This is a ranking of encrypted messaging programs based on criteria aimed to assess whether they are well designed to make the content of the messages unreadable to anybody other than the sender and recipient. But even messages that are securely encrypted often do not obscure the identities of the sender and recipient. All rankings

Source: Electronic Frontier Foundation, ProPublica, Joseph Bonneau

But it's not easy to sort out which secret messaging tools offer true security and which ones might be snake oil. So I turned to two experts Joseph Bonneau at Princeton and Peter Eckersley at the Electronic Frontier Foundation for advice about what to look for in encryption tools. Working together, we chose seven technical criteria on which to rank encryption tools.

More here:
Privacy Tools: The Best Encrypted Messaging Programs

OTA Software Update Using Open Source Software on Jaguar S – Video


OTA Software Update Using Open Source Software on Jaguar S
At Telematics West Coast in San Diego, Magnus Feuer, a systems architect with Jaguar/Land Rover, demonstrated an Over-the-Air update on a Jaguar S convertible outfitted specially programmed...

By: AUTO Connected Car News

Read the rest here:
OTA Software Update Using Open Source Software on Jaguar S - Video

Forging administrator cookies and crocking crypto … for dummies

Security for virtualized datacentres

Security pro Laurens Van Houtven has created a free introduction cryptography course to help programmers lift their infosec game.

The Crypto 101 book contained everything needed to understand complete systems including block and stream ciphers; hash functions; message authentication codes; public key encryption; key agreement protocols, and signature algorithms.

Van Houtven (@lvh) said the course developed simple to more advanced primitives demonstrating the importance of each, and culminated in complete cryptosystems like Transport Layer Security (TLS), GPG, and Off The Record (OTR).

"Learn how to exploit common cryptographic flaws, armed with nothing but a little time and your favourite programming language," Van Houtven wrote of the course.

"Forge administrator cookies, recover passwords, and even backdoor your own random number generator."

"... . The goal of this book is not to make anyone a cryptographer or a security researcher. The goal of this book is to understand how complete cryptosystems work from a birds eye view, and how to apply them in real software."

Laurens Van Houtven

Crypto 101 contains exercises in which technology bods could test their crypto chops

Van Houtven said cryptography could no longer be deemed a game for experts given the recent large breaches resulting from borked or non-existent encryption.

See more here:
Forging administrator cookies and crocking crypto ... for dummies