Man attacked love rival with belt after drinking session

A man who ambushed a love-rival's car and set about him with a belt has been made the subject of a 12-month supervision order.

Mark Coley, of Westbourne Road, Halesowen, was told he must take part in an alcohol awareness course as part of the terms of the order when he appeared before Wolverhampton Crown Court this week.

Mr David Lees, prosecuting, said victim Bradley Manning had been in a relationship with Coley's ex-girlfriend for around 18 months, leading to considerable ill feeling on Coley's part.

He said that on May 5 Mr Manning was driving along Dudley Road in Rowley Regis. When he passed The Cock Inn, he became aware of Coley emerging from an alleyway.

"He stepped out in front of Mr Manning's vehicle, Mr Manning describes the defendant as having no concern for his safety," said Mr Lees.

"Mr Manning had to brake hard to avoid a collision, and swerve around the defendant.

"He saw that the defendant had something in his hand which he swung towards Mr Manning's car. He heard a bang as it struck his car, and Mr Manning stepped out of his car to see what was going on.

"The defendant came running towards Mr Manning, swinging what turned out to be a belt with a large metal buckle at Mr Manning."

The belt struck Mr Manning on the right cheek, said Mr Lees, and Coley then started punching Mr Manning in the face. Two bystanders broke the men up, and Mr Manning was left with a half-inch cut to his face.

Under questioning by police, Coley said he had been drinking heavily that day.

See the article here:
Man attacked love rival with belt after drinking session

Embracing flag, Snowden says he hopes to return to U.S.

Cover of September 2014 "Wired" magazine, featuring Edward Snowden, photographed by Platon.(Photo: Platon/Wired)

Development of a U.S. counterattack for cyberterrorism that could do more harm than good was one of the final events that drove Edward Snowden to leak government secrets, the former National Security Agency contractor tells Wired magazine.

Snowden, photographed for the story clutching an American flag, said the MonsterMind program was designed to detect a foreign cyberattack and keep it from entering the country. But it also would automatically fire back. The problem, he said, is malware can be routed through an innocent third-party country.

"These attacks can be spoofed," he told Wired. "You could have someone sitting in China, for example, making it appear that one of these attacks is originating in Russia. And then we end up shooting back at a Russian hospital. What happens next?"

Snowden, 31, also told the magazine he hopes to return to the U.S. someday.

"I told the government I'd volunteer for prison, as long as it served the right purpose," he said. "I care more about the country than what happens to me. But we can't allow the law to become a political weapon or agree to scare people away from standing up for their rights, no matter how good the deal. I'm not going to be part of that."

Snowden was a contractor for Booz Allen Hamilton when he leaked details of U.S. surveillance programs to The Guardian and The Washington Post. The first reports were published in June 2013, setting off an immediate global firestorm. Snowden, who was in hiding in Hong Kong at the time, fled to Moscow where he still lives.

His impact had staying power.

President Obama promised to scale back surveillance of American citizens. Germany ordered the CIA station chief out of the country. The Guardian and Post won the Pulitzer prize for public service for their coverage.

Snowden previously expressed interest in returning to the United States, but said he feared an unjust trial on charges of espionage and theft of government property could result in a lengthy prison sentence. He remains adamant that what he did was for the good of the country.

Read the original:
Embracing flag, Snowden says he hopes to return to U.S.

System-on-Chip suits smart metering applications.

August 14, 2014 - Built on dual-core 32-bit ARM Cortex-M4 architecture, Model SAM4CP16B is fully compatible with ATPL230A OFDM physical layer device which is compliant with PRIME standard specification. Chip meets OEM requirements by incorporating independent application, protocol stack, and physical layer processing functions within same device. Features include integrated low-power driver, advanced cryptography, 1 MB embedded Flash, 152 KB of SRAM, low-power RTC, and LCD controller. Atmel Corp. 2325 Orchard Parkway San Jose, CA, 95131 USA Press release date: August 12, 2014

Dual-Core Architecture, Integration and Extensive Security Features Ideal for Smart Metering

SAN JOSE, Calif., -- Atmel( )Corporation (NASDAQ: ATML), a global leader in microcontroller and touch technology solutions, today announced the introduction of its latest Power Line Communication System-on-Chip (SoC) solution designed for smart metering applications.

The Atmel SAM4CP16B is an extension of Atmel's SAM4Cx smart energy platform built on a dual-core 32-bit ARM Cortex-M4 architecture. Fully compatible with Atmel's ATPL230A OFDM physical layer (PHY) device compliant with PRIME standard specification, this highly flexible solution addresses OEM's requirements for various system partitioning, BOM reduction and time-to-market requirements by incorporating independent application, protocol stack and physical layer processing functions within the same device.

"We continue to build on the success of our industry leading SAM4Cx platform and offer best-in-class embedded connectivity, flexibility and cost structure for high-volume smart metering deployments," said Andres Munoz, marketing manager, smart energy communications at Atmel Corporation. "Furthermore, additional enhancements developed to meet PRIME standard specifications provide unprecedented performance in rigorous environments."

Key features of the solution include integrated low-power driver, advanced cryptography, 1Mbytes of embedded Flash, 152Kbytes of SRAM, low-power RTC, and LCD controller.

Availability For more information on availability and pricing, please contact your local Atmel sales representative.

More Information Atmel's SAM4Cx Platform: http://www.atmel.com/products/smart-energy/default.aspx Atmel ARM-based products: http://www.atmel.com/arm/default.aspx Atmel YouTube Channel: http://www.atmel.com/youtube Embedded Design Blog: http://www.atmelcorporation.wordpress.com Twitter: http://www.atmel.com/twitter LinkedIn: http://www.atmel.com/linkedin Facebook: http://www.atmel.com/facebook

About Atmel Atmel Corporation (NASDAQ: ATML) is a worldwide leader in the design and manufacture of microcontrollers, capacitive touch solutions, advanced logic, mixed-signal, nonvolatile memory and radio frequency (RF) components. Leveraging one of the industry's broadest intellectual property (IP) technology portfolios, Atmel is able to provide the electronics industry with complete system solutions focused on industrial, consumer, communications, computing and automotive markets.

2014 Atmel Corporation. Atmel, Atmel logo and combinations thereof, Enabling Unlimited Possibilities, and others are registered trademarks or trademarks of Atmel Corporation in U.S. and other countries. Other terms and product names may be trademarks of others.

Read more:
System-on-Chip suits smart metering applications.

CryptoCurrency – YouTube

Buying bitcoins can be very difficult to the uninitiated, however there are plenty of places to buy bitcoins and some of them are incredibly easy.

First of all, you can buy bitcoins on ebay, but you should never sell bitcoins on ebay (because of charge backs) - you pay quite a hefty premium doing it this way, but that premium can be quickly made up in a bullish market. You can also buy bitcoins with paypal.

Second option is localbitcoins.com, which you can meet with people in person to buy and sell bitcoins. Again you pay a premium, but not as large a premium as on ebay, and its more secure for sellers.

Third you can offer goods or services for bitcoin. For example you can use the ebay clone bitmit.net for selling goods, or there are plenty of places you can offer your services

Finally, and the most popular option, is to buy bitcoins on bitcoin exchanges. This can take a while to set up, but its possibly the best long term solution. But choose your exchange carefully. Show less

Read this article:
CryptoCurrency - YouTube

Manning ‘not receiving gender help’

1 day ago By Press Association

National security leaker Chelsea Manning is not receiving medical treatment for her gender identity condition, it has been claimed.

The American Civil Liberties Union and Manning's civilian lawyer, David Coombs, have told the US Disciplinary Barracks in Fort Leavenworth, Kansas, and officials including defence secretary Chuck Hagel, that a lawsuit will be filed if it is not confirmed by September 4 that the treatment will be provided for the army private.

Manning, who changed her name from Bradley after her conviction, is serving a 35-year sentence at Fort Leavenworth for sending classified documents to the WikiLeaks website. She has been diagnosed with gender dysphoria, the sense of being a woman in a man's body.

Manning sought evaluation and treatment after she was sent to Fort Leavenworth last September. She is asking for hormone therapy and to be able to live as a woman.

Military doctors confirmed the gender dysphoria diagnosis and recommended a treatment plan, but she has yet to receive any, according to the ACLU.

"The continued failure to provide Ms Manning with this treatment is inconsistent with well-established medical protocols and basic constitutional principles," Chase Strangio, lawyer for the ACLU's Lesbian Gay Bisexual and Transgender Project, said.

Mr Strangio said refusing to treat Manning was "cruel and unusual punishment" and accused the US Army of withholding treatment for political reasons.

The lack of treatment puts Manning at risk for serious long-term physical and psychological harm, her advocates say.

Former intelligence analyst Manning was sentenced last year for six Espionage Act violations and 14 other offences for giving WikiLeaks more than 700,000 secret military and US State Department documents.

Follow this link:
Manning 'not receiving gender help'

NSA Spying Scandal – SPIEGEL ONLINE – Nachrichten

SPIEGEL ONLINE - July 22, 2014

Officials in Berlin were long in denial that their closest allies were spying on Germany. Now, ministries are undertaking measures to improve security and counterintelligence. They're anticipating frosty relations with the US for some time to come. more... [Comment]

German Foreign Minister Frank-Walter Steinmeier calls the downing of the Malaysian Airlines passenger jet over Ukraine "appalling" in an interview with SPIEGEL ONLINE. He also discusses the flare-up in the Middle East and US espionage in Germany. Interview Conducted by Roland Nelles and Severin Weiland more... [Comment]

Angela Merkel turns 60 this week and is celebrating the pinnacle of her political career, highly popular and uncontested in office. Still, many in her cabinet and party believe she will step down as chancellor before her current term ends. By Nikolaus Blome more... [Comment]

The latest revelations of US spying on Germany have unleashed unprecedented levels of distrust in Berlin. The government has already expelled the CIA's chief here and may soon be planning additional measures as it seeks answers from Washington. more... [Comment]

For decades, Germany's position in the West remained unquestioned. Following the NSA spying and other political scandals, many Germans want greater independence from the US. But does that mean getting closer to Moscow? By Markus Feldenkirchen, Christiane Hoffmann and Ren Pfister more... [Comment]

In what amounts to a diplomatic earthquake, Berlin has asked the country's top CIA official to leave Germany. The measures comes in response to the second allegation in a week of a German government employee spying for the US. more... [Comment]

A year after revelations of the NSA's wide scale spying activities first emerged, the arrest of an employee at the German foreign intelligence service, suspected of being a double agent, is testing the limits of Berlin's patience with Washington. By SPIEGEL Staff more... [Comment]

In an interview, Hillary Clinton discusses the growing gap between the rich and poor that threatens democracy, Americans' discontent with politics, her regrets over NSA spying on Chancellor Merkel's mobile phone and her potential presidential candidacy. Interview Conducted By Marc Hujer and Holger Stark more... [Comment]

In a SPIEGEL interview, Edward Snowden's lawyer, Jesselyn Radack, and former NSA contractor Thomas Drake discuss the reasons behind the American spying agency's obssession with collecting data. Interview Conducted By Sven Becker, Marcel Rosenbach and Jrg Schindler more... [Comment]

Read more:
NSA Spying Scandal - SPIEGEL ONLINE - Nachrichten

Edward Snowden: The Untold Story | Threat Level | WIRED

The sun sets late here in June, and outside the hotel window long shadows are beginning to envelop the city. But Snowden doesnt seem to mind that the interview is stretching into the evening hours. He is living on New York time, the better to communicate with his stateside supporters and stay on top of the American news cycle. Often, that means hearing in almost real time the harsh assessments of his critics. Indeed, its not only government apparatchiks that take issue with what Snowden did nextmoving from disaffected operative to whistle-blowing dissident. Even in the technology industry, where he has many supporters, some accuse him of playing too fast and loose with dangerous information. Netscape founder and prominent venture capitalist Marc Andreessen has told CNBC, If you looked up in the encyclopedia traitor, theres a picture of Edward Snowden. Bill Gates delivered a similarly cutting assessment in a Rolling Stone interview. I think he broke the law, so I certainly wouldnt characterize him as a hero, he said. You wont find much admiration from me.

Snowden with General Michael Hayden at a gala in 2011. Hayden, former director of the NSA and CIA, defended US surveillance policies in the wake of Snowdens revelations.

Snowden adjusts his glasses; one of the nose pads is missing, making them slip occasionally. He seems lost in thought, looking back to the moment of decision, the point of no return. The time when, thumb drive in hand, aware of the enormous potential consequences, he secretly went to work. If the government will not represent our interests, he says, his face serious, his words slow, then the public will champion its own interests. And whistle-blowing provides a traditional means to do so.

The NSA had apparently never predicted that someone like Snowden might go rogue. In any case, Snowden says he had no problem accessing, downloading, and extracting all the confidential information he liked. Except for the very highest level of classified documents, details about virtually all of the NSAs surveillance programs were accessible to anyone, employee or contractor, private or general, who had top-secret NSA clearance and access to an NSA computer.

But Snowdens access while in Hawaii went well beyond even this. I was the top technologist for the information-sharing office in Hawaii, he says. I had access to everything.

Well, almost everything. There was one key area that remained out of his reach: the NSAs aggressive cyberwarfare activity around the world. To get access to that last cache of secrets, Snowden landed a job as an infrastructure analyst with another giant NSA contractor, Booz Allen. The role gave him rare dual-hat authority covering both domestic and foreign intercept capabilitiesallowing him to trace domestic cyberattacks back to their country of origin. In his new job, Snowden became immersed in the highly secret world of planting malware into systems around the world and stealing gigabytes of foreign secrets. At the same time, he was also able to confirm, he says, that vast amounts of US communications were being intercepted and stored without a warrant, without any requirement for criminal suspicion, probable cause, or individual designation. He gathered that evidence and secreted it safely away.

By the time he went to work for Booz Allen in the spring of 2013, Snowden was thoroughly disillusioned, yet he had not lost his capacity for shock. One day an intelligence officer told him that TAOa division of NSA hackershad attempted in 2012 to remotely install an exploit in one of the core routers at a major Internet service provider in Syria, which was in the midst of a prolonged civil war. This would have given the NSA access to email and other Internet traffic from much of the country. But something went wrong, and the router was bricked insteadrendered totally inoperable. The failure of this router caused Syria to suddenly lose all connection to the Internetalthough the public didnt know that the US government was responsible. (This is the first time the claim has been revealed.)

Inside the TAO operations center, the panicked government hackers had what Snowden calls an oh shit moment. They raced to remotely repair the router, desperate to cover their tracks and prevent the Syrians from discovering the sophisticated infiltration software used to access the network. But because the router was bricked, they were powerless to fix the problem.

Fortunately for the NSA, the Syrians were apparently more focused on restoring the nations Internet than on tracking down the cause of the outage. Back at TAOs operations center, the tension was broken with a joke that contained more than a little truth: If we get caught, we can always point the finger at Israel.

Want more WIRED? Subscribe now to get 6 months for $5

Go here to read the rest:
Edward Snowden: The Untold Story | Threat Level | WIRED

Edward Snowden says he would ‘volunteer’ for prison …

Fugitive secret-leaker Edward Snowden said hed gladly volunteer to go to prison, if it meant he could return home to the U.S., according to a bombshell interview with the runaway former NSA contractor published Wednesday.

I told the government Id volunteer for prison, as long as it served the right purpose, Snowdentold WIRED magazine in an exclusive interviewfrom Moscow. I care more about the country than what happens to me.

But we cant allow the law to become a political weapon or agree to scare people away from standing up for their rights, no matter how good the deal, he said. Im not going to be part of that.

The remarks, part of far-reaching article titledThe Most Wanted Man in the World,are some of the most extensive yet made by Snowden since he fled to Russia in 2013 seeking refuge from American prosecution.

The 31-year-old North Carolina native also warned WIRED which will feature a provocative cover photo of Snowden clutching an American flag on its upcoming issue that the NSA remains plagued with flaws and is still unprepared to securely handle the sensitive personal information it allegedly uncovers on millions of U.S. citizens.

They still havent fixed their problems, Snowden said of his former employer. They still have negligent auditing, they still have things going for a walk, and they have no idea where theyre coming from and they have no idea where theyre going.

If thats the case, how can we as the public trust the NSA with all of our information, with all of our private records, the permanent record of our lives, he said, before revealing another eye-opening covert government surveillance program, called MonsterMind.

MonsterMind, Snowden explained, is a secret NSA scheme that has the capability to detect incoming cyberattacks and the ability to counterattack with no human intervention at all,WIRED writer James Bamford explained.

But Snowden warned that such a program could result in a huge unintended international incident, because many of such attacks are orchestrated by sinister hackers to come from computers in third-party countries that arent even aware of the attack.

These attacks can be spoofed, he said. You could have someone sitting in China, for example, making it appear that one of these attacks is originating in Russia. And then we end up shooting back at a Russian hospital. What happens next?

Read more here:
Edward Snowden says he would ‘volunteer’ for prison ...

Snowden says he left clues about data he stole but NSA missed them

Fugitive whistle-blower Edward Snowden said in a magazine interview published Wednesday that he is sure his former employers at the National Security Agency are tracking his communications while in exile in Russia.

In a lengthy interview with Wired magazine, the 31-year-old former NSA contractor wanted on U.S. charges of theft and espionage also said he would gladly return home and face prison for his disclosures on massive private data collection if that would serve to end what he sees as the U.S. intelligence agencies' surveillance abuses.

"I told the government Id volunteer for prison, as long as it served the right purpose, Snowden told the Wired article's writer, James Bamford, during a series of interviews at an undisclosed hotel in Moscow. "I care more about the country than what happens to me. But we cant allow the law to become a political weapon or agree to scare people away from standing up for their rights, no matter how good the deal. Im not going to be part of that.

During the interviews conducted in late spring, Snowden said he deliberately left a trail of "digital bread crumbs" so the NSA would know which secret documents and data files he had taken with him when he fled his contractor job in Hawaii 14 months ago.

He told Wired that the agency's report that he took 1.7 million files with him suggested they had missed the clues he left so NSA officials could take whatever steps were necessary to protect sources and revise operational practices.

"I figured they would have a hard time, Snowden said of his evidence trail. "I didnt figure they would be completely incapable.

Snowden told Bamford that the final straw for him was the NSA's MonsterMind operation, a malware-detecting program that can retaliate against the source of infection without any human involvement in the decision. The source of cyber attacks can be disguised, he noted, opening the possibility of striking back at an innocent target and provoking confrontation.

Fellow intelligence agency employees had become inured to the wide-scale intrusions on private communication by the agency, Snowden said, a jaded indifference he didn't want to acquire.

"Its like the boiling frog," Snowden told the magazine. "You get exposed to a little bit of evil, a little bit of rule-breaking, a little bit of dishonesty, a little bit of deceptiveness, a little bit of disservice to the public interest, and you can brush it off, you can come to justify it. But if you do that, it creates a slippery slope that just increases over time, and by the time youve been in 15 years, 20 years, 25 years, youve seen it all and it doesnt shock you."

Snowden said he left when he did and disclosed the surveillance excesses "before he too was boiled alive," Bamford wrote.

See original here:
Snowden says he left clues about data he stole but NSA missed them

Snowden leaks show that terrorists are JUST LIKE US

Recommendations for simplifying OS migration

NSA whistleblower Edward Snowden's media allies have launched a counteroffensive against allegations by intelligence agencies that terrorists have upped their game in cryptography as a result of his leaks about NSA spying.

Glenn Greenwald's The Intercept published leaked GCHQ mobile phone OPSEC guidance from 2010 alongside excerpts from a comparable jihadist handbook from 2003 to argue that terrorist groups were focused on mobile phone spying risks years before the Snowden leaks began last year.

"So sophisticated is the 10-year-old 'Jihadist Manual' that, in many sections, it is virtually identical to the GCHQs own manual, developed years later (in 2010), for instructing its operatives how to keep their communications secure," The Intercept argues.

Greenwald's piece attempts to rubbish a recent NPR Morning Edition radio report suggesting that the Snowden revelations harmed national security and allowed terrorists to develop countermeasures to state surveillance. NPR used research from web intelligence and predictive analytics firm Recorded Future to back up this accusation, which has repeatedly been aired by everyone from Sir Iain Lobban, director of Britain's GCHQ spy agency, who did so last year in front of a parliamentary committee, to former NSA General Counsel Stewart Baker earlier this month (here).*

"Following the June 2013 Edward Snowden leaks, we observe an increased pace of innovation, specifically new competing jihadist platforms and three major new encryption tools from three different organizations GIMF, Al-Fajr Technical Committee, and ISIS within a three to five-month time frame of the leaks," Recorded Future states.

NPR failed to point out that financial backers of Recorded Future include In-Q-Tel, the CIAs investment arm. Mario Vuksan, chief exec of ReversingLabs, a cybersecurity expert who worked on Recorded Future's report, entered into a "strategic partnership" In-Q-Tel two years ago.

"Beyond all these CIA connections, the conclusion touted in the NPR reportthat al-Qaeda developed more sophisticated encryption techniques due to the Snowden reportingis dubious in the extreme. It is also undercut by documents contained in the Snowden archive," The Intercept argues.

Recorded Future subsequently claimed that terrorists were turning to "off the shelf" methods of cryptography.

Noted cryptographer Bruce Schneier maintains that the changes terrorists appear to be making will, if anything, make the counter-terror role of signals intelligence agencies such as the NSA and GCHQ easier rather than harder.

Original post:
Snowden leaks show that terrorists are JUST LIKE US