Edward Snowden Legal Defense Official Launch in Berlin: COURAGE Foundation – Video


Edward Snowden Legal Defense Official Launch in Berlin: COURAGE Foundation
In this video Luke Rudkowski talks to Sarah Harrison the acting director of the Courage Foundation at the official launch of the Edward Snowden defense fund ...

By: WeAreChange

View original post here:
Edward Snowden Legal Defense Official Launch in Berlin: COURAGE Foundation - Video

ACLU: One Year Later, Edward Snowden Discovers U.S. Government’s Secret – Video


ACLU: One Year Later, Edward Snowden Discovers U.S. Government #39;s Secret
Subscribe to Upworthy: http://www.youtube.com/subscription_center?add_user=upworthy One year ago, the world had never heard of Edward Snowden, and we knew very little about the breathtaking...

By: Upworthy

See the article here:
ACLU: One Year Later, Edward Snowden Discovers U.S. Government's Secret - Video

U.S. officials tried really, really hard to catch Edward …

The Washington Post has a pretty fascinating piece looking at how the FBI, the CIA, the State Department and other agencies spent weeks trying and failing to catch Edward Snowden after he fled to Hong Kong and eventually landed in Russia. As Greg Millers reporting makes clear, the United States kept waiting for Snowden to miscalculate and expose himself to being apprehended, but it never happened.

The best play for us is him landing in a third country, White House homeland security adviser Lisa Monacosaid of the agencies strategy, according to an official who spoke with Miller. We were hoping he was going to be stupid enough to get on some kind of airplane, and then have an ally say: Youre in our airspace. Land.

At one point, the FBI enlisted the help of Snowdens father, who eventually stopped cooperating after he concluded that the U.S. was trying to depict his son as a traitor:

From the outset, the pursuit of Snowden was led by the FBI. Lon Snowden, the fugitives father, said FBI agents descended on his house within hours after a video of his son identifying himself as the source of the NSA leaks appeared on the Web site of the British news outlet the Guardian.

I spoke to them approximately four hours on the 10th of June, Lon Snowden said. Later, the FBI offered to send the elder Snowden to Moscow as part of an effort to deliver a scripted pitch to his son to turn himself in and return home. A former officer in the Coast Guard, Lon Snowden was initially cooperative with the bureau but became angered as his son was depicted by U.S. officials as a traitor.

I came to know that they were not functioning in good faith and turned down the trip, Snowden said.

Snowdens exact location continues to evade security officials, even as he speaks with journalists and make public media appearances:

Others said the United States lacks answers to even basic questions about Snowdens circumstances, including where he lives and perhaps most important the role of the Russian security service, the FSB, in his day-to-day life.

Asked whether the United States knows Snowdens location, a U.S. official regularly briefed on the matter said, Thats not our understanding.

The gaps persist despite Snowdens ability tomeet with U.S. journalists in Moscowand make high-profile appearances, including during a call-in show with Russian President Vladimir Putin.

Read this article:
U.S. officials tried really, really hard to catch Edward ...

Edward Snowden Can be in United States via A Robot

YouTube Videos Tweets Comments

Recommend Your Tweet as Top Tweet:

In March, the worlds most famous whistleblower Edward Snowden chatted with a Ted audience in Vancouver using a $16,000 Beam a telepresence robot that is essentially a screen on a stick on wheels which can be operated remotely. After an official Q&A on stage with Ted founder Chris Anderson, the U.S. governments highly-wanted man drove around and chatted with attendees including Googles Sergey Brin. To prepare for the presentation, Ted organizers had sent a Beam to the American Civil Liberties Office in New York, so that Snowdens lead lawyer, Ben Wizner, could test it out and make sure it worked before it made its debut on stage. The ACLU still has that Beam, allowing Snowden to pop in and drive around the office, as mentioned by German reporter Julia Prosinger in a profile of the Snowden team. Her report ends dramatically; while talking with Snowden via Skype, the flickering screen caused her to have an epileptic seizure, which Snowden treated from afar, familiar with a condition he also has.

The telepresence robot is a disruptive technology that is a profound response to exile, said Ben Wizner. You assume its just going to be Skype on wheels, but its actually much more intimate than that for both the person operating it and for the people in the room with it because the camera is so good and because it moves independently. Like Snowden himself, who is confined to Russia, the bot doesnt have much freedom. Snowden is not wandering the streets of Manhattan in it. Thus far, the Beam has stayed at the ACLU in New York; Snowden can drop in and drive around, to speak to employees there or stare out a window at the Statue of Liberty which is within view from the financial district digs.

Wizner said he would like to get more Beams; hed like to send one to University of Glasgow in Scotland for example where Snowden is currently serving a three-year term as a student rector. We wanted to have a Beam with robes there to accept it, said Wizner.

As to how often the Beam gets used, Wizner said sometimes. People gather and he speaks. I was on a conference call once and he just rolled around the office for 45 minutes, and went into [ACLU civil liberty attorney] Jameel Jaffers office to talk about [the Foreign Intelligence Surveillance Act], said Wizner. He mainly likes going on the Beam to thank people and interact with people who have helped him.

As for the security of the device, the Beam needs wi-fi for connectivity and then uses end-to-end encryption for calls. But the pilot station, (a.k.a. Snowden on his laptop) connects through a cloud supported by Suitable Technologies, which makes the device, to make contact with the Beam in the ACLU office.

According to a user manual, Beam call data is encrypted using AES-256 in CTR mode, and authenticated using HMAC-SHA1. Encryption and decryption happen at the call endpoints, so if relays are used they only process encrypted data. The manual warns, because the infrastructure establishes the trust relationship between the device and the pilot station, a compromised infrastructure would be able to carry out a man-in-the-middle attack; it encourages anyone worried about that to contact Suitable Technologies support.

Earlier this year, before the Snowden bot was a reality, I spoke to Scott Hassan, the CEO of Suitable Technologies. We did not put a record button on the Beam. We want it to be ephemeral, like a normal conversation, he told me. The line in between the connection points is encrypted. Privacy is important to us.

He joked that it would take the NSA to break in. We have not been contacted by the NSA to give them a back door, he added more seriously. Though they did contact us about using Beams internally.

Link:
Edward Snowden Can be in United States via A Robot

Wolverton: Tips on protecting your online activities

Encryption was once the province of the paranoid. But no more.

With the revelations from Edward Snowden of widespread spying by the government, many people are more interested in cloaking their online activities. Even if you're not be worried about the government reading your email or getting access to your browsing history, there are plenty of other reasons why you might want financial, legal or health information private and secure, whether from unscrupulous hackers or online marketers.

Here are some key technologies you can use to protect your online activities:

Tor. This is a set of linked pieces of software that helps to cloak users' online identities. "Tor" stands for "the onion router," a name that is emblematic of the layers of protections the software uses to anonymize users.

(AP Photo/Damian Dovarganes, File)

When users seek Web pages through a Tor-enabled browser, their requests are encrypted and then go through a random series of computers on the Internet. Each computer, which has been set up by volunteers, relays the requests until they reach their end destination. Thanks to the design of the system, none of the relays nor the end server knows both who requested the Web page or what Web page was being requested.

Tor has been used by everyone from whistle-blowers to cyber-thieves to disguise their identity. It helps prevent people from learning what sites you visit or where you live. It's mostly used for accessing the Web, but the underlying relay network can also be used for instant messaging, email and other Internet applications.

Of the three encryption technologies discussed here, Tor is by far the easiest to set up and use. On a PC or an iPhone, you simply have to install one application. On an Android phone, you'll need to install two.

Although it's easy to configure, Tor does come with some frustrations that could limit how much you want to use it. The main drawback is that because requests go through multiple computers, some of them located half a world away, loading Web pages can be very slow, making your broadband connection feel like it's the dial-up Internet.

Because the relay network is global and your Internet address appears to be the one from the last server that relays your request, the websites you access may think you are a resident of Germany or Japan or some place other than California. So some websites, such as Google or eBay, may show you pages in a language other than English.

Original post:
Wolverton: Tips on protecting your online activities

The future of open source: speeding technology innovation

As one of the contributors to Black Ducks eighth annual Future of Open Source Survey, the industrys leading indicator of open source software (OSS) industry trends, JFrog was pleased to be able to help show the world the true impact of open source software. This was the first year that we decided to take part in the survey. We felt that it was a natural partnership, since our work revolves around regularly interacting with the OSS community to help create and distribute open source software.

As the survey reported, 56 percent of corporations expect to contribute to more open source projects in 2014 -- something weve already seen firsthand. By working directly with software developers, we have been able to witness the next wave of open source. Were seeing companies like Twitter, Netflix, and Ericsson actually willing to pay developers to participate in the OSS community, and both develop and use open source in their own frameworks. With 55 percent of this years respondents also indicating that OSS helped create new products and services, there has clearly been a change in the way enterprises look at open source; it has truly become a crucial element in the development of new, innovative technologies.

So what do we see as the future of open source? When it comes to software development, it will be increasingly difficult to integrate, develop, and extend closed source software -- and extremely costly compared to open source alternatives. Companies have come to understand the importance of open source and the key role it plays in developing innovative software today. Twitters messaging app is a good example of how open source can be powerfully used -- and of how well-known companies are influencing the community. Because Twitter open sourced its messaging platform, it gave a lot of other companies the ability to benefit from the direct messaging capabilities it developed. Even top financial companies such as Goldman Sachs realize the importance of open source.

Open source has long since proved its legitimacy, and the use of open source has changed the way that companies compete. Its very difficult for companies to develop innovative software without it, and companies now understand the rapid, progressive development it enables. As industries and technologies continue to evolve at a faster pace, closed source companies will be dead in the water if they arent leveraging the open source community and the projects theyre working on.

Photo Credit: rvlsoft/Shutterstock

This article was originally published on Open Source Delivers.

Fred Simon is Co-founder and Chief Architect of JFrog - the creators of Artifactory binary repository and Bintray. Before launching JFrog in 2008, Fred founded AlphaCSP in 1998, a Java consulting firm, where he served as the companys global CTO. Freds development experience dates back to 1992, covering Javas evolution from day one as a programmer, architect and consultant. At JFrog, Fred encourages strong collaboration with leading open-source projects such as SpringSource, Grails and Gradle by providing them with the Artifactory Cloud platform, and fuels the Continuous-Integration ecosystem with open-source plugins for leading tools such as Jenkins, TeamCity & Bamboo.

Read more:
The future of open source: speeding technology innovation

Engineers take just 24 hours to get a new open source 3.15 Linux operating system running on new NVIDIA Jetson TK1

Manchester, UK (PRWEB UK) 13 June 2014

This shows whats possible with the right people working on a fully open source software stack with Baserock, said Codethink CEO Paul Sherwood. Linux 3.15 was released late Sunday in California. We got our board on Monday. James started the work on Tuesday. By Wednesday we had with a fully working system, with wayland and weston running EGL clients using totally open technologies.

Software engineer, James Thomas, carried out the work using the Baserock operating system workflow designed by Codethinks world-class team. Its pretty exciting to show that we can now get a complete bang-up-to-date Linux operating system running on this amazing board in 24 hours, said James. Most projects take weeks or months to get to this stage, if you can get there at all.

Keeping the whole software stack open means you can innovate faster and optimise all the way down to the metal, said Codethink CTO Rob Taylor. No NDAs, no third party dependencies, no secret sauce, just open source. "Hats off to NVIDIA for their great community contributions that have made this possible, and to the great work done by the free and open source software developers around the world.

The NVIDIA Jetson TK1 features a 4-core A15 cpu and a 192-core Kepler K1, all for under $200. As far as we know its the first ARM board to feature fully open hardware accelerated graphics software support with the backing of the silicon vendor. The high performance and low price make it ideal both for kickstarter projects and for established players. For more information about NVIDIA Jetson see https://developer.nvidia.com/jetson-tk1.

About Baserock Baserock is an open source project originally created by Codethink engineers, which integrates a large set of open source and free software components into complete custom operating systems. Its a bit like a Linux distro, a build system, a workflow and a development environment all in one. The general aim of the project is to fix the things that are wrong with systems software engineering.

For more information about Baserock see http://wiki.baserock.org.

About Codethink Based in Manchester UK, Codethink provides expert software and systems design, development, test and maintenance services, primarily for advanced embedded device projects and enterprise-class infrastructure technologies.

For more information about Codethink see http://www.codethink.co.uk.

Twitter: https://twitter.com/codethink

See original here:
Engineers take just 24 hours to get a new open source 3.15 Linux operating system running on new NVIDIA Jetson TK1