Snowden defends mega spy blab: ‘Public affairs have to be …

Gartner critical capabilities for enterprise endpoint backup

Master spy blabbermouth Edward Snowden defended his NSA whistleblowing actions to the Council of Europe today.

He told the human rights' parliamentary assembly in Strasbourg, via video link from Moscow, that he had a "personal duty to country, government and family" to reveal details about snooping methods employed by the US and British governments.

"Public affairs have to be known by the public," Snowden said, in justifying his decision to blow the whistle on the National Security Agency. "When citizens are reduced to the status of subjects, where we're not active participants ... that diminishes us as a free people, as a society and as a culture."

The one-time NSA sysadmin added that he was "willing to pay the price" for leaking that information even if it did damage national security interests.

"I was aware and I did my best to ensure that balance would be enforced," he told the CoE. He claimed that no specific damage and in fact occurred as a result of his actions. It "may have caused some good," he argued.

Snowden explained to the committee during his testimony that he had worked with journalists to help ensure that the information would be responsibly reported.

"That was why I didn't publish it myself. I chose not to, instead I worked with the press," he said.

Snowden added that he had been in the best position, having worked in signals intelligence and electronic spying at the NSA, to understand the material that was leaked to the Guardian and the Washington Post.

"I left behind notes, put them in context, organised them and categorised them [for journalists]," said Snowden.

Continued here:
Snowden defends mega spy blab: 'Public affairs have to be ...

Snowden defends mega spy blab: ‘Public affairs have to be known by the public’

Gartner critical capabilities for enterprise endpoint backup

Master spy blabbermouth Edward Snowden defended his NSA whistleblowing actions to the Council of Europe today.

He told the human rights' parliamentary assembly in Strasbourg, via video link from Moscow, that he had a "personal duty to country, government and family" to reveal details about snooping methods employed by the US and British governments.

"Public affairs have to be known by the public," Snowden said, in justifying his decision to blow the whistle on the National Security Agency. "When citizens are reduced to the status of subjects, where we're not active participants ... that diminishes us as a free people, as a society and as a culture."

The one-time NSA sysadmin added that he was "willing to pay the price" for leaking that information even if it did damage national security interests.

"I was aware and I did my best to ensure that balance would be enforced," he told the CoE. He claimed that no specific damage and in fact occurred as a result of his actions. It "may have caused some good," he argued.

Snowden explained to the committee during his testimony that he had worked with journalists to help ensure that the information would be responsibly reported.

"That was why I didn't publish it myself. I chose not to, instead I worked with the press," he said.

Snowden added that he had been in the best position, having worked in signals intelligence and electronic spying at the NSA, to understand the material that was leaked to the Guardian and the Washington Post.

"I left behind notes, put them in context, organised them and categorised them [for journalists]," said Snowden.

Read the original post:
Snowden defends mega spy blab: 'Public affairs have to be known by the public'

Robot Edward Snowden Rescued a Reporter When She Had a Seizure

Hero/traitor/cyberman Edward Snowden is physically still stuck in Russia, but he gives talks and interviews in the U.S. via a telepresence robot that shows his face in real time and allows him to see his interviewers. And help rescue them during seizures.

As part of a longer piece on Snowdenbot and his human handlers, Tagesspiegel reporter Julia Prosinger recounted an incident at the ACLU offices in New York City when her epilepsy triggered and Snowden, Skyping in from Russia, knew exactly what to do.

When he saw Prosinger about to faint, he quickly told his ACLU lawyer, Ben Wizner, to catch her before she could hit her head on the metal filing cabinets.

"The first fits are always the worst," he said when she came to.

Prosinger writes:

I am lucky: Snowden is not only a patriot or traitor, he is also an epileptic. He instantly recognised what was happening to me. He tells me that he was only diagnosed when he was 28 years old. When he fled the US a little more than a year ago, he told his employer that he had to go away for a few weeks for treatment for his epilepsy. Then Snowden apologises for making me look at the flickering screen, it had triggered the fit, he says.

Snowden also made sure that Wizner put the reporter in the recovery position and brought her a glass of juice.

"For a moment," Prosinger wrote, "Edward Snowden became three-dimensional."

[H/T Daily Dot, Photo: TED]

Read the original:
Robot Edward Snowden Rescued a Reporter When She Had a Seizure

Hackers Reverse-Engineer NSA Spying Tools Using Snowden Leaks

Besides exposing all of the not-so-good things the NSA and other clandestine agencies around the world were up to, the documents leaked by Edward Snowden have allowed hackers to reverse-engineer some of the tools the NSA has used to spy on us.

Along with the nefarious details of our constant surveillance, the NSA's Advanced Network Technology cataloga list of some of the gadgets NSA personnel can use to spy on computers and phoneswas also included in the leaked documents.

A team of security researchers led by Michael Ossmann have used the information to reconstruct two surveillance devices used by the NSA. These devices, called "retro reflectors," are tiny radio-based wireless data transmitters, which, when placed on a computer or keyboard, allow information to be gathered (like keystrokes and on-screen images) even when that device is not connected to the internet.

Ossmann says he will present his findings at Defcon, and show others how to protect themselves from future NSA hacksif that's even possible. [New Scientist via Engadget]

Read this article:
Hackers Reverse-Engineer NSA Spying Tools Using Snowden Leaks

HP Atalla Delivers Cloud Encryption Tech

The HP Atalla Cloud Encryption technology does not allow an attacker that takes a snapshot of a user session to be able to capture the user's encryption key, he said.

Managing data encryption as it moves across an enterprise and throughout the lifecycle is also a challenge that HP is aiming to tackle. The new HP Atalla Information Protection and Control (IPC) applies and manages protection for data as it moves around an organization, Biketi said.

The Atalla business unit, one of HP's oldest security businesses, got its start in 1973 as a security vendor for financial institutions. It was acquired in 1987 by Tandem Computers, which was acquired in 1997 by Compaq, which HP bought in 2002. Atalla technology is still widely used in financial services.

Sean Michael Kerner is a senior editor at InternetNews.com. Follow him on Twitter @TechJournalist.

View original post here:
HP Atalla Delivers Cloud Encryption Tech

Cisco open-sources experimental small message encryption for cloud, IoT

Networking giant Cisco is open-sourcing an experimental cipher that could help preserve privacy in the cloud and the Internet of Things.

Cisco software engineer Sashank Dara describes the cipher as FNR (Flexible Naor and Reingold) and says that its a variant on the work of Naor and Reingold from a paper published in the Journal of Cryptology. That permits the encryption of small messages without a great amount of bloat.

Common ciphers used in todays encryption tend to generate fixed width messages. For example, AES has a fixed block lengthfrom 128, 192, or 256 bitsand any length of data smaller than that automatically gets padded to fit the full width.

For most situations where encryption is usedsuch as person-to-person communications or the exchange of large amounts of datathis isnt that big of a problem since these examples send a lot of data with a low number of messages. However, in a cloud or Internet of Things situation a lot of small messages might be exchanged rapidly in order to keep real-time data flowing.

Dara adds that the system would be useful for exchanging small chunks of data such as IPv4 addresses, MAC addresses, arbitrary strings, etc. while preserving their input lengths. This way FNR could also be extremely useful for adapting encryption to legacy databases that require a set column length to store data.

As for Daras example for the cloud: Usethe FNR cipher in whats called ECB (electronic codebook) mode, which does not give strong security to the underlying data but does deliver a level of anonymity to ingested messages. He suggests that such an application would be good for cloud-based monitoring of a system that also needs to preserve the data anonymity of the monitored subject. Its not always necessary to know what a system is doing to gauge its overall health and, given that a logging service could also be hacked, anonymizing data would resist further intrusion.

The code has been open-sourced under the LPGLv2 license and is available at github. Alongside the code Cisco provides a demonstration application that encrypts IPv4 addresses as an example. The specifications also caution that this code is experimental and is not ready for production systems.

This sort of cipher could have implications for any system that needs to exchange lots of messages over thin bandwidth that have a high chance of being intercepted. Dara suggests that cloud is a potential use, but another space that could use such a cipher is Internet of Things applications.

Low-power wireless sensors, common to IoT solutions, need to make the best of their power and bandwidth when sending information back to receivers and at the same time open up clients to potential privacy breaches. Being able to encrypt smaller bursts of data would open up new avenues for developing private messaging for a large number of industries.

The USPS recently started seeking solutions from IoT vendors and one of the primary concerns about any solution included keeping customer data private. To maintain privacy for customers of any IoT endeavor would need to include everything from databases and cloud (the datacenter where a lot of encryption is already used) as well as from parcels and trucks (the IoT side that would benefit from FNR.)

More here:
Cisco open-sources experimental small message encryption for cloud, IoT

W3C Open Source Software – World Wide Web Consortium

About W3C Software

The natural complement to W3C specifications is running code. Implementation and testing is an essential part of specification development and releasing the code promotes exchange of ideas in the developer community.

All W3C software is certified Open Source/Free Software. (see the license)

12 March 2014: A bug fix release: version6.6 of the HTML/XML utilities was distributed with an empty header file, which meant it couldn't compile on platforms that needed that file. See the ChangeLog for details. (News Archive)

12 August 2013: Version0.9 of xmptool fixes a bug that made the program crash (reporting a failed assertion) if there were two properties in a row without a value. A property without a value is, e.g.:

(News Archive)

29 February 2012: Version1.1 fixes a segmentation fault in eotinfo when it is presented with a file that cannot be opened. (News Archive)

18 January 2012: This release fixes some bugs and particularly the PUT SSL bug for some large files on Windows and Linux. See the changelog for more details. Donwload Amaya. (News Archive)

News Archives: 2014, 2013, 2012, 2011, 2010, 2009, 2008, 2007, 2006, 2005, 2004, 2003.

Excerpt from:
W3C Open Source Software - World Wide Web Consortium

Book Review: Security Without Obscurity

benrothke (2577567) writes Having worked at the same consulting firm and also on a project with author J.J. Stapleton (full disclosure); I knew he was a really smart guy. In Security without Obscurity: A Guide to Confidentiality, Authentication and Integrity, Stapleton shows how broad his security knowledge is to the world. When it comes to the world of encryption and cryptography, Stapleton has had his hand in a lot of different cryptographic pies. He has been part of cryptographic accreditation committees for many different standard bodies across the globe. Keep reading for the rest of Ben's review.The premise of the author and the need for the book is that the traditional information security CIA triad (confidentiality, integrity, availability) has led to the situation where authentication has to a large part gotten short shrift. This is a significant issue since much of information security is built around the need for strong and effective authentication. Without effective authentication, networks and data are at direct risk for compromise.

The topic itself is not exactly compelling (that is, unless you like to read standards such as ANSI X9.42-2003: Public Key Cryptography for the Financial Services Industry: Agreement of Symmetric Keys Using Discrete Logarithm Cryptography, ISO/IEC 9798-1:2010: Information technology Security techniques Entity authentication,etc.), so the book is more of a detailed technical reference. Those looking for a highly technical overview, interoperability guidance, and overall reference will find the book most rewarding.

For those who don't have a general background on the topic; it may be a book too deep and technical for those looking for something more in line of a CISSP preparation guide.

For those that want to know the deep underpinnings of how encryption algorithms work; they can simply read the RFC's and standards themselves. What the book brings to the table are details about how to effectively implement the standards and algorithms in the enterprise; be it in applications, policies; or the specific procedures to meet compliance and standards requirements. And that is where Stapleton's many decades of experience provide significant and inestimable value.

There are many reasons why authentication systems fail and many times it is due to interoperability issues. Stapleton details how to ensure to minimize those faults in order to achieve seamless authentication across multiple technologies and operating systems.

The 7 chapters cover a dense amount of information around the 3 core topics. The book is for the reader with a solid technical background. While it may be listed as an exploratory text, it is not like a For Dummies title.

As per its title, it covers confidentiality, authentication and integrity; in addition to other fundamental topics of non-repudiation, privacy and key management.

One of the ways Stapleton brings his broad experience to the book is in the many areas where he compares different types of cryptosystems, technologies and algorithms. This enables the reader to understand what the appropriate type of authentication is most beneficial for the specific requirement.

For example, in chapter 7, the book provides a really good comparison and summary of different cryptographic modules, including how they are linked to various standards from NIST, NSA, ANSI and ISO. It does the same for a comparison of cryptographic key strengths against various algorithms.

An interesting observation the book makes when discussing the DES encryption algorithm, is that all of the talk of the NSA placing backdoors in it are essentially false. To date, no known flaws have been found against DES, and that after being around for over 30 years, the only attack against DES is an exhaustive key attack. This type of attack is where an adversary has to try each of the possible 72 quadrillion key (256permutations as the key is 56 bits long) until the right key is discovered.

See the rest here:
Book Review: Security Without Obscurity

Watch What will happen if Assange leaves Ecuador’s Embassy… – Video


Watch What will happen if Assange leaves Ecuador #39;s Embassy...
It #39;s been two years since Julian Assange #39;s gained asylum in the Ecuadorian embassy in London. During the time of his refuge there he #39;s grown a beard, given a couple of balcony speeches, and...

By: IN THE NOW

Continue reading here:
Watch What will happen if Assange leaves Ecuador's Embassy... - Video