House Votes To Cut Key Pursestrings For NSA Surveillance …

The House of Representatives may have only passed a puny attempt to reform the NSAs surveillance activities last month. But on Thursday evening it swung back with a surprising attack on a key element of the agencys spying programs: their funding.

In a late night session, the House of Representatives voted 293 to 123 to pass an amendment to a Department of Defense appropriations bill that would cut off all funds for two of the agencys most embattled activities: First, using the 702 provision of the Foreign Intelligence Surveillance Act to perform searches of collected surveillance data that target Americans, and second, asking hardware markers and software developers to build backdoors into their tools designed to give the agency access to users communications. On that second count, the amendment specifically forbids funding for any agency attempt to mandate or request that a person redesign its product or service to facilitateelectronic surveillance.

Both of those funding bans represent a clear reaction against behavior revealed from the leaks of Edward Snowden, which have shown over the past year that the NSA subverted cryptography standards, diverted hardware shipments to plant bugs in products, and found other ways to gather raw communication data from Silicon Valley firms like Google, Facebook, Microsoft, Apple, and others.

Though the amendments bans still havent been mirrored in the Senate, the House vote nonetheless sends an unambiguous statement that theres political will to do something about the issue of unchecked NSA spying, says Parker Higgins, an activist at the Electronic Frontier Foundation, which supported a campaign to persuade citizens to call their congressman in support of the amendment. This is not a trivial thing. These surveillance programs need money to survive. Without it there are hard questions ahead for the NSA.

The bill also represents a striking shift from the USA Freedom bill, intended to reform NSA mass surveillance, that passed the house last month in a watered-down form that disappointed privacy advocates. In part, the contrast is a result of political procedure: Much of the Freedom bills weakening took place in the Judiciary and Intelligence committees, says Julian Sanchez, a fellow at the Cato Institute who follows surveillance policy. As an amendment to an appropriations bill, he says, the defunding legislation instead escaped thatdouble gauntlet of lobbying. In particular, it didnt have to go through the Intelligence Committee, which is basically a proxy for the intelligence community, says Sanchez.

In fact, the toothless surveillance reform bill may have directly inspired Thursday nights landslide vote by not going far enough to satisfy legislators seeking to curtail the NSAs most controversial activities. Due to the weakening of that bills anti-spying provisions in committee, many House members never had a chance to show their intention to more drastically limit the NSAs spying.

Even if the amendment becomes law, it still wouldnt necessarily end all federally-mandated backdoors in hardware and software, cautions Matt Blaze, a computer science professor and cryptographer at the University of Pennsylvania. According to his reading of the amendment, it wouldnt cover the FBI, for instance. The goal is clearly important. I worry that the scopeis limited, he says. Even when the NSA and CIA dont request or put pressure on vendors to incorporate backdoors, other agencies, like FBI, may be in the same business.

Still, the passage of the amendment marks a serious shift in the political landscape following a year of Snowdens spying disclosures. A similar amendment put to a vote last year came up seven votes short of passing. The lopsided tally this year shows that reining in the NSA has become a popular political cause that crosses party lines, says the EFFs Higgins. Last year, legislators who voted in favor of this amendment were sticking their necks out, he says. Now the status quo has changed. Theres a sense that if youre not doing something about this problem, its going to be a black mark on your record.

View post:
House Votes To Cut Key Pursestrings For NSA Surveillance ...

Another US Spying Problem in Latin America: The US Drug …

Relations between the U.S. and Brazil have been in the doghouse since documents leaked by former NSA contractor Edward Snowden showed that Brazil was one of the biggest targets of NSA spying. The abuses included mass collection of millions of Brazilians' email and phone records, spying on President Dilma Rousseff's personal communications, and targeting the computer systems of Brazil's Petrobras -- the latter with obvious commercial benefits for U.S. corporations.

Dilma summed it all up rather succinctly in a blunt speech at the United Nations last September, denouncing "a situation of grave violation of human rights and of civil liberties; of invasion and capture of confidential information concerning corporate activities, and especially of disrespect to national sovereignty."

But now, thanks to additional leaked documents described by Ryan Devereaux, Glenn Greenwald, and Laura Poitras in The Intercept, we find there is another U.S. agency working with the NSA that poses similar threats: the U.S. Drug Enforcement Agency (DEA). According to the documents, there is a "two-way information sharing relationship" between the DEA and NSA: it's not just the NSA helping the DEA catch drug traffickers, but also the DEA helping NSA with its non-drug-related spying programs.

From the Intercept: "DEA is actually one of the biggest spy operations there is," says Finn Selander, a former DEA special agent, "Our mandate is not just drugs. We collect intelligence."

Selander added that "countries let us in because they don't view us, really, as a spy organization."

This is potentially an even bigger breach of diplomatic trust than the NSA spying that Dilma denounced at the U.N. Governments allow the DEA access to military, police and intelligence resources -- sometimes including phone-tapping -- as part of a collaborative effort with the United States to fight organized crime. They do not expect that by doing so they are unwittingly assisting the NSA and the enormous U.S. intelligence apparatus with unauthorized spying for political or commercial purposes.

Meanwhile in Brazil, although both Dilma and former President Lula have called for apologies from President Obama for the abuses, U.S. officials have made it clear that this will not happen (in the words of former U.S. Ambassador to Brazil Thomas Shannon, "you should not expect an unexpected gesture"). Nor has Washington given reasonable assurances that such abuses won't occur in the future.

It seems that better relations will have to wait until after Brazil's presidential elections in October. While Dilma's detractors say that this is because she is playing to the electorate, it's more likely that the electoral calculations are on the other side: Washington is hoping to see a president who is more subservient to U.S. foreign policy. After all, the problem of U.S. disrespect for Latin American sovereignty is much deeper than just the spying scandals. Although it was George W. Bush who expressed it most plainly -- countries are either "with us" or against us -- this remains Washington's guiding principle in the hemisphere.

This was published by The Hill on June 20, 2014.

Link:
Another US Spying Problem in Latin America: The US Drug ...

House backs limits on NSA spying

WASHINGTON House libertarians and liberals banded together for a surprise win in their fight against the secretive National Security Agency, securing support for new curbs on government spying a year after leaker Edward Snowden's disclosures about the bulk collection of millions of Americans' phone records.

The Republican-led House voted 293-123 late Thursday to add the limits to a $570 billion defense spending bill. The provision, which faces an uncertain fate in the Senate, would bar warrantless collection of personal online information and prohibit access for the NSA and CIA into commercial tech products.

Proponents of the measure described them as government "backdoors" that give intelligence agencies an opening to Americans' private data.

"The American people are sick of being spied on," said Rep. Thomas Massie, R-Ky., who joined with libertarian Republicans and liberal Democrats to push the measure.

Rep. Tulsi Gabbard, D-Hawaii, railed against "this dragnet spying on millions of Americans."

The House was expected to pass the defense bill Friday. It still must be reconciled with a still-to-be written Senate version.

In the showdown between privacy and security, the House earlier this year overwhelmingly passed the USA Freedom Act that would codify a proposal made in January by President Barack Obama, who said he wanted to end the NSA's practice of collecting and storing the "to and from" records of nearly every American landline telephone call under a program that searched the data for connections to terrorist plots abroad.

Massie, Gabbard and other lawmakers complained that the legislation didn't go far enough, necessitating their amendment to the defense bill. The chairman of the House Judiciary Committee, Rep. Bob Goodlatte, R-Va., and other Republican and Democratic leaders pushed back, arguing that the amendment undercut their reform package that was a year in the making.

During hours of debate and votes Thursday, the House also endorsed several new roadblocks to Obama's long-sought effort to close the U.S. prison at Guantanamo Bay, Cuba.

Republicans and some Democrats repeatedly have blocked any effort to shutter the post-Sept. 11 prison to house terror suspects, and congressional furor over Obama's trade last month of five Taliban leaders for Army Sgt. Bowe Bergdahl prompted a bipartisan effort to add fresh obstacles.

More here:
House backs limits on NSA spying

US federal court approves NSA spying

The Obama administration has received approval from a federal court to continue the National Security Agencys collection of telephone metadata for another three months.

US officials said on Friday that the government's application to renew the existing program was approved by the Foreign Intelligence Surveillance Court.

The US House of Representatives has passed a bill to restrict the spy agencys electronic surveillance powers.

If passed by the Senate, the bill will bar the agency from using personal electronic information from citizens without a prior court order.

According to a statement from the Justice Department and the Office of the Director of National Intelligence, the government will continue the current NSA program.

"Given that legislation has not yet been enacted, and given the importance of maintaining the capabilities of the Section 215 telephony metadata program, the government has sought a 90-day reauthorization of the existing program, as modified by the changes the president announced earlier this year," it said.

The government's application to renew the program expires Sept. 12.

The NSA has been eavesdropping on millions of American and European phone records and internet data.

AGB/AGB

See the article here:
US federal court approves NSA spying

Data Protecto: Ground-breaking Data Protection Software

(PRWEB) June 20, 2014

In light of grave threats confronting data security in the information age, a revolutionary data encryption tool has been released which is constantly changing the face of data protection. As a response to ongoing bugs and malware, including Heartbleed bug, Gameover Zeus and Cryptolocker, Data Protecto has developed this purpose built encryption software. Sara James, a software developer at Data Protecto said this novel encryption software is built keeping in mind the dynamic and evolving threats which IT users confront. As such, it has a reactive as well as preventive robust systems integrated into its code, which recognizes any threats as they emerge and prevent data compromise accordingly.

A spokesperson of Data Protecto, Elizabeth Kelly explained Data Protecto will be equipped with certain grounds breaking features which makes it best encryption software. She claimed that Data Protecto will be equipped with 9 features including:

She further explained that with comprehensive data protection and encryption technologies Protecto is expected to revolutionize the previously ineffective and futile data protection industry. It is a step towards consolidated protection against evolving and dynamic threats which we continually experience.

With such expectations against adverse prospects overlooking the data protection industry, Data Protecto may be our final hope against the endemic of data insecurity.

Go here to see the original:
Data Protecto: Ground-breaking Data Protection Software

Open teaching stacks help us teach at scale

Elliott Hauser is CEO of Trinket, a startup focused on creating open sourced teaching materials. He is also a Python instructor at UNC Chapel Hill.

Well-developed tools for teaching are crucial to the spread of open source software and programming languages. Stacks like those used by the Young Coders Tutorial and Mozilla Software Carpentry are having national and international impact by enabling more people to teach more often.

Software wont replace teachers. But teachers need great software for teaching. The success and growth of technical communities are largely dependent on the availability of teaching stacks appropriate to teaching their technologies. Resources like try git or interactivepython.org not only help students on their own but also equip instructors to teach these topics without also having to discover the best tools for doing so. In that way, they play the same function as open source Web stacks: getting us up and running quickly with time-tested and community-backed tools. Thank goodness I dont need to write a database just to write a website; I can use open source software instead. As an instructor teaching others to code websites, whats the equivalent tool set? Thats what I mean by Teaching Stack: a collection of open tools that help individual instructors teach technology at scale.

Here are some of the major components of a teaching stack for a hands-on technology course:

You can see the key components: Where the instructor got the materials, how the students will access them, and what development environment each will use. All too often, one or more of the components of an instructors teaching stack amounts to Whatever I was able to throw together myself. A homegrown curriculum, student development environment, and course website can be extremely confusing for students. Theyre also an extraordinary amount of work for instructors, which means fewer courses are taught.

Based on my experiences teaching and observing workshops around the country, here are my three simple recommendations for Teaching Stack design:

Below Ill describe two teaching stacks that take these approaches and are working well at scale: the Python Young Coders Tutorial and Mozilla Software Carpentry. My message to instructors is once youve got a teaching stack that works, follow these projects example and make it easy for others to replicate and contribute to!

Before we dive into teaching stacks, Id like to briefly explain where the concept came from: the Web Stack.

Read more:
Open teaching stacks help us teach at scale

Red Hat CTO asserts OpenStack buzz is more than just hype

Summary: Red Hat's CTO presents the open source giant's case for becoming the leading brand of OpenStack for the enterprise market.

Open source has been at the forefront of tech chatter for a long time, but arguably buzz around the movement has reached a fever pitch this year in the enterprise IT world.

OpenStack, a global collaborative effort to deliver open source cloud computing software, is certainly at the heart of all this, pushed prominently by Red Hat.

Speaking at Gigaom Structure 2014 in San Francisco on Thursday, Red Hat CTO Brian Stevens cited that the open source software firm has upwards of 100,000 customers.

He followed up that he hasn't met a customer yet who doesn't want to discuss OpenStack -- if not being the first item on the agenda.

When asked on-stage about how much of that is noise or solid deployment by real customers, Stevens leaned more toward the latter but acknowledged that the ebullient interest might be "unusual."

"It's early technology. The code hasn't been around forever," Stevens remarked. "OpenStack is much more than just the original two projects of Swift and Nova."

Observing the most interest spread across North America, Europe and Asia, Stevens explained that OpenStack has emerged as a better model for building a multi-tenant, sharable infrastructure.

For businesses wanting to tap into both the public cloud but also on-premise schemes, Stevens declared the answer is OpenStack.

"They know what's where they want to get to. The question is how to help them," Stevens said.

Continued here:
Red Hat CTO asserts OpenStack buzz is more than just hype

How to stay anonymous online

One year after the first revelations of Edward Snowden, cryptography has shifted from an obscure branch of computer science to an almost mainstream notion: It's possible, user privacy groups and a growing industry of crypto-focused companies tell us, to encrypt everything from emails to IMs to a gif of a motorcycle jumping over a plane.

But it's also possible to go a step closer toward true privacy online. Mere encryption hides the content of messages, but not who's communicating. Use cryptographic anonymity tools to hide your identity, on the other hand, and network eavesdroppers may not even know where to find your communications, let alone snoop on them. "Hide in the network," security guru Bruce Schneier made his first tip for evading the NSA. "The less obvious you are, the safer you are."

Though it's hardly the sole means of achieving online anonymity, the software known as Tor has become the most vouchsafed and developer-friendly method for using the Internet incognito. The free and open source program triple-encrypts your traffic and bounces it through computers around the globe, making tracing it vastly more difficult. Most Tor users know the program as a way to anonymously browse the Web. But it's much more. In fact, Tor's software runs in the background of your operating system and creates a proxy connection that links with the Tor network. A growing number of apps and even operating systems provide the option to route data over that connection, allowing you to obscure your identity for practically any kind of online service.

Some users are even experimenting with using Tor in almost all their communications. "It's like being a vegetarian or a vegan," says Runa Sandvik, a privacy activist and former developer for Tor. "You don't eat certain types of food, and for me I choose to use Tor only. I like the idea that when I log onto a website, it doesn't know where I'm located, and it can't track me."

Here's how you can use the growing array of anonymity tools to protect more of your life online.

Web browsing The core application distributed for free by the non-profit Tor Project is the Tor Browser, a hardened, security-focused version of Firefox that pushes all of your Web traffic through Tor's anonymising network. Given the three encrypted jumps that traffic takes between computers around the world, it may be the closest thing to true anonymity on the Web. It's also rather slow. But the Tor browser is getting faster, says Micah Lee, a privacy-focused technologist who has worked with the Electronic Frontier Foundation-one of the organisations that funds the Tor Project-and First Look Media. For the past month or so, he's tried to use it as his main browser and only switch back to traditional browsers occasionally, mostly for flash sites and others that require plugins.

After about a week, he says, the switch was hardly noticeable. "It may not be entirely necessary, but I haven't found it that inconvenient either," Lee says. "And it does have real privacy benefits. Everyone gets tracked everywhere they go on the Web. You can opt of out of that."

Email The simplest way to anonymously send email is to use a webmail service in the Tor Browser. Of course, that requires signing up for a new webmail account without revealing any personal information, a difficult task given that Gmail, Outlook, and Yahoo! Mail all require a phone number.

Runa Sandvik suggests Guerrilla Mail, a temporary, disposable email service. Guerrilla Mail lets you set up a new, random email address with only a click. Using it in the Tor Browser ensures that no one, not even Guerrilla Mail, can connect your IP address with that ephemeral email address.

Encrypting messages with webmail can be tough, however. It often requires the user to copy and paste messages into text windows and then use PGP to scramble and unscramble them. To avoid that problem, Lee instead suggests a different email setup, using a privacy-focused email host like Riseup.net, the Mozilla email app Thunderbird, the encryption plugin Enigmail,and another plugin called TorBirdy that routes its messages through Tor.

Excerpt from:
How to stay anonymous online