NYFF 2014: Edward Snowden documentary ‘Citizenfour’ jolts …

Many documentaries seek to kick-start environmental movements, reverse death row sentences or even change legislative policy.

But few come with the kind of ideological ambition of the Edward Snowden study "Citizenfour," a movie of grand scope that also tells an intimate personal story.

The long-awaited documentary from Snowden chronicler Laura Poitras arrived with a bang at its world premiere at the New York Film Festival on Friday night, receiving a rare festival standing ovation ahead of its theatrical release Oct. 24, when it could well jolt both the fall moviegoing season and the national conversation about privacy and security.

Poitras, as some may recall, shot the 12-minute video of Snowden that went viral in June 2013 and made the National Security Agency contractor, at 29, perhaps the most important and polarizing figure since Daniel Ellsberg. "Citizenfour is, in effect, that original video effort writ very large a look at how Snowden came to the decision to pull back the curtain on the NSA's massive surveillance operation and what happened to him when he did.

It is also, needless to say, a portrait of that operation itself.

Its absolutely staggering and beyond what you can ever imagine, Poitras said in an interview at the festival Saturday. Theres the scope and desire of collecting all of this data, and also the mentality that if they have all communications they have these repositories they can query later. Its shocking, really.

Poitras is already well known as a foreign-affairs investigative journalist thanks to documentaries such as her Oscar-nominated My Country, My Country. Her new film begins with her voiceover describing how she had been contacted anonymously by a man identifying himself as "Citizenfour" who claimed to have proof of illegal government surveillance.

The source turns out to be Snowden, but before Poitras gets to him, she details the extensive national security apparatus that he will soon expose. The director has activists explain how the government uses so-called metadata to track phone calls and movements of ordinary citizens, and shows clips of James Clapper, director of national intelligence for the NSA, testifying before Congress that the government does not spy on millions of Americans.

The focus then shifts to Snowden, shot by Poitras over eight days in a now-famous Hong Kong hotel room with the Guardians Glenn Greenwald and Ewen MacAskill present, ready to break stories based on the classified documents Snowden is leaking them. (Greenwald would eventually write a book on the experience called No Place To Hide.) There is a kind of unfettered, up-close detail to these scenes that would be startling for any interesting documentary subject, let alone for the worlds most famous fugitive. "Citizenfour" is an examination of a larger-than-life personality in the most handmade manner imaginable.

Snowden has made the decision to come forward, he says in the film, because he feels theres a great threat to the future of American free speech. "The elected and the electorate," Snowden says, have become "the ruler and the ruled.

The rest is here:
NYFF 2014: Edward Snowden documentary 'Citizenfour' jolts ...

A list of known NSA spying techniques | Police State USA

Is the NSA listening to your phone calls? Yes.

The scope of the National Security Agencys spying abilities has increased dramatically in the last few of years. Rumors have been circulated for years about the agencies clandestine abilities. Many of those rumors have been confirmed, thanks to leaked documents and whistleblowers like Edward Snowden.

Below is a list of powers and tricks used by the NSA. Many of these abilities are shared by the NSAs spying counterpart in the United Kingdom, known as the Government Communication Headquarters (GCHQ). Interestingly, most of the reporting about the USAs Orwellian playbook comes from foreign publications.

Police State USA will attempt to update this list as evidence of the police state continues to unfold.

* * * * *

* * * * *

After digesting this list, consider that these powers go beyond some of the wildest nightmares of NSA critics from a generation ago. In 1975, U.S. Senator Frank Church made some chilling statements in regards to the NSAs domestic spying abilities. Four decades later, things are exponentially more alarming.

Sen. Frank Church

If a dictator ever took over, the NSA could enable it to impose a total tyranny, and there would be no way to fight back.

That capability at any time could be turned around on the American people, and no American would have any privacy left, such is the capability to monitor everything: telephone conversations, telegrams, it doesnt matter. There would be no place to hide.

Read more:
A list of known NSA spying techniques | Police State USA

FBI director attacks tech companies for embracing new modes of encryption

The FBI director, James Comey, speaks about the impact of technology on law enforcement in Washington on Thursday. Photograph: Jose Luis Magana/AP

The director of the FBI savaged tech companies for their recent embrace of end-to-end encryption and suggested rewriting laws to ensure law enforcement access to customer data in a speech on Thursday.

James Comey said data encryption such as that employed on Apples latest mobile operating system would deprive police and intelligence companies of potentially life-saving information, even when judges grant security agencies access through a warrant.

Criminals and terrorists would like nothing more than for us to miss out, he said. Technologists have found such statements reminiscent of the Crypto Wars of the 1990s, an earlier period in which the US government warned about encryption constraining law enforcement.

Framing his speech at the Brookings Institution as kickstarting a dialogue and insisting he was not a scaremonger, Comey said encryption threatens to lead us all to a very, very dark place.

Comey also posed as a question whether companies not subject currently to Calea should be required to build lawful intercept capabilities for law enforcement, something he contended would not expand FBI authorities. Calea is a 1994 surveillance law mandating that law enforcement and intelligence agencies have access to telecommunications data, which Comey described as archaic in the face of technological innovation.

Im hoping we can now start a dialogue with Congress on updating it, Comey said.

Privacy advocates contend Comey is demagoguing the issue.

It took a June supreme court ruling, they point out, for law enforcement to abandon its contention that it did not require warrants at all to search through smartphones or tablets, and add that technological vulnerabilities can be exploited by hackers and foreign intelligence agencies as well as the US government. Additionally, the FBI and police retain access to data saved remotely in the so-called cloud where much data syncs for storage from devices like Apples for which companies like Apple keep the encryption keys.

Comey, frequently referring to bad guys using encryption, argued access to the cloud is insufficient.

Read the original here:
FBI director attacks tech companies for embracing new modes of encryption

FBI: cellphone encryption would impede criminal investigations

Photo by Getty Images.

Privacy advocates and technology experts called the concerns exaggerated and little more than recycled arguments the government has raised against encryption since the early 1990s.

Likening encrypted data to a safe that cannot be cracked or a closet door that wont open, Comey said the move by tech companies to protect user communications in the name of privacy is certain to impede a wide range of criminal investigations. New legislation to allow law enforcement to intercept communications is needed at a time of advancing technology and new forms of communication, he said.

We have the legal authority to intercept and access communications from information pursuant to court order, but we often lack the technical ability to do so, Comey said in a Brookings Institution speech. Comey cited particular cases in which he said access to cell phone data aided in a criminal investigation. But in a question-and-answer session after the speech, he said he could not cite particular instances in which someone was rescued from danger who wouldnt have been had law enforcement been blocked from that information.

Logic tells me there are going to be cases like that, Comey said.

The speech, which echoes concerns he and others in law enforcement have previously made, comes soon after announcements by Apple and Google that their new operating systems will be encrypted, or protected with coding by default. Law enforcement officials could still intercept conversations but might not be able to access call data, contacts, photos and email stored on the phone.

While the companies actions are understandable, Comey said, the place they are leading us is one we shouldnt go to without careful thought and debate.

Encryption isnt just a technical feature. Its a marketing pitch. But it will have very serious consequences for law enforcement and national security agencies at every level, Comey said.

The governments concerns may also center in part on the use of Apples iMessage platform, which offers end-to-end encrypted text messages that supersede traditional SMS messages. That kind of encryption likely provides access to those messages on users iPhones, of which Apple has sold more than 240 million since 2013.

He acknowledged a rise in public mistrust of government in the year since former National Security Agency systems analyst revealed NSA secret intelligence collection programs. But he said the public was wrong to believe that law enforcement can access any and all communications with the flip of a switch.

Read the original post:
FBI: cellphone encryption would impede criminal investigations

FBI director calls for greater police access to communications

Apple and Google should reconsider their plans to enable encryption by default on their smartphones, and the U.S. Congress should pass a law requiring that all communication tools allow police access to user data, U.S. FBI Director James Comey said.

Comey, repeating his recent concerns about announcements from Apple and Google to offer new encryption tools on their smartphone OSes, went a step further Thursday, when he called on Congress to rewrite the 20-year-old Communications Assistance for Law Enforcement Act.

Following the past 15 months of leaks about surveillance at the U.S. National Security Agency, the pendulum of public opinion has swung too far away from law enforcements needs, Comey said in a speech at the Brookings Institution.

CALEA requires telecom carriers to give police access to telephone conversations, but Comey called on Congress to expand it to cover the wide range of communication apps and devices not anticipated by lawmakers in 1994.

New encryption tools, combined with a huge number of communication tools not covered by CALEA, means law enforcement agencies are often going dark when attempting to track down criminals and terrorists, Comey said.

Ive never been someone who is a scaremonger, he added. But Im in a dangerous business. So I want to ensure that when we discuss limiting the court-authorized law enforcement tools we use to investigate suspected criminals, that we understand what society gains, and what we all stand to lose.

Comey said his goal with the speech was to open a dialog about law enforcement access to communications, and several audience members pushed back against his call for more surveillance capabilities.

Asked about NSA surveillance, Comey said he understands why companies are marketing encryption tools. The push for privacy comes from justifiable surprise on the part of the U.S. as to the extent and nature of the surveillance being conducted, he said. I can understand people being freaked and surprised, but Ive yet to see the rogue conduct, the lawless conduct, that people talk about.

However, the scope of some of the surveillance was breathtaking to people outside the law enforcement and intelligence communities, he added.

Other audience members questioned the international implications of increased law enforcement access to all communication tools. If U.S. law enforcement agencies demand access, so will other governments, said Greg Nojeim, senior counsel at digital rights group the Center for Democracy and Technology.

Go here to read the rest:
FBI director calls for greater police access to communications

FBI’s Comey takes a shot at Apple, Google

Jose Luis Magana | AP Photo

FBI Director James Comey speaks about the impact of technology on law enforcement, Oct. 16, 2014, at Brookings Institution in Washington.

FBI Director James Comey publicly rebuked two of America's most prominent technology companies in a speech on encryption in Washington on Thursday, arguing that Apple and Google are potentially creating "a black hole for law enforcement."

At issue is the announcement by the two companies that new operating systems will encrypt data by defaultmeaning that Apple and Google could not respond to a legal warrant for access to a suspect's phone because they would not be able to break the encryption.

In remarks that were open to the public at the Brookings Institution, Comey said the heightened encryption is going to cause problems for the FBI as it tracks down criminals and terrorists.

"Both companies are run by good people, responding to what they perceive is a market demand," Comey said. "But the place they are leading us is one we shouldn't go to without careful thought and debate as a country."

Encryption, he said, "threatens to lead us all to a very dark place."

Read MoreGoogle discloses Web encryption vulnerability

Comey acknowledged that the companies are acting in the wake of the Edward Snowden disclosures about U.S. government spying by offering customers phones that will be resistant to the government's efforts to access data.

"Perhaps it's time to suggest that the post-Snowden pendulum has swung too far in one directionin a direction of fear and mistrust," Comey said. "Are we so mistrustful of governmentand of law enforcementthat we are willing to let bad guys walk away?"

See the original post:
FBI's Comey takes a shot at Apple, Google

Open source startup targeting DevOps-defined networking

A software startup debuted this week proposing software-defined networking to Docker, the open source software for creating Linux application virtualization containers.

A software startup debuted this week proposing software-defined networking to Docker, the open source software for creating Linux application virtualization containers.

SocketPlane was founded by former Cisco, Red Hat, HP, OpenDaylight and Dell officials. In the open source world, their names are well known: Madhu Venugopal, John Willis, Brent Salisbury and Dave Tucker.

+ MORE ON NETWORK WORLD: Six Docker services making serious waves +

The team is looking to bring enterprise-grade networking to the Docker ecosystem by developing a native networking stack called SocketPlane -- for Docker software. The SocketPlane software will be designed to address the performance, availability and scale requirements of networking in large, container-based cloud deployments.

The software will employ a DevOps model and tools to enable scale, programmable agility, and policy-driven automation, SocketPlane officials say. It will also provide network virtualization to mask network configuration complexity, they say.

The SocketPlane team calls their strategy DevOps-defined networking. No other vendor offering SDN products has adopted this model, company officials claim, but Google, Facebook and Twitter have done so internally.

The SocketPlane software will be available early next year.

SocketPlane is funded by LightSpeed Venture Partners, a venture capital firm that has also funded Blue Nile, Brocade, Ciena, DoubleClick, Fusionio, Nest Labs, Nicira, Nimble Storage and SnapChat.

SocketPlane's headquarters will be in Santa Clara, Calif. Currently, the company employs its four founders.

Read more:
Open source startup targeting DevOps-defined networking

Measure your open source communitys age to keep it healthy

To really grasp a free/open source software project, you need to know how the community that develops and supports it is evolving. Attracting lots of new members will be a reason for celebrating success in a young project but you should also check whether they stick around for a long time. In mature projects, however, you can afford not attracting many new members, as long as you are retaining old ones. The ratio of experienced, long-term members to recent ones also tells you about the quality of the code and need to support members.

Of the many aspects to explore, two important metrics are:

Together, both metrics can be used to estimate engagement, to predict the future structure and size of the community, and to detect early potential problems that could prevent a healthy growth.

Both turnover and age structure can be estimated from data in software development repositories. The main source of this information is the source code management repository (such as Git), which provides information about active developers authoring the software. The issue tracking system and the mailing list archives are interesting sources of information as well.

A single chart can be used to visualize turnover and age structure data obtained from these repositories: the community aging chart. This chart resembles to some extent the population pyramid used to learn about the age of populations. It represents the age of developers in the project, in a way that provides insight on its structure. For instance, Figure 1 shows the community aging chart for contributors in Git repositories of the OpenStack project in July 2014.

Figure 1. Community aging chart for authors of code

In Figure 1, the Y axis shows different generations of project members. The chart is divided into periods of six months, with the oldest generation at the top and the youngest at the bottom. For each generation, the green bar (Attracted) represents the number of people that joined it. In other words, how many people were attracted to the community during the corresponding period say, first semester of 2010. Meanwhile, the blue bar (Retained) represents how many people in that generation are still active in the community. In other words, how many of those that were attracted are still retained.

The aging chart can provide insights on many different aspects of the community. Lets review some of them.

The ratio of the pair of bars for each generation is its retention ratio. By comparing the lengths of each pair of bars, we can quickly learn which generations were most successfully retained, and which ones mostly abandoned the project. For the newest generation, retention will always be 100%, since people recently entering the community are still considered to be active (but that depends on the inactivity period, as Ill explain in a moment). A ratio of 50% means that half the people in the generation are still retained.

Link:
Measure your open source communitys age to keep it healthy