From prison, Manning offers punditry on Iraq

The Guardian

The Guardian's portrait of Chelsea Manning.

The simmering debate about the evolving US military strategy in Iraq and Syria has been joined by an unlikely pundit: Army Private Chelsea Manning.

Manning, a former US intelligence analyst convicted last year of leaking classified US information to the anti-secrecy group WikiLeaks, argues in a new piece for the Guardianthat the United States cannot defeat the Islamic State militant group by bombing them, and should focus on containing them instead.

The piece says only that the writer, who joined the Army as a man known as Bradley Manning, was "in Fort Leavenworth," and does not mention her conviction or passing of military secrets. In a separate piece, the Guardian reports Tuesday that "Manning wrote the Guardian article in Fort Leavenworth, Kansas, where she is in military custody".

KEVIN LAMARQUE / Reuters

FACING JUSTICE: Private Chelsea Manning at her sentencing in August 2013. (The Army began providing her gender identity treatment this past July.)

Manning's piece was published as Defense Secretary Chuck Hagel and Gen. Martin Dempsey, chairman of the Joint Chiefs of Staff, appeared on Capitol Hill for a hearing on the USstrategy against the Islamic State in Iraq and Syria. Dempsey said that US military advisers could find themselves involved in ground combat missions if needs dictate it.

Conversely, Manning argues in her piece that the Islamic State should be allowed to set up its own region to control. Doing so is a stated goal for the militants, who want to establish a caliphate, a state under the control of strict Islamist law.

"Let Isis succeed in setting up a failed 'state' - in a contained area and over a long enough period of time to prove itself unpopular and unable to govern," Manning argues. "This might begin to discredit the leadership and ideology of Isis for good."

The rest is here:
From prison, Manning offers punditry on Iraq

School dropout codes chat program that foils NSA spying

The National Security Agency has some of the brightest minds working on its sophisticated surveillance programs, including its metadata collection efforts. But a new chat program designed by a middle-school dropoutin his spare time may turn out to be one of the best solutions to thwart those efforts.

Prompted by Edward Snowden's revelations about the government's intrusive surveillance activities, loosely knit citizen militias of technologists and security professionals have cropped up around the world to develop systems to protect us from government agencies out to identify us online and grab our communications.

John Brooks is now among them.

Brooks, who is just 22 and a self-taught coder who dropped out of school at 13, was always concerned about privacy and civil liberties. Four years ago he began work on a program for encrypted instant messaging that uses Tor hidden services for the protected transmission of communications. The program, which he dubbed Ricochet, began as a hobby. But by the time he finished, he had a full-fledged desktop client that was easy to use, offered anonymity and encryption, and even resolved the issue of metadata -- the "to" and "from" headers and IP addresses spy agencies use to identify and track communications -- long before the public was aware that the NSA was routinely collecting metadata in bulk for its spy programs. The only problem Brooks had with the program was that few people were interested in using it. Although he'd made Ricochet's code open source, Brooks never had it formally audited for security and did nothing to promote it, so few people even knew about it.

Then the Snowden leaks happened and metadata made headlines. Brooks realised he already had a solution that resolved a problem everyone else was suddenly scrambling to fix. Though ordinary encrypted email and instant messaging protect the contents of communications, metadata allows authorities to map relationships between communicants and subpoena service providers for subscriber information that can help unmask whistleblowers, journalists's sources and others. It's not just these kind of people whose privacy is harmed by metadata, however; in 2012 it was telltale email metadata that helped unmask former CIA director and war commander General David Petraeusand unravel his affair with Paula Broadwall.

With metadata suddenly in the spotlight, Brooks decided earlier this year to dust off his Ricochet program and tweak it to make it more elegant -- he knew he'd still have a problem, however, getting anyone to adopt it. He wasn't a known name in the security world and there was no reason anyone should trust him or his program.

EnterInvisible.im, a group formed by Australian security journalist Patrick Gray. Last July, Gray announced that he was working with HD Moore, developer of the Metasploit Framework tool used by security researchers to pen-test systems, and with another respected security professional who goes by his hacker handle The Grugq, to craft a secure, open-source encrypted chat program cobbled together from parts of existing anonymity and messaging systems -- such as Prosody, Pidgin and Tor. They wanted a system that was highly secure, user friendly and metadata-free. Gray says his primary motivation was to protect the anonymity of sources who contact journalists.

"At the moment, when sources contact a journalist, they're going to leave a metadata trail, whether it's a phone call record or instant message or email record [regardless of whether or not thecontentof their communication is encrypted]," he says. "And that data is currently accessible to authorities without a warrant."

When Brooks wrote to say he'd already designed a chat program that eliminated metadata, Gray and his group took a look at the code and quickly dropped their plan to develop their own tool, in favor of working with Brooks to develop his.

"He writes incredible code," Gray says, "and really thinks like a hacker, even though he doesn't have a security background."

See original here:
School dropout codes chat program that foils NSA spying

What’s Homomorphic Encryption And Why Did ItWin A MacArthur Genius Grant?

Craig Gentry, a cryptographer working at IBMs Thomas Watson Research Center in the suburbs outside New York City, recently received a phone call that changed his life. His passion, an experimental and mainly theoretical type of encryption called homomorphic encryption, just won a MacArthur Genius Grant.

The complicated encryption method lets users run programs without actually decrypting them. Paul Ducklin, a security researcher working for Sophos, laid out a neat summary of how this works:

Imagine, however, if I could simply take your encrypted search terms, leave them encrypted, search for them directly in the still-encrypted database, and get the same results. If I can perform calulations directly on your encrypted data, yet get the same results that you get from the unencrypted data, we both win enormously from a security and privacy point of view. You don't need to give me any decryption keys at all, so you no longer have to trust me not to lose, steal or sell your data. (You still have to trust me to tell you the truth about any results I work out for you, but that is a completely different issue.) And I no longer need your decryption keys, so I can't lose or abuse your data even if I wanted to.

For security-conscious cloud and SaaS providers, this is a very big deal. Gentry has been working on homomorphic encryption for years, and the first big steps to commercialization came out last year when IBM released an open source software package for developers called HElib. The HE stands for homomorphic encryption.

John Launchbury, a DARPA program manager, told Co.Labs that "Originally cryptography was all about keeping communications private. Then it became standard to use cryptography for securing stored data, in case someone steals your computer. Now with the prevalence of cloud computing, it is becoming clear that we also need to be serious about data confidentiality even while computing with it--in case someone is able to observe the computation as it proceeds."

"Homomorphic encryption," he added, "Is one way to enable this: it is a form of encryption that allows computations to be performed on data without having to decrypt the data. You could store information on a cloud server, have the cloud provider perform some tasks on the data, without the cloud provider ever learning anything about your data. This could have profound implications for improving our privacy. Unfortunately, the performance challenges are so serious that it cannot yet be used in practice."

Writing back in 2009, security expert Bruce Schneier explained that homomorphic encryption is important because it could potentially make security much easier for distributed software systems:

Any computation can be expressed as a Boolean circuit: a series of additions and multiplications. Your computer consists of a zillion Boolean circuits, and you can run programs to do anything on your computer. This algorithm means you can perform arbitrary computations on homomorphically encrypted data. More concretely: if you encrypt data in a fully homomorphic cryptosystem, you can ship that encrypted data to an untrusted person and that person can perform arbitrary computations on that data without being able to decrypt the data itself. Imagine what that would mean for cloud computing, or any outsourcing infrastructure: you no longer have to trust the outsourcer with the data.

Although Schneier went on to be critical about practical applications for homomorphic encryption (which, to be fair, was written years ago), IBM has been taking out patents on the method that hint at eventual commercialization.

Gentry didnt invent homomorphic encryption, but his research is going a long way to making it usable. Over the next five years, Gentry will receive a no-strings-attached grant of $625,000 from the MacArthur Foundation to follow his passions. In a few years, if his work makes its way to the marketplace, it might solve a lot of our current problems with privacy protection and data security.

Read more:
What's Homomorphic Encryption And Why Did ItWin A MacArthur Genius Grant?

Porticor Helps Healthcare Organizations Meet HIPAA Compliance and Protect Private Information …

Porticor's Data Encryption and Key Management Solution Enables Health Organizations to Secure Protected Health Information in the Cloud and Meet Safe Harbor Compliance

CAMPBELL, Calif. Porticor, a leading cloud data security company delivering the only cloud-based key management and data encryptionsolution that infuses trust into the cloud and keeps cloud data confidential, today announced growing customer traction in the healthcare industry due to its innovative solution enabling health organizations to secure cloud-based Protected Health Information (PHI) and helping them meet HIPAA and Safe Harbor compliance.

The Porticor Virtual Private Data (VPD) platform is a cloud key management and encryption solution that delivers the healthcare industry's most secure cloud encryption key management by enabling health organizations to securely maintain control of their own encryption keys. Unlike traditional data encryption solutions, which are complicated and expensive to deploy and manage, Porticor's split-key encryption and homomorphic key management system is offered as the industry's first cloud data protection service of its kind, delivering true confidentiality of data in cloud, virtual and hybrid environments by ensuring encryption keys are never exposed.

"HIPAA requires us to protect data at rest and in motion," said Kathleen Sidenblad, VP of Engineering at Amplify Health, LLC, of San Francisco. "We have found Porticor's cloud data security and performance to be very good. Managing our own data encryption keys is important to us and Porticor lets us do that. We take security very seriously, and other solutions don't allow us to easily control our own keys."

Over the years, a variety of factors have led to an increase in healthcare organizations embracing cloud computing, including the need to do more with less money and the need to leverage data analytics to drive better care and reduce costs. Today many health apps such as EMR/EHRs are now cloud based, giving health workers computing resources available on demand, and allowing for scalable implementations, high availability and faster rollout of services.

"Porticor offers a unique blend of technical, cloud, key management and affordability features," said Christine Sublett, President of Sublett Consulting, a Porticor partner and HIPAA compliance expert assisting healthcare and technology companies with security, privacy and compliance issues. "The price point is reasonable, and their key management technology is superior to anything else we explored. Prior to Porticor we had to manage our own encryption keys, and it was something we didn't do well."

Integrating with major players such as HP, AWS and VMware, Porticor provides the industry's only software-defined, automated solution that uniquely eliminates the need for cumbersome, non-scalable, and expensive hardware security modules for the cloud. Uniquely combining data encryption with patented split-key encryption and homomorphic key management technologies, Porticor protects critical data in public, private and hybrid cloud environments. It provides the strong security needed for healthcare compliance in a convenient, cost-effective, fully cloud-based solution.

"The cloud is no less secure inherently than a traditional data center, and of primary concern from a logical standpoint would be encryption of data in the cloud," said Sublett. "There are two places where I see Porticor out in front of the competition. First, its key management solution is truly elegant. Key management is an ongoing challenge for companies, and Porticor's homomorphic key management solution solves this problem. Porticor's solution also has implications for an organization that wishes to utilize the protections afforded it under Safe Harbor."

"In the event of a security incident that is a suspected breach, and if the healthcare company is utilizing Porticor's API application-level integration for data encryption, there is a reasonable likelihood that, after performing a breach risk assessment, they could make the determination that there is a low probability that the PHI has been compromised and thereby claim safe harbor," Sublett continued. "This means that the onus of reporting a breach is largely ameliorated, with fines and reputation loss avoided."

While other solutions require encryption keys to be manually managed for every disk, distributed storage or database record, or to be owned by a cloud provider, Porticor's homomorphic split-key encryption technology eliminates both complexity and compromises. Porticor restores key ownership to customers while automatically managing customer encryption keys with maximum security. With homomorphic key management, the keys are protected at all times even while they are in use. Porticor protects the entire data layer stack, including virtual disks, distributed storage, databases, and applications. It dynamically encrypts and decrypts virtual data whenever the application needs access, and delivers a key management system that is fully hosted in the cloud, yet offers the confidentiality, security and trust of a system that is hosted inside the datacenter. Within minutes, customers can encrypt their entire data layer with the proven AES 256-bit encryption algorithm.

View post:
Porticor Helps Healthcare Organizations Meet HIPAA Compliance and Protect Private Information ...

Encryption goof fixed in TorrentLocker file-locking malware

The developers of a type of malicious software that encrypts a computers files and demands a ransom have fixed an error security experts said allowed files to be recovered without paying.

The malware, called TorrentLocker, popped up last month, targeting users in Australia, according to iSight Partners, a security consultancy. It now appears to be also geo-targeting victims in the U.K.

TorrentLockers developers ironically made a similar mistake as the creators of another ransomware program, CryptoDefense. Researchers found earlier this year that CryptoDefense left a decryption key on a persons computer, although the error was soon fixed.

Earlier this month, researchers with the consultancy Nixu found that TorrentLocker used the same keystream to encrypt all of a computers files. That was a mistake, as a keystream should never be used more than once, according to a writeup on the SANS Institute blog.

As the encryption was done by combining the keystream with the plaintext file using the XOR operation, we were able to recover the keystream used to encrypt those files by simply applying XOR between the encrypted file and the plaintext file, they wrote.

With the error out in the open, it was only a matter of time before it was fixed.

Richard Hummel, a senior technical analyst with iSight, wrote that a variant of TorrentLocker without that bug has now been found, which shows the extremely high pace of innovation of our collective adversaries.

The latest version also scans profiles in the Thunderbird email client for email addresses and passwords, he wrote. This will almost certainly be used to further the spam campaign for TorrentLocker, he wrote.

TorrentLocker asks for US$500 to unlock the files, payable in bitcoin. Hummel wrote that although the percentage of people who pay is low, a look at the bitcoin address associated with TorrentLocker showed that the attackers are making many bitcoins, he wrote.

Jeremy is the Australia correspondent for IDG News Service, which distributes content to IDG's more than 300 websites and magazines in more than 60 countries. More by Jeremy Kirk

Originally posted here:
Encryption goof fixed in TorrentLocker file-locking malware

New Zealand: Snowden exposes NSA facilities during ‘Moment of Truth’ – Video


New Zealand: Snowden exposes NSA facilities during #39;Moment of Truth #39;
Video ID: 20140915-026 W/S People arriving on stage for the panel discussion M/S Kim Dotcom blows kisses to the crowd, cheering SOT, Julian Assange, Wikileaks editor-in-chief (English): "The...

By: RuptlyTV

Originally posted here:
New Zealand: Snowden exposes NSA facilities during 'Moment of Truth' - Video

Reddit Mods did not ban a user for asking Julian Assange about #GamerGate – Video


Reddit Mods did not ban a user for asking Julian Assange about #GamerGate
https://twitter.com/TheStrangeOneR/status/511646977927675904/photo/1 https://i.imgur.com/rdyrOx6.jpg http://www.reddit.com/r/SubredditDrama/comments/2gi3pn/julian_assange_thinks_censorship_is_pat...

By: MundaneMatt

Here is the original post:
Reddit Mods did not ban a user for asking Julian Assange about #GamerGate - Video

LXC Coin crowdfunds in challenge to Bitcoin

LXC Coin will work with a network of P2P lenders across the world, and could evolve into its own P2P vehicle over the coming years.

Unlike many other cryptocurrencies, the LXC Coin is real, according to Ellefsen. If crypocurrencies were banned tomorrow - and Russia is looking to do that right now - our coin would keep its value. You could reclaim your investment from us.

Cryptocurrencies havent been real money until now, he claims.

Bitcoin, which currently trades for around $500 per coin, is seen as a volatile currency by investors. It can lose up to 30pc of its value in a single day. LXC Coin will control supply and demand, much like a central bank, ensuring a consistent price for the coin.

Some 1.1bn of these new coins will be issued over the next four to five years.

The LXC Coin is based on the code from the worlds most famous cryptocurrency, Bitcoin, mixed with BlackCoin technology. Unlike Bitcoin, BlackCoin does not have to be mined. It is based on a proof of stake concept, which means that it has become a dominant digital currency through the sheer proliferation of coins held in wallets by users.

By using the BlackCoin model, LXC Coin does not require vast amounts of computing power and electricity to exist.

Customers must pay hard cash or exchange it for other digital currencies.

The company was founded in Denmark in 2012 and became a UK holding company in 2014.

Ellefsen chose to raise money on Crowd For Angels, the UKs FCA-regulated debt and equity platform, to generate awareness for the start-up and prove that its model was FCA compliant.

See the rest here:
LXC Coin crowdfunds in challenge to Bitcoin

WikiLeaks posts ‘weaponized malware’ for all to download

Summary: The long and sordid story of WikiLeaks takes an astonishingly irresponsible and very dangerous turn.

Sometimes when we seek to understand the impact of a digital scenario, we recast it in meatspace and describe an analogous situation. In seeking to understand the most recent (and probably most epically irresponsible) WikiLeaks posting, the meatspace analogy will come in handy.

Imagine, if you will, that a company located in Germany was doing biological warfare research, possibly under the guidance and using the funding of various allied governments.

As part of their research, the company has produced a strain of virus that's Ebola-dangerous and Ebola-virulent, that might be used by the varied governments to fulfill certain unspecified and undisclosed objectives.

But this time, WikiLeaks didn't just release documents. They posted the actual software.

Now imagine that a group of concerned scientists discovers this research and illegally gets their hands on vials containing the biowarfare agent. Their justification in this theft is the desire to develop a defense against it, in case it is loosed upon an unsuspecting public.

At this point, you might side with the scientists. After all, biological warfare is nasty stuff, and protecting the public from exposure and harm is a laudable goal.

What if the thieves aren't biological scientists? They're violent activists. Similarly disturbed about the activities going on in the biowarfare lab, they also manage to get a sample of the deadly biological agent.

However, instead of securely and safely transporting the deadly biohazard back to a lab for safe and secure analysis leading to an antidote agent, the thieves inexplicably set up a kiosk at a local mall. And instead of securely managing the biohazard, they give out sample vials of the biohazard to anyone who wants one.

Anyone with a brain would immediately call the authorities and insist that this incredibly dangerous behavior be stopped, and that all the loose vials of biological warfare agent be rounded up and secured or destroyed.

The rest is here:
WikiLeaks posts 'weaponized malware' for all to download