INFOWARS Nightly News: with Lee Ann McAdoo Tuesday June 3 2014: Dr. Ed Group – Video


INFOWARS Nightly News: with Lee Ann McAdoo Tuesday June 3 2014: Dr. Ed Group
Tuesday: The Infowars Nightly News. Inside The Gitmo Hostage Crisis. Plus, Teen Confronts Nancy Pelosi on NSA Spying: House Minority Leader Bumbles Embarrassing Response. -- http://www.prisonplanet...

By: Ron Gibson

More:
INFOWARS Nightly News: with Lee Ann McAdoo Tuesday June 3 2014: Dr. Ed Group - Video

Teenager confronts House Minority Leader on NSA spying …

WASHINGTON, June 3 (UPI) --A teenager confronted House Minority Leader Nancy Pelosi about the NSA's spying activities on Monday.

Andrew Demeter, a self-described investigative reporter who runs the TeenTake Youtube channel, asked the Senator, who was initially smiling at the young people, ""Why do you support the NSA's illegal and ubiquitous data collection?"

The smile quickly faded from the Senator's face.

"Well I, I do not, I have questions about the metadata collection that they were, uh, collecting," Pelosi replied, "unless they had a reason to do so."

Two women, possibly the Senator's aids, stand in the background of the video. One looks suddenly anxious and the other cracks a sly and knowing smile at the question.

Both stand nervously listening to her reply.

The House Minority Leader quickly recovers by saying that she didn't support certain resolutions and that she fought the NSA on their collection processes, but Demeter follows up with, "You did vote for a bill to continue funding for the NSA, though?"

"Yeah, of course," Pelosi answers quickly. "I don't think we should not fund the National Security Agency; no, they do many, many things."

Then, as Demeter starts to ask his next question, an aid talks over him, saying "Thank you for your -- " in an attempt to cut his interview short, but Demeter won't be deterred, and raises his voice to ask Pelosi, "Isn't the NSA a clear violation of the fourth amendment?"

The House Minority Leader's answer is stammering and vague and seems to blame the Bush administration for the NSA's spying:

Here is the original post:
Teenager confronts House Minority Leader on NSA spying ...

Germany Says NSA Spying Must Have Consequences Amid Probe

Germanys top prosecutor will start a formal investigation into whether U.S. intelligence agents tapped Chancellor Angela Merkels mobile phone, potentially heightening tensions between the two countries over spying.

The Federal Prosecutors office in Karlsruhe said it had uncovered sufficient initial evidence to probe whether U.S. spies had violated German law. A second preliminary inquiry into mass surveillance by U.S. and British intelligence didnt yield enough proof to warrant a probe, the prosecutor said.

Extensive findings have brought forward enough initial clues that unknown officials of the American intelligence services placed Chancellor Angela Merkels mobile phone under surveillance, the prosecutor said in a statement today.

An official probe may widen a rift between the governments in Berlin and Washington that surfaced in October amid reports that signals-intelligence agents from the National Security Agency had hacked the German leaders phone. A separate parliamentary investigation into mass surveillance, disclosed in documents leaked by former NSA contractor Edward Snowden to the media last year, is already under way in Berlin.

German Justice Minister Heiko Maas said there have to be consequences if evidence arises that U.S. agents tapped government officials devices or conducted mass surveillance in violation of German law. The prosecutor isnt under political pressure from Merkels government coalition to act, he said.

If there are indications that German law has been broken, then investigators have to take action, Maas told Deutschlandfunk radio. That applies to the chancellors mobile phone as much as it does to mass surveillance.

Following reports last year that the chancellors phone had been tapped, the White House said agents arent spying on Merkel and pledged not to do so in the future.

Deputy National Security Adviser Ben Rhodes told reporters on Air Force One today that direct dialogue with the U.S. is the best way for Germany to address its concerns over spying.

Germanys justice system will be making its own decisions about its own inquiries, but we believe we have an open line and good communication with the chancellor and her team, Rhodes said, while traveling with President Barack Obama.

Der Spiegel magazine, citing Snowden-leaked documents, reported in October that U.S. authorities obtained Merkels cell number in 2002, when she was opposition leader. The surveillance was carried out by an NSA Special Collection Service from within the U.S. embassy adjacent to Berlins Brandenburg Gate, Spiegel reported at the time.

See original here:
Germany Says NSA Spying Must Have Consequences Amid Probe

Google’s new anti-NSA encryption tool

The National Security Agency's snooping is about to get more difficult.

Google on Tuesday released the source code for a new extension to its Chrome browser that will make it a lot easier for users to encrypt their email.

The tool, called End-to-End, uses an open-source encryption standard, OpenPGP, that will allow users to encrypt their email from the time it leaves their web browser until it is decrypted by the intended recipient. It will also allow users to easily read encrypted messages sent to their web mail service. The tool will require that users and their recipients use End-to-End or another encryption tool to send and read the contents.

This could be a major blow to the N.S.A. Despite numerous cryptographic advances over the past 20 years, end-to-end email encryption like PGP and GnuPG is still remarkably labor-intensive and require a great deal of technical expertise. User mistakes not errors in the actual cryptography often benefited the N.S.A. in its decade-long effort to foil encryption.

"It's important that the government not overstep," Eric Grosse, Google's chief of security, said in an interview last week. "We don't want any government breaking the security of the Internet."

Google's new tool may make the NSA and other intelligence agencies' jobs more difficult. While end-to-end encryption does not eliminate the potential for an attacker or government agency to read a target's messages, it forces them to hack directly into their computer to read messages rather than catching them in transit, or gathering them through a secret court order to their communications provider.

Read MoreHacker hedge fund targets vulnerable companies

Speaking by videoconference at the South by Southwest conference in Austin, Tex., this year, Edward J. Snowden, the former N.S.A. contractor, challenged technologists to offer easier end-to-end encryption, saying it would result in a "more constitutional, more carefully overseen enforcement model."

Until now, technology companies have been hesitant to provide end-to-end encryption because it excludes companies like Google and Yahoo from gathering data from messages that can be sold for targeted advertising. None of the major technology providers have signed on to Dark Mail Alliance, a partnership announced last year by Silent Circle and Lavabit, two privacy-conscious communications providers, that offered companies like Microsoft, Google and Yahoo a new end-to-end encrypted email protocol.

More from The New York Times: iPhone 6 rumors heat up TV apps are soaring in popularity Google glass enters the operating room

Read this article:
Google's new anti-NSA encryption tool

Google plans end-to-end encryption tool for additional email privacy

In an apparent response to ongoing concerns about electronic communications being collected and read by government agencies, Google released its estimates of how much email is being sent, unencryptedas well as a tool to do something about it.

Googles transparency report indicates that about half of the email passed to its servers isnt encrypted, while about 65 percent of the email sent from Google elsewhere is. Googles Gmail service itself uses HTTPS and offers encryption from the browser, but that doesnt matter if its being sent to a provider that doesnt use it.

The important thing is thatbothsides of an email exchange need to support encryption for it to work; Gmail cant do it alone, Brandon Long, a member of the Gmail delivery team, wrote in a blog post. Our data show that approximately 40 to 50 percent of emails sent between Gmail and other email providers arent encrypted. Many providers have turned on encryption, and others have said theyre going to, which is great news. As they do, more and more emails will be shielded from snooping.

Numerous reports have surfaced, many sourced from documents leaked by Edward Snowden, about the governments intrusion into the email and digital information owned by Americans. The NSA collects email addresses and chat addresses; and allegedly read millions of private emailsin numerous programs reportedly dating back to the weeks after the Sept. 11, 2001 attacks.

The safermail report, then, acts as a sort of name and shame page for consumers. Email sent to and from the Comcast.net domain, for example, is almost always sent without encryption, while all email sent to the facebook.com domain is. (About 50 percent of emailfrom Facebook.com is unencrypted, however.)

The End to End extension, however, is designed to help users fight back. End to End is a future Chrome extension that will use OpenPGP to encase email in a secure wrapper that can be opened onlyby the recipient. Eventually, it will be released to the Chrome Web Store as a Chrome extension. For now, however, Google said it was encouraging developers to find, and report, any bugs before its general release.

We recognize that this sort of encryption will probably only be used for very sensitive messages or by those who need added protection, Stephen Somogyi, a product manager for Google, wrote. But we hope that the End-to-End extension will make it quicker and easier for people to get that extra layer of security should they need it.

The rest is here:
Google plans end-to-end encryption tool for additional email privacy

New Chrome extension hopes to demystify encryption

A promotional image from Google's new Transparency Report section on Web-based email. Google wants to make it harder to spy on webmail by encouraging more webmail providers to adopt serevr-to-server encryption. Google

Google launched a two-pronged attack against unencrypted email on Tuesday, divulging which webmail providers don't encrypt their customers' webmail in a new Transparency Report update, while making it easier for individuals to implement the tough email encryption standard known as Pretty Good Privacy, or PGP, with a new browser add-on called End-to-End.

An update to Google's Transparency Report published today introduces a new section called Safer Email. Based on traffic Google sees from Gmail, the section describes a world of webmail where only about half of all email sent is encrypted from server to server.

This is important because webmail that is sent between servers that has not been encrypted can be spied upon with relative ease, similar to the difference between sending a letter in an envelope and an open postcard. If the entire chain of communication isn't encrypted from the starting server to final destination server, the email essentially has no protective envelope.

When Google's webmail competitors don't provide server-to-server email encryption, it exposes Gmail users, too. Screenshot by Seth Rosenblatt/CNET

"Our data show that approximately 40 to 50 percent of emails sent between Gmail and other email providers aren't encrypted," wrote the Gmail Delivery Team tech lead Brandon Long, although he chose an encouraging tone over a scolding one.

"Many providers have turned on encryption, and others have said they're going to, which is great news," he wrote in a blog post announcing the update to the report.

Google wants webmail providers large and small to adopt Transportation Layer Security (TLS) to encrypt email and other data sent between its servers. While Gmail uses TLS in all its transmissions, Google's report says that currently, only 65 percent of messages sent from Gmail to other providers are received by a webmail provider using TLS. Messages sent to Gmail from other webmail systems fare even worse, with only 50 percent of them originating from companies that use TLS.

While Google's charts show that there's been a slight uptick recently, it's too recent to confirm as a trend. Google also provided interactive lists that chart which providers encrypt email in transit.

Google's Transparency Report charts show that some of the biggest offenders are major webmail vendors such as Microsoft, Apple, and Comcast. Screenshot by Seth Rosenblatt/CNET

See original here:
New Chrome extension hopes to demystify encryption

Gazzang buy gives end-to-end encryption for Cloudera Hadoop

IDG News Service - Cloudera will incorporate technology from its acquisition of encryption software provider Gazzang into Apache Hadoop so that industries with stringent security regulations can use the big-data processing platform.

Gazzang's technology will permit Hadoop use by organizations that have legal requirements to encrypt data across the entire system, said Mike Olson, Cloudera chief strategy officer. Terms of the acquisition, announced Tuesday, were not disclosed.

Regulations such as the health care industry's Health Insurance Portability and Accountability Act, retail's Payment Card Industry and Europe's Data Protection Directive, all require end-to-end encryption.

"Those folks need very strong security guarantees," Olson said.

Cloudera has already made Gazzang's encryption and key management software available for download to Cloudera customers and is folding the technology into the Cloudera Enterprise distribution.

Cloudera Enterprise already comes with many encryption capabilities -- for instance, data stored on the HDFS (Hadoop File System) can be encrypted.

But other parts of Hadoop do not have built-in encryption. Data that comes into the system from one of the streaming engines, such as Apache Sqoop, is not encrypted. Nor is metadata, the catalog data that describes the data being stored. Configuration information about a Hadoop cluster is not routinely encrypted either.

"There are pockets of data that need to be encrypted. Gazzang does that across the platform," Olson said.

Gazzang also provides a central, industrial-strength, registry for the keys used to encrypt and decrypt data.

"No vendor in the Hadoop space right now offers integrated security encryption and key management for the platform," Olson said.

Follow this link:
Gazzang buy gives end-to-end encryption for Cloudera Hadoop