Sen Nancy Pelosi looks like a fool when student asks about NSA spying she voted for
By: Kapiones FreedomChannel
Read more:
Sen Nancy Pelosi looks like a fool when student asks about NSA spying she voted for - Video
Sen Nancy Pelosi looks like a fool when student asks about NSA spying she voted for
By: Kapiones FreedomChannel
Read more:
Sen Nancy Pelosi looks like a fool when student asks about NSA spying she voted for - Video
Following widespread speculation that the move was imminent, German Federal Prosecutor Harald Range on Wednesday announced he is launching a formal investigation into allegations that the NSA spied on Chancellor Angela Merkel's mobile telephone communications.
SPIEGEL had reported on Monday that the federal prosecutor was close to opening formal proceedings. On Wednesday, Range informed the Legal Committee of the Bundestag, Germany's federal parliament, of the pending investigation.
The move marks the next significant chapter in the spying scandal surrounding America's signals intelligence authority, the National Security Agency. It is also the first formal act taken by a German government agency in response to the revelations made public by NSA whistleblower Edward Snowden. The probe could further exacerbate trans-Atlantic relations that have been deeply burdened by the scandal.
The Federal Prosecutor's Office in Karlsruhe opened two "monitoring processes" last year to review the allegations. The first focused on the mass spying of Germans' data by the NSA and the second targeted allegations -- first reported by SPIEGEL in October -- that Merkel's mobile phone had been tapped.
Sources close to the federal prosecutor told SPIEGEL that Range has concluded that there are insufficient reasons for opening an official investigation into the mass spying, although the office still has the option of initiating proceedings at a later date.
Massive Criticism
Chancellor Merkel is said to still be furious about the tapping of her phone and she complained directly to US President Barack Obama. That complaint helped convince prosecutors that the allegations of spying on her phone are credible. In addition, following a visit with Keith Alexander -- who was NSA chief at the time -- in Washington, Elmar Brok, a German member of the European Parliament with Merkel's conservative Christian Democratic Union (CDU), said that when he asked if the chancellor's mobile phone was being spied on, Alexander responded, "Not anymore." Merkel also appears in the NSA's Nimrod database, which contains the names of important NSA targets. SPIEGEL itself provided a copy of the entry to the German government in October.
Range has been the subject of massive criticism in recent weeks because the Sddeutsche Zeitung and public broadcasters NDR and WDR reported that he would not launch a formal investigation into the NSA scandal. Range did, however, face massive internal resistance to the initiation of proceedings after suggesting early on that he would likely pursue an investigation.
Range's own staff experts on espionage expressed skepticism about taking on the case because they didn't believe in prospects for success in any proceedings against the NSA for its mass surveillance practices. They argued internally that the US would not cooperate with a request for mutual legal assistance and that the effort would prove futile. Besides, there are open questions about who would even be the focus of the investigation? Obama? Or would it be Snowden himself, who told Germany's Stern magazine last week that he had been "personally involved with information stemming from Germany." Evidence had been stronger for pursuing allegations of spying against Merkel.
But German Justice Minister Heiko Mass of the center-left Social Democratic Party (SPD) said no pressure had been exerted on Range. "From the very beginning, I placed great importance on the federal prosecutor, as the head of the investigative authority, making this decision on his own -- properly and according to law," Mass told German public broadcaster Deutschlandfunk on Wednesday morning. The minister added he was certain Range would do that.
Read the rest here:
Germany Expected To Open Investigation into NSA Spying on ...
CINDY COHN AND NADIA KAYYALI
DEBUNKED: How often are the NSA's defenders going to repeat the same talking points?
Over the past year, as the Snowden revelations have rolled out, the US Government and its apologists have developed a set of talking points about mass spying that the public has now heard over and over again. From the President, to Hilary Clinton to Representative Mike Rogers, Senator Dianne Feinstein and many others, the arguments are often eerily similar.
But as we approach the one year anniversary, it's time to call out the key claims that have been thoroughly debunked and insist that the NSA apologists retire them.
So if you hear any one of these in the future, you can tell yourself straight up: "this person isn't credible," and look elsewhere for current information about the NSA spying. And if these are still in your talking points (you know who you are) it's time to retire them if you want to remain credible. And next time, the talking points should stand the test of time.
1. The NSA has Stopped 54 Terrorist Attacks with Mass Spying
The discredited claim: NSA defenders have thrown out many claims about how NSA surveillance has protected us from terrorists, including repeatedly declaring that it has thwarted 54 plots. Representative Mike Rogers says it often. Only weeks after the first Snowden leak, US President Barack Obama claimed: "We know of at least 50 threats that have been averted" because of the NSA's spy powers. Former NSA Director General Keith Alexander also repeatedly claimed that those programs thwarted 54 different attacks.
Others, including former Vice President Dick Cheney have claimed that had the bulk spying programs in place, the government could have stopped the 9/11 bombings, specifically noting that the government needed the program to locate Khalid al Mihdhar, a hijacker who was living in San Diego.
Why it's not credible:These claims have been thoroughly debunked. First, the claim that the information stopped 54 terrorist plots fell completely apart. In dramatic Congressional testimony, Senator Leahy forced a formal retraction from NSA Director Alexander in October, 2013:
"Would you agree that the 54 cases that keep getting cited by the administration were not all plots, and of the 54, only 13 had some nexus to the US?" Leahy said at the hearing. "Would you agree with that, yes or no?"
Read more here:
Five dumbest defences for NSA spying
CINDY COHN AND NADIA KAYYALI
DEBUNKED: How often are the NSA's defenders going to repeat the same talking points?
Over the past year, as the Snowden revelations have rolled out, the US Government and its apologists have developed a set of talking points about mass spying that the public has now heard over and over again. From the President, to Hilary Clinton to Representative Mike Rogers, Senator Dianne Feinstein and many others, the arguments are often eerily similar.
But as we approach the one year anniversary, it's time to call out the key claims that have been thoroughly debunked and insist that the NSA apologists retire them.
So if you hear any one of these in the future, you can tell yourself straight up: "this person isn't credible," and look elsewhere for current information about the NSA spying. And if these are still in your talking points (you know who you are) it's time to retire them if you want to remain credible. And next time, the talking points should stand the test of time.
1. The NSA has Stopped 54 Terrorist Attacks with Mass Spying
The discredited claim: NSA defenders have thrown out many claims about how NSA surveillance has protected us from terrorists, including repeatedly declaring that it has thwarted 54 plots. Representative Mike Rogers says it often. Only weeks after the first Snowden leak, US President Barack Obama claimed: "We know of at least 50 threats that have been averted" because of the NSA's spy powers. Former NSA Director General Keith Alexander also repeatedly claimed that those programs thwarted 54 different attacks.
Others, including former Vice President Dick Cheney have claimed that had the bulk spying programs in place, the government could have stopped the 9/11 bombings, specifically noting that the government needed the program to locate Khalid al Mihdhar, a hijacker who was living in San Diego.
Why it's not credible:These claims have been thoroughly debunked. First, the claim that the information stopped 54 terrorist plots fell completely apart. In dramatic Congressional testimony, Senator Leahy forced a formal retraction from NSA Director Alexander in October, 2013:
"Would you agree that the 54 cases that keep getting cited by the administration were not all plots, and of the 54, only 13 had some nexus to the US?" Leahy said at the hearing. "Would you agree with that, yes or no?"
See the article here:
Five dumbest ways defences for NSA spying
The chief executive officers of Microsoft Corp. (MSFT), Google Inc. (GOOG) and other technology companies are asking the U.S. Senate to muzzle the National Security Agency.
The request comes two weeks after the House of Representatives passed a bill to end the most controversial aspects of domestic spy programs while stopping short of the technology industrys demands for greater restrictions on the bulk collection of Internet data. The Senate intelligence committee is meeting today to discuss the House legislation.
The CEOs letter comes on the one-year anniversary of the publication of documents leaked by former NSA contractor Edward Snowden exposing the range of government surveillance tactics. The public backlash has prompted Congress and President Barack Obama to consider new parameters for spy programs.
Its been a year since the first headlines alleging the extent of government surveillance on the Internet, CEOs from the coalition of companies wrote in an open letter to senators that was to be published today in the New York Times and Washington Post. It is time for action.
When Big Data Meets Big Surveillance
The CEOs included Microsofts Satya Nadella, Facebook Inc. (FB)s Mark Zuckerberg and Apple Inc. (AAPL)s Tim Cook.
None of the executives who signed the letter are scheduled to appear at todays Senate hearing. Witnesses on the agenda include Deputy U.S. Attorney General James Cole, NSA Deputy Director Richard Ledgett and FBI Deputy Director Mark Giuliano.
The House bill that passed on May 22 would end one of the programs under which the NSA collects and stores as much as five years of phone records on Americans. The technology companies said that bill is flawed because it might allow the government to collect e-mail and other Internet data in bulk. The companies, which created the Reform Government Surveillance coalition, are asking the Senate to fix the flaw.
As the Senate takes up this important legislation, we urge you to ensure that U.S. surveillance efforts are clearly restricted by law, proportionate to the risks, transparent, and subject to independent oversight, the CEOs wrote.
Legislation must also allow companies to provide even greater detail about the number and type of government requests they receive for customer information, the executives wrote. The letter doesnt list additional changes sought.
Read more here:
Zuckerberg, Nadella Ask Senate to Restrain NSA Spying
Peter Suciu for redOrbit.com Your Universe Online
Google Inc. called out rival email providers for not providing enough encryption. Apparently those rivals took notice and have started to address the issue. The tech giants new Gmail data highlighted the rise of backbone email encryption, something that privacy advocates have said was a long-time coming.
On Tuesday Google issued a transparency report, which denoted that email should be protected as it travels across the Internet yet in most cases protected it is not. It called out the fact that while most of us prefer that only the recipient reads the email prying eyes could see it as well. This could be through so-called bad actors or through government surveillance but one thing was clear email is anything but truly private or personal.
Encrypting the emails could make a difference according to the search giant. Google compared encryption to sealed envelopes, while unencrypted emails were little more than postcards.
Gmail has always supported encryption in transit by using Transport Layer Security (TLS), and will automatically encrypt your incoming and outgoing emails if it can, Brandon Long, tech lead for the Gmail Delivery Team at Google, wrote on the companys official blog this week. The important thing is that both sides of an email exchange need to support encryption for it to work; Gmail cant do it alone.
Our data show that approximately 40 to 50 percent of emails sent between Gmail and other email providers arent encrypted, Long added. Many providers have turned on encryption, and others have said theyre going to, which is great news. As they do, more and more emails will be shielded from snooping.
Googles Gmail service offers encryption from the browser by using the HTTPS, something privacy advocates have called upon for some time.
For the past few years, EFF has been working on promoting the universal use of encryption for Internet protocols. We started by pushing major sites to switch from HTTP to HTTPS, and gave individual users ways to pull things along, Peter Eckersley of the Electronic Frontier Foundation wrote on the groups Deeplinks blog on Tuesday. Last November, we launched our Encrypt the Web Scorecard, which in addition to Web encryption, added a second focus on securing SMTP email transmissions between mailservers.
Eckersley added that the EFF believed this to be a vital protection against non-targeted dragnet surveillance by the US and other governments.
In the months following the scorecard ratings, calling for support for STARTTLS email encryption, the EFF said a number of major sites including Yahoo, Twitter, LinkedIn and Facebook all deployed this form of backbone email encryption.
Originally posted here:
Encryption-Deprived Email Services Criticized By Search Giant Google
Illustration: Ross Patton/WIRED
The internet is still reeling from the discovery of the Heartbleed vulnerability, a software flaw exposed in April that broke most implementations of the widely used encryption protocol SSL. Now, before Heartbleed has even fully healed, another major bug has ripped off the scab.
On Thursday, the OpenSSL Foundation published an advisory warning to users to update their SSL yet again, this time to fix a previously unknown but more than decade-old bug in the software that allows any network eavesdropper to strip away its encryption. The non-profit foundation, whose encryption is used by the majority of the Webs SSL servers, issued a patch and advised sites that use its software to upgrade immediately.
The new attack, found by Japanese researcher Masashi Kikuchi, takes advantage of a portion of OpenSSLs handshake for establishing encrypted connections known as ChangeCipherSpec, allowing the attacker to force the PC and server performing the handshake to use weak keys that allows a man-in-the-middle snoop to decrypt and read the traffic.
This vulnerability allows malicious intermediate nodes to intercept encrypted data and decrypt them while forcing SSL clients to use weak keys which are exposed to the malicious nodes, reads an FAQ published by Kikuchis employer, the software firm Lepidum. Ashkan Soltani, a privacy researcher who has been involved in analyzing the Snowden NSA leaks for the NSA and closely tracked SSLs woes, offers this translation: Basically, as you and I are establishing a secure connection, an attacker injects a command that fools us to thinking were using a private password whereas were actually using a public one.
Unlike the Heartbleed flaw, which allowed anyone to directly attack any server using OpenSSL, the attacker exploiting this newly discovered bug would have to be located somewhere between the two computers communicating. But that still leaves open the possibility that anyone from an eavesdropper on your local Starbucks network to the NSA to strip away your Web connections encryption before its even initialized.
According to a blog post by Kikuchi, the flaw has existed since the very first release of OpenSSL in 1998. He argues that despite the widespread dependence on the software and its recent scrutiny following the Heartbleed revelation, OpenSSLs code still hasnt received enough attention from security researchers. The biggest reason why the bug hasnt been found for over 16 years is that code reviews were insufficient, especially from experts who had experiences with TLS/SSL implementation, he writes. They could have detected the problem.
The revelation of the bug on the one-year anniversary of the Guardians first publication of Snowdens NSA leaks adds to that grim lesson, says security researcher Soltani. He points to efforts by privacy groups like Reset The Net that have used the Snowden revelations as inspiration to push Internet users and companies to implement more pervasive encryption. Those efforts are undermined, he points out, by the fact that some of the oldest and most widely used encryption protocols may still have fundamental flaws. There are huge efforts by companies and activists to deploy tools that add proven security, he says, quoting Reset The Nets website. Yet theres very little actual work and support of the underlying tools that are being deployed, like OpenSSL. Its pretty shameful that the core library that practically the entire internet relies on for transport security is maintained by a handful of under-resourced engineers.
Original post:
Heartbleed Redux: Another Gaping Wound In Web Encryption Uncovered
June 5, 2014 - CloudLink SecureVSA lets businesses moving to cloud deployments bring their own encryption to VMware vCloud Hybrid Service and renders data inaccessible to other tenants, cloud administrators, and outsiders. Without requiring any changes to workloads and applications, agentless solution addresses data privacy and regulatory compliance concerns via its security policy that automates encryption management and enables VMware customers to have exclusive control of encryption keys. AFORE Solutions Inc. 2680 Queensview Drive Ottawa, Ontario K2B 8J9 Canada Press release date: May 28, 2014
CloudLink data encryption enables customers to embrace cloud with ease and confidence
OTTAWA -- AFORE Solutions, Inc., a leader in cloud security and data encryption management, today announced availability of CloudLink SecureVSA for VMware vCloud Hybrid Service. Security and flexibility are top priorities for businesses moving to cloud deployments and CloudLink SecureVSA allows them to bring their own encryption to vCloud Hybrid Service in the form of a virtual storage encryption appliance, making data inaccessible to other tenants, cloud administrators and outsiders.
VMware and AFORE are addressing key challenges enterprises face with production cloud deployments, such as re-architecting applications, learning new tools and managing the risk of hosting sensitive data in a shared, multi-tenant environment. VMware vCloud Hybrid Service simplifies the complexity of managing hybrid cloud environments by enabling customers to seamlessly extend their private data centers to the public cloud without needing to invest in new processes or tools to support the deployment. Adding CloudLink SecureVSA addresses data privacy and regulatory compliance concerns with an advanced security policy that automates encryption management and enables VMware customers to have exclusive control of the encryption keys.
Ajay Patel, vice president of VMware vCloud Hybrid Service explains, "VMware designed the VMware vCloud Hybrid Service to offer the agility of public cloud while providing full compatibility with customers' existing data center infrastructure, making the migration easy and predictable. In a similar fashion, AFORE CloudLink addresses data privacy concerns with a hybrid cloud encryption solution that is transparent to applications and uses familiar VMware deployment and management tools."
Jonathan Reeves, AFORE Chairman and Chief Strategy Officer, underscores the importance of providing customers with powerful encryption solutions that enable them to confidently embrace cloud. "We believe VMware vCloud Hybrid Service addresses an important customer need for enterprises looking to deploy mission critical workloads in the cloud. CloudLink enables VMware customers to encrypt all data used by their virtual machines and puts them in total control of their data security."
Key benefits of CloudLink SecureVSA for VMware vCloud Hybrid Service include:
Easily deployed agentless solution requiring no changes to workloads and applications. Familiar deployment leveraging VMware tools including VMware vSphere, vCloud Director and vCloud Automation Center. Encrypt on a "per-VM" basis rather than the entire virtual data center. Flexible key management including customer controlled keys. Single encryption management plane across hybrid cloud.
AFORE CloudLink is available immediately with full solution details and free trial offers from the VMware vCloud Hybrid Service Marketplace and http://www.aforesolutions.com/vchs.
About AFORE: AFORE is a leading provider of advanced data security and encryption management solutions that protect sensitive customer information in multi-tenant private, public and hybrid clouds. AFORE CloudLink been recognized for several prestigious industry awards including the Best of VMworld Gold Award in the Security / Compliance for Virtualization category in 2013. CloudLink SecureVSA has been certified Vblock Ready by VCE to run on Vblock Infrastructure Platforms as well as EMC VSPEX lab validated. AFORE is an EMC Select Business Partner as well as an artneras a RSA luding Secure ty controls ess applications. S and scale oRSA Technology partner. For more information visit: http://www.aforesolutions.com and follow us on Twitter @aforesolutions .
See the original post:
Virtual Storage Encryption Appliance secures critical workloads.
Dallas (PRWEB) June 04, 2014
Zimbra, a global leader in unified collaboration software, announced today that it is making key changes to its open source software licensing. In order to build an even stronger foundation for community-powered innovation, the company is moving to Open Source Initiative (OSI)-approved licenses with its summer release of Zimbra Collaboration 8.5. The Zimbra Collaboration server platform will be licensed under the GNU Public License version 2 and the Zimbra Collaboration web application will be licensed under the Common Public Attribution License (CPAL) version 1.
Today, more than 60,000 community members contribute to the Zimbra Collaboration open source project. With more than one million downloads, the open source edition of Zimbra Collaboration is being used by approximately 600 million people in 135 countries.
By moving to OSI-approved licenses, Zimbra will increase contributions from the open source community that will drive innovation and enhance the quality of its software. Zimbra also looks forward to increased compatibility with other open source projects, so that customers, partners and end users receive greater benefit from integration across the open source software ecosystem.
If there was ever any doubt about Zimbras commitment, todays licensing announcement is more proof that our product strategy is securely tied to the open source community, said Rob Howard, chief technology officer at Zimbra. Leveraging our open source community will help us bring continuous innovation to the inbox, continued Howard.
Members of the open source community will begin to see these licensing changes go into effect in the open source repository with the public beta of Zimbra Collaboration 8.5. The public beta starts today and is open to all participants.
To participate in the public beta of Zimbra Collaboration 8.5 or view the Zimbra open source edition license, visit Zimbra.com today.
###
About Zimbra
Zimbra powers collaboration for the way you work. Zimbra connects people and information with unified collaboration software that includes email, calendaring, file sharing, activity streams, social communities and more. With technology designed for social, mobile and the cloud, Zimbra gives individuals the flexibility to work from virtually anywhere, through nearly every computer, tablet and mobile device.
Read the original post:
Zimbra Announces Move to OSI-based Licensing for Zimbra Collaboration 8.5 Open Source Edition
Cryptocurrency business forum
This is community of people that do business with cryptocurrencies. Any business. Any cryptocurrency! Interaction with like-minded individuals greatly increa...
By: BitBiz.io
Excerpt from:
Cryptocurrency business forum - Video