Bradley Manning to begin gender treatment while in military custody

WASHINGTON The Bureau of Prisons has rejected the Armys request to accept the transfer of national security leaker Pvt. Chelsea Manning from the military prison at Fort Leavenworth, Kansas, to a civilian facility where she could get better treatment for her gender-identify condition. The military will instead begin the initial treatment for her.

Defense Secretary Chuck Hagel has approved the Armys recommendation to keep Manning in military custody and start a rudimentary level of gender treatment, a defense official said Thursday. The initial gender treatments could include allowing Manning to wear some female undergarments and also possibly provide some hormone treatments.

SEE ALSO: Calif. gay pride event bans National Guard, honors Chelsea Manning

The decision raises a number of questions about what level of treatment Manning will be able to get and at what point the private would have to be transferred from the all-male prison to a female facility.

Manning has been diagnosed with gender dysphoria, the sense of being a woman in a mans body. Civilian prisons can provide treatment, and the Defense Department has argued repeatedly that it doesnt have the medical expertise needed. As a result, the Army tried to work out a plan to transfer Manning to a federal prison.

Officials said Thursday that federal authorities refused the proposal. Officials spoke on condition of anonymity because they were not authorized to discuss the matter publicly by name.

Mannings lawyer, David Coombs, told The Associated Press on Thursday that he was encouraged that the Army will begin medical treatment.

It has been almost a year since we first filed our request for adequate medical care, Coombs said. I am hopeful that when the Army says it will start a rudimentary level of treatment that this means hormone replacement therapy.

If hormone therapy is not provided, he said he will have to take appropriate legal action to ensure Chelsea finally receives the medical treatment she deserves and is entitled to under the law.

In May Coombs had also contended that civilian prisons were not as safe as military facilities.

Original post:
Bradley Manning to begin gender treatment while in military custody

Chelsea Manning to undergo gender treatment in jail

FORT LEAVENWORTH, Kan., July 17 (UPI) --Chelsea Manning, the Army private once known as Bradley Manning, is to start undergoing gender dysphoria treatment in prison, U.S. defense officials said.

Manning is currently serving a 35-year sentence at a military prison at Fort Leavenworth, Kan., for her role in the largest intelligence leak in United States history.

The day after she was sentenced, she announced she had gender-dissociation and was granted permission to receive treatment for the early stages of gender reassignment.

She is allowed to wear women's underclothes and shoes, and she'll start undergoing psychiatric and psychological counseling, two senior U.S. defense officials said Thursday.

2014 United Press International, Inc. All Rights Reserved. Any reproduction, republication, redistribution and/or modification of any UPI content is expressly prohibited without UPI's prior written consent.

Recommended Stories

Chelsea Manning accuses U.S. of lying about Iraq, controlling press

Jun 16

Pentagon may move Chelsea Manning to civilian prison for hormone treatment

May 14

Read the original post:
Chelsea Manning to undergo gender treatment in jail

NSA whistleblower Edward Snowden says UK surveillance law "defies belief" – Video


NSA whistleblower Edward Snowden says UK surveillance law "defies belief"
PROVIDED BY http://CNNNEXT.COM The NSA whistleblower Edward Snowden has condemned the new surveillance bill being pushed through the UK #39;s parliament this week.

By: giovanni betances

The rest is here:
NSA whistleblower Edward Snowden says UK surveillance law "defies belief" - Video

Edward Snowden: ‘If I End Up in Chains in Guantanamo, I Can Live With That’

Edward Snowden during his interview (Photo: Alan Rusbridger for the Guardian)NSA whistleblower Edward Snowden gave a video interview to the Guardian this week to discuss the state of internet privacy, the changing landscape of investigative journalism, and what his life has been like since he released the classified documents last year that exposed the U.S. government's global surveillance program. In one of the more poignant moments of the interview, Snowden spoke thoughtfully and bluntly about what his future might be if he leaves asylum in Russia and returns home to the U.S.

"If I end up in chains in Guantanamo," Snowden told his interviewers, "I can live with that."

Snowden also called on lawyers, journalists, doctors, and others who handle sensitive information to use alternative "zero-knowledge" security software and search engines that would protect confidentiality of sources and clients online better than Skype, Dropbox, or Google, for example. In some cases, he said, the big companies are actively anti-privacy, noting that Dropbox just added surveillance advocate Condoleezza Rice to their board of directors and calling them a "wannabe PRISM partner."

Technology can be useful for privacy, he said, as long as we don't "sleepwalk" into accepting new apps. "We shouldn't trust them without verifying what their activities are, how they're using our data, and deciding for ourselves whether it's appropriate where they draw the lines," he said.

Google and Skype have been useful for hosting public chats and interviews, Snowden said, but he would never rely on them in his personal life.

Currently, with a lack of reliable privacy software and the consequences of unlimited government power, journalism has become "immeasurably harder," Snowden said. The first contact with a source, "before encrypted communications are established, is enough to give it all away." He said new training for professionals who handle private information is necessary to ensure safety for the "average member of our society," particularly as technical literacy has become "a rare and precious resource."

There should be no distinction between digital information and printed or spoken information, Snowden said. "If we confess something to our priest inside a church, that would be private, but is it any different if we send our pastor a private email confessing a crisis that we have in our life?"

Before leaking the NSA documents to the public, Snowden said he first tried to address the matters that concerned him internally, asking colleagues and supervisors about the more nefarious elements of the program.

"I said, 'What do you think about this? Isn't this unusual? How can we be doing this? Isn't this unconstitutional? Isn't this a violation of rights?'" he recalled.

He was particularly worried about the fact that the many of the NSA's invasive systems were used for fun. Snowden described a troubling work environment where unlimited access to private information was regularly taken advantage of by individual employees. If the surveillance program happened to pick up a person's nude photographs, for example, co-workers would distribute them around the office, where a culture of lax supervision meant that no one was ever held responsible.

More:
Edward Snowden: 'If I End Up in Chains in Guantanamo, I Can Live With That'

Snowden: Facebook is allowing the government to see your messages

In a lengthy interview with the Guardian, NSA whistle blower Edward Snowden spoke with editor Alan Rusbridger about his extraordinary rise to infamy. Currently in exile in Russia, he talked about how he disseminated documents about the activities of the NSA to numerous countries: "Once you start splitting them over jurisdictions and things like that it becomes much more difficult to subvert their intentions. Nobody could stop it". He remains defiant. He may be an outlaw but "its been vindicating to see the reaction from lawmakers, judges, public bodies around the world, civil liberties activists who have said its true that we have a right to at least know the broad outlines of what our governments doing in our name and what its doing against us".

He explains how during his time working as an NSA analyst, he learned about previous surveillance programs run under George W Bush. Programs that were deemed unconstitutional and, having been closed, forced the US government to assume new executive powers that were then used "against the citizenry of its own country". For Snowden the power of the state is worrying:

So when we think about the nation we think about our country, we think about our home, we think about the people living in it and we think about its values. When we think about the state, were thinking about an institution. The distinction there is that we now have an institution that has become so powerful it feels comfortable granting itself new authorities, without the involvement of the country, without the involvement of the public, without the full involvement of all of our elected representatives and without the full involvement of open courts, and thats a terrifying thing.

The ever shrinking costs of technology is cited as a reason to further fear the surveillance programs. When it becomes cheaper to store data than it is to sift through it and work out what is actually valuable, it is held onto for a long time. The NSA, for instance, is able to hang onto information about individuals for five years before having to apply for an extension. While there has been an outpouring of global disgust at Snowden's revelations, he feels the backlash against the government would be even stronger if the impact of surveillance programs were better understood.

You have a tremendous population of young military enlisted individuals who, while thats not a discredit to them, may not have had the number of life experiences to have felt the sense of being violated. And if we havent been exposed to the dangers and risks of having our privacy violated, having our liberties violated, how can we expect these individuals to reasonably represent our own interests in exercising those authorities?

It has long been alleged that the internet companies who have decried the NSA have actually been willing partners. Snowden says that the financial arrangements that exist between surveillance agencies and internet and telecommunication companies is kept entirely secret -- "at a much greater level than for example the names of human agents operating undercover, embedded with terrorist groups".

Talk about the NSA has become so commonplace that it is easy to forget the huge numbers of entirely innocent people whose privacy has been invaded in recent years -- and Snowden insists that the big names have been (maybe still are being) fully compliant.

Agencies are provided with direct access to the contents of the server at these private companies. What it means is Facebook is allowing the government to get copies of your Facebook messages, your Skype conversations, your Gmail mailboxes, things like that.

It seems there is not really a need to be concerned that the government is hacking into private accounts, rather than access is being openly provided on demand.

Link:
Snowden: Facebook is allowing the government to see your messages

Snowden Says Drop Dropbox, Use SpiderOak

Edward Snowden singled out cloud-storage provider Dropbox for lacking security measures he says would protect users from government snooping. He then plugged smaller competitor SpiderOak, which he says does.

In aninterview with The Guardian published Thursday afternoon, the former National Security Agency contractor said Dropbox is hostile to privacy because it controls the encryption keys, making it capable of handing over user data stored on its servers to the government.

He also fixated on the startups hiring of former Secretary of State Condoleezza Rice as a board member, though its not clear she has any role in shaping the companys privacy policy.

Safeguarding our users information is a top priority at Dropbox, a Dropbox spokeswoman said in an email. Weve made a commitment in our privacy policy to resist broad government requests, and are fighting to change laws so that fundamental privacy protections are in place for users around the world.

But Snowden said users should instead use SpiderOak, a storage startup which takes extra security measures such as not storing users passwords. That makes it difficult for the government to access any user data, even with a court order.

More than a year after he leaked classified documents on the U.S. National Security Agencys programs to monitor phone calls, email and other communications, Snowden is urging tech companies to adopt stronger methods of privacy protection. Some of the documents he leaked helped sway Internet giants like Google and Yahoo to encrypt data passing between their servers and sparked a wave of startup innovation in the field of secure mobile messaging.

In cloud storage, as with other online services, adding greater privacy requires tradeoffs that could compromise ease of use or commercial viability for tech companies focused on making money.

Both Dropbox and its storage rival Box already encrypt data in transit between servers and while its at rest on their servers. But neither goes the extra step of SpiderOak, one of a handful of companies pitching cloud storage that is subpoena-proof, meant as a deterrent against the National Security Agency and other spy teams.

Heres how it works: SpiderOak has users encrypt data on their machines before they send it to the companys servers. The company maintains it keeps no readable version of users passwords or data.

The plus side: If a government asks SpiderOak for your data, all it can give them is a scramble of numbers and letters. The down side: If you forget your password, SpiderOak has no way of resetting it for you. (Users are allowed to leave hints with the company.)

Read more:
Snowden Says Drop Dropbox, Use SpiderOak

Net neutrality a key battleground in growing fight over encryption, activists say

Plans to favor some Internet packets over others threaten consumers hard-won right to use encryption, a digital privacy advocate says.

Activists and tech companies fended off efforts in the U.S. in the 1990s to ban Internet encryption or give the government ways around it, but an even bigger battle over cryptography is brewing now, according to Sascha Meinrath, director of X-Lab, a digital civil-rights think tank launched earlier this year. One of the most contested issues in that battle will be net neutrality, Meinrath said.

The new fight will be even more fierce than the last one, because Internet service providers now see dollars and cents in the details of packets traversing their networks. They want to charge content providers for priority delivery of their packets across the network, something that a controversial Federal Communications Commission proposal could allow under certain conditions. Friday is the filing deadline for the first round of public comments on that plan.

Encrypted traffic cant be given special treatment because it cant be identified, Meinrath said. That could eliminate a major revenue source for ISPs, giving them a strong reason to oppose the use of encrypted services and potentially an indirect way to degrade their performance, he said. Meinrath laid out parts of this argument in a recent essay in the June issue of Critical Studies in Media Communication, called Crypto War II and written with tech policy activist Sean Vitka.

The U.S. government once sought to keep the countrys cryptographic technology to itself or to hold onto the keys to all encrypted data. Opponents won out and opened the door to encrypted services people use every day, such as shopping and email. But the ability to use encryption is under fire both from government and potentially from ISPs new business models, the essay said. The looming cryptography debate will also involve several other hot topics, including government surveillance spreading from networks into individual devices and the privacy of data generated by the Internet of Things, the authors wrote.

Net neutrality could be important to the use of encryption in at least two ways, according to Meinrath. For one thing, if broadband capacity is scarce on a busy service-provider network, and some traffic gets paid priority, then other traffic could suffer. Encrypted traffic is likely to get the short end of that deal. For example, a streaming video service that was encrypted and couldnt be prioritized might stall or have longer buffer times if it had to share a crowded pipe with favored video streams.

In addition, ISPs might start to block encrypted traffic in order to maintain their business model. For example, if carriers can discriminate among applications, they can make some exempt from a users data consumption cap. AT&T has already announced plans for such a service, called Sponsored Data, on its cellular data network. Among other things, this could allow content providers to cover the cost of delivering their data to consumers, making their content more attractive.

That concept may get more complicated if encryption comes into play, Meinrath said. For example, in some developing countries, Facebook and mobile operators together are offering cheap mobile data deals that only cover Facebook. There are encrypted services that can tunnel through Facebook to give users access to other service, but carriers will want to know if anyone is circumventing the exclusive Facebook deal.

The problem is that providers are going to say, We need to be able to know that youre not doing that, therefore we need to be able to ensure that you are not encrypting, he said.

All this doesnt necessarily spell doom for your favorite banking, health insurance or video chat sites. The implications are deeper and longer term, Meinrath said.

See the original post here:
Net neutrality a key battleground in growing fight over encryption, activists say

Confidesk Makes Public Key Encryption Accessible to Everyday Users

(PRWEB) July 17, 2014

Confidesk has created two new tools that help its users safely and easily manage public key encryptions. The service is provided as part of a comprehensive suite of encryption tools, available on 5 platforms, including desktop and mobile devices.

The new feature-set allows users to individually generate or import encryption keys to their Confidesk accounts, easily transfer them to multiple devices, and use them for client side encryption. If a user configures a device, it can act as a secure extension to the users account, enabling the full protection of Confidesks platform to be accessible on-demand.

A single subscription allows users up to 6 accounts, with any changes made on one device automatically and securely updated across all approved devices. The service supports IOS, Android, Windows desktop, OSX and Linux through Confidesk's own applications.

Client Side Encryption is extremely important for any user working with personal, private and sensitive data, says Kyle Greenfield, Director of Marketing. The service helps minimize exposure to data leakage by encrypting files locally, while maintaining the accessibility and virtualization our users expect.

The focus of this release is to provide a user-friendly approach to encryption. The service provides real-time notifications when it is encrypting or decrypting your data, allowing the user to see first-hand when their data is transferred securely.

About Confidesk:

Confidesk AG offers affordable state-of-the-art encryption packages for individual and business clients. Headquartered in Switzerland to ensure the highest standard of individual privacy, Confidesk offers a suite of mobile and desktop applications for local encryption and secure mail and file storage. Visit http://www.confidesk.com for more information.

Read the original post:
Confidesk Makes Public Key Encryption Accessible to Everyday Users

Net neutrality becomes a key battleground in encryption fight

News

By Stephen Lawson

July 18, 2014 01:42 PM ET

IDG News Service - Plans to favor some Internet packets over others threaten consumers' hard-won right to use encryption, a digital privacy advocate says.

Activists and tech companies fended off efforts in the U.S. in the 1990s to ban Internet encryption or give the government ways around it, but an even bigger battle over cryptography is brewing now, according to Sascha Meinrath, director of X-Lab, a digital civil-rights think tank launched earlier this year. One of the most contested issues in that battle will be net neutrality, Meinrath said.

The new fight will be even more fierce than the last one, because Internet service providers now see dollars and cents in the details of packets traversing their networks. They want to charge content providers for priority delivery of their packets across the network, something that a controversial Federal Communications Commission proposal could allow under certain conditions. Friday is the filing deadline for the first round of public comments on that plan.

Encrypted traffic can't be given special treatment because it can't be identified, Meinrath said. That could eliminate a major revenue source for ISPs, giving them a strong reason to oppose the use of encrypted services and potentially an indirect way to degrade their performance, he said. Meinrath laid out parts of this argument in a recent essay in the June issue of Critical Studies in Media Communication, called "Crypto War II" and written with tech policy activist Sean Vitka.

The U.S. government once sought to keep the country's cryptographic technology to itself or to hold onto the keys to all encrypted data. Opponents won out and opened the door to encrypted services people use every day, such as shopping and email. But the ability to use encryption is under fire both from government and potentially from ISPs' new business models, the essay said. The looming cryptography debate will also involve several other hot topics, including government surveillance spreading from networks into individual devices and the privacy of data generated by the "Internet of Things," the authors wrote.

Net neutrality could be important to the use of encryption in at least two ways, according to Meinrath. For one thing, if broadband capacity is scarce on a busy service-provider network, and some traffic gets paid priority, then other traffic could suffer. Encrypted traffic is likely to get the short end of that deal. For example, a streaming video service that was encrypted and couldn't be prioritized might stall or have longer buffer times if it had to share a crowded pipe with favored video streams.

In addition, ISPs might start to block encrypted traffic in order to maintain their business model. For example, if carriers can discriminate among applications, they can make some exempt from a user's data consumption cap. AT&T has already announced plans for such a service, called Sponsored Data, on its cellular data network. Among other things, this could allow content providers to cover the cost of delivering their data to consumers, making their content more attractive.

Follow this link:
Net neutrality becomes a key battleground in encryption fight