A Refresher: Warrantless Spying Was Blatantly Illegal

Frontline's new documentary about NSA spying is an important reminder of how Bush officials violated the Constitution.

Reuters

The PBS program Frontline has produced an exceptional documentary on NSA spying, beginning with the September 11 attacks and continuing right up to today. The whole thing is worth watching.

The recent history it presents is shocking, even if, like me, you were already aware of it. Frightened by terrorism, George W. Bush,Dick Cheney, David Addington, Michael Hayden, and others conspired to spy on U.S. citizens without a warrant. Doing so was felony behavior.

This refresher on their actions persuades me anew that they deserved, and deserve, to be prosecuted for their actions and imprisoned for an appropriate duration. As well, these men violated their oath to defend and protect the Constitution.

Their illegal spying nearly prompted a mass resignation at the Department of Justice. Numerous government officials warned them that their actions were illegal and unconstitutional. This did not deter them. A number of patriotic bureaucrats objected to the surveillance program within the government, and when it continued, some of the went to the press. For a long time, The New York Times under then-Executive Editor Bill Keller kept this a secret.

The most surreal moment in the documentary comes when then Attorney General Alberto Gonzales, another Bush official who facilitated illegal warrantless surveillance, explained that he launched an investigation into the identity of the whistleblowers who leaked it to the press because "they broke the law," and "the job of the Department of Justice is to prosecute those who break the law."

As part of this investigation, former NSA employees who'd objected to the illegal program were suddenly confronted with FBI agents, guns drawn, raiding their houses. As a candidate, Barack Obama labeled the program illegal. After he was elected, Obama and Gonzales's successor Eric Holder presided over the persecution of people who exposed it. While opinions vary on Edward Snowden, its worth reflecting on the fact that this behavior is part of what prompted him to act.

More:
A Refresher: Warrantless Spying Was Blatantly Illegal

Condoleezza Rice defends NSA spying at tech conference

FILE - In this March 15, 2014 file photo, former Secretary of State Condoleezza Rice speaks at the California Republican Party 2014 Spring Convention in Burlingame, Calif. (Ben Margot/AP Photo)

SAN FRANCISCO -- Hundreds of venture capitalists and entrepreneurs heard a rousing defense of the National Security Agency from former Secretary of State Condoleezza Rice, who on Wednesday vigorously worked to justify the security complex created during her tenure in the White House and lambasted recent whistle-blowing efforts to expose the agency's spying programs.

Rice, who also served as national security adviser during George W. Bush's first tenure and is now a professor at Stanford University's Graduate School of Business, delivered the keynote address during the VentureScape conference in San Francisco. The conference, put on by the National Venture Capital Association, brings together venture firms, investment banks and entrepreneurs from across the country.

Rice spoke very little about venture or entrepreneurship, but did address two issues near and dear to the Silicon Valley tech community: privacy and security, and immigration.

On security, Rice staged a heated defense of the NSA, staking out a position sharply at odds with much of the tech community, whose leaders such as Facebook CEO Mark Zuckerberg have called on President Barack Obama to end programs that have allowed intelligence officers to collect data from Google, Facebook, Yahoo and other tech companies to spy on American citizens.

Just before Rice took the stage, Aneel Bhusri, co-CEO of Pleasanton-based cloud software company Workday, said it was a priority to "get the NSA out of technology."

Rice also pulled no punches for whistle blower Edward Snowden, the former NSA contractor who leaked information showing how the agency used spyware to collect data on U.S. citizens by monitoring their Internet activity and is currently living in Russia, where he has temporary asylum.

"Edward Snowden didn't go to work for Disney. What did he think the NSA did?" Rice said. "His shock to discover that the NSA was spying is a bit suspicious. It's also a bit suspicious that he ended up in Vladimir Putin's Russia."

Read the rest here:
Condoleezza Rice defends NSA spying at tech conference

Google Apps Users Can Now Get End-to-End Email Encryption

Google Apps accounts can now get end-to-end encryption for messages.

Image: Mashable composite Google

By Christina Warren2014-05-15 11:51:04 UTC

Google on Thursday announced a new partnership that will bring full scale encryption to Google Apps.

Working with email data protection company Zix, Google has launched a new commercial product for Google Apps accounts dubbed Google Apps Message Encryption (GAME).

Although Google already supports secure, encrypted messages within its servers, email messages sent to other systems are not encrypted.

Organizations or users can use various workarounds to add PGP (public-key cryptography) to their messages, but those solutions are kludgy and not ideal for an organization with lots of users.

With GAME, Google and Zix are hoping to change that. GAME is available for $35 a year per user and allows Google Apps admins to configure encryption settings and routes from the Google Apps dashboard.

In a post-Snowden world, it's easy to think email encryption is primarily useful to keep prying eyes (such as the NSA) from intercepting messages. For regulated industries however, encrypted communications are an important part of doing business.

Many of Zix's customers are hospitals, banks and government organizations and its product for compliance with federal regulations such as HIPAA, Sarbanes-Oxley and PCI-DSSS.

Original post:
Google Apps Users Can Now Get End-to-End Email Encryption

Aiming for secure big data, ADVA puts line-side encryption into its 100G networking gear

10 hours ago May. 14, 2014 - 11:37 PM PDT

ADVA Optical Networking, based in southern Germany, has released a new 100G technology for metro network deployments generally, connecting data centers within a metropolitan area that includes built-in encryption on the network layer.

The advantage of this kind of Layer 1 encryption is that it doesnt slow down the data throughput much, but rivals such as Cisco are not yet supporting super-speedy 100Gbps data rates with such a product ADVA, with the new version of its FSP 3000 optical transport solution, is. In short, this new multiplexer may hold appeal for enterprises and even telcos that want to be able to securely handle lots of data at high speed.

ADVAs 100G Metro tech is protocol-agnostic, so it can handle Ethernet, fiber, Infiniband and so on. Its line-side encryption is based on the Advanced Encryption Standard (AES) and uses 256-bit keys, with over 60 key exchanges an hour. As it encrypts not only the payload but also headers and checksums - nothing unencrypted for spooks and hackers to intercept its really for point-to-point setups and youd need an ADVA box on either end of the connection.

Whats impressive is that adding this encryption to standard 100G Metro products adds under 150 nanoseconds in latency, which isnt a lot. Handily for carriers, its also possible to separate the management of the network and encryption, which should make it easier to service enterprises that want to manage their own encryption over a leased service.

According to Uli Schlegel, ADVAs director of data center business development, the competition is at least a year behind on all this. Whether or not that bears out, its certainly interesting to see vendors baking encryption into modern, capacious networks in a way that doesnt overly affect throughput. Maybe big data and security can play nice after all.

Heres a slightly trippy ADVA video on the subject:

Subscriber Content

Subscriber content comes from Gigaom Research, bridging the gap between breaking news and long-tail research. Visit any of our reports to learn more and subscribe.

Visit link:
Aiming for secure big data, ADVA puts line-side encryption into its 100G networking gear

Blender 3D Tutorial – ToolShelf Tabs Custom Add-On Panel is Missing Buttons by VscorpianC – Video


Blender 3D Tutorial - ToolShelf Tabs Custom Add-On Panel is Missing Buttons by VscorpianC
Blender open source software; Loading factory settings after customizing Toolbar Tabs makes the Add-On panel buttons disappear...here #39;s how to fix this. VscorpianC.

By: VscorpianC

Follow this link:
Blender 3D Tutorial - ToolShelf Tabs Custom Add-On Panel is Missing Buttons by VscorpianC - Video

Protecting against Heartbleed attacks

May 13, 2014 // Nick Flaherty

Microsemi is seeing the Heartbleed SSL vulnerability as an opportunity for its cryptography key management plugin and drop-in replacement for OpenSSL.

Page 1 of 2

The Heartbleed vulnerability in OpenSSL is one of the most devastating hosted server-side vulnerabilities of all time, said Michael Mehlberg, vice president of security products management at Microsemi. Though a patch was quickly released, there is no guarantee server keys will not be compromised through similar vulnerabilities discovered in the future. Microsemis WhiteboxSSL product is more than a patch; it is a fundamental solution to the security problems related to generating, storing, and transferring crypto keys through networked systems. With WhiteboxSSL, server keys are substantially better protected against memory attacks.

WhiteboxSSL provides security for server keys in memory and at rest. Designed for IT administrators who are responsible for maintaining the IT security infrastructure, the white box cryptography key protection techniques enable them to protect the keys generated and managed by servers running the popular OpenSSL software.

WhiteboxSSL replaces vulnerable key libraries found in OpenSSL, and is packaged as a complete OpenSSL implementation or plugin, and is also packaged with MicroSemis FPGA technology for embedded designs. It uses typical OpenSSL cryptography algorithms such as AES, ECC, SHA, and RSA; each is uniquely obfuscated to an individual server. That is, every user of WhiteboxSSL has a uniquely constructed key algorithm preventing an attacker from creating a break-once-run-everywhere attack.

According to Netcraft, OpenSSL is used on 66% of the active websites on the Internet today, and approximately 17% of those sites were exposed to the Heartbleed bug. A typical server running OpenSSL will generate thousands of keys in its lifetime. These keys are critical to securing the data stored and transferred through that system. Compromising these keys can lead to major breaches in privacy, exposure to sensitive user data, and even loss of company IP. Microsemis WhiteboxSSL enhances and complements its field-tested WhiteboxCRYPTO providing the capability to protect OpenSSL-generated keys with complex crypto-algorithm obfuscations and key transformations rendering attempts to capture network keys impractical given the tools available to a network-based attacker.

Authentication & Encryption,Embedded tools

See the article here:
Protecting against Heartbleed attacks

Such hack, much sad: Doge Vault reportedly loses $56,000 in heist

On Tuesday, Doge Vault, one of the most popular online repositories for the cryptocurrency Dogecoin, formally acknowledged that it had been hacked two days earlier.

On the 11th of May, the Doge Vault online wallet service was compromised by attackers, resulting in a service disruption and tampering with wallet funds, the site wrote.As soon as the administrator of Doge Vault was alerted, the service was halted. The attackers had already accessed and destroyed all data on the hosted virtual machines.

While Doge Vault hasnt officially said how much was lost, a newly created Dogecoin wallet shows that 121,550,030 dogecoins have been transferred into it over the last 24 hours. At present exchange rates, thats worth about $56,000.

The company did not immediately respond to further questions, nor did it provide additional details about who the perpetrators might be.

Dogecoin first debuted in December 2013. Unlike Bitcoin and other altcoins, Dogecoin has no hard cap as to how many coins will be mined. It's just the latest cryptocurrency to suffer from attacks that pilfer wallets from exchanges and end users. Recently, such attacks have become extremely commonas a result of people failing to heed best practices that dictate only a small amount of currency should be stored in 'hot' wallets. In fact, the growth of cryptocurrency theft in recent years has even led to attacks becoming an automated feature of some botnets.

For a more detailed account of how such pilfering attacks operate, Ars covered a similar incident that happened to Bitcoinia in 2012.

Read the original:
Such hack, much sad: Doge Vault reportedly loses $56,000 in heist

WikiLeaks’ Manning may get gender therapy in prison

In this undated file photo provided by the U.S. Army, Pfc. Chelsea Manning poses for a photo wearing a wig and lipstick. (AP Photo/U.S. Army, File)

WASHINGTON (AP) Defense officials say the Pentagon is trying to transfer convicted national security leaker Pvt. Chelsea Manning to a civilian prison so she can get treatment for her gender disorder.

Manning, formerly named Bradley, was convicted of sending classified documents to anti-secrecy website WikiLeaks.

The soldier has asked for hormone therapy and to be able to live as a woman. Transgenders are not allowed to serve in the U.S. military and the Defense Department does not provide such treatment.

But officials say Defense Secretary Chuck Hagel has given the Army approval to work on a transfer plan with the Federal Bureau of Prisons, which does provide treatment for transgender inmates.

The officials werent authorized to discuss the case and spoke anonymously.

Read more here:
WikiLeaks’ Manning may get gender therapy in prison

Chelsea Manning might be moved to civilian prison

JEDDAH

The Associated Press on Wednesday reported that defense officials were trying to transfer Chelsea Manning, who seeks to live as a woman, to a civilian prison to facilitate that treatment.

Defense officials said that one option under consideration was transferring Manning to a civilian prison.

Manning is serving her sentence in all-male detention facilities at the U.S. Disciplinary Barracks at Fort Leavenworth, Kan.

Last year, Manning was sentenced to 35 years in prison for providing more than 700,000 documents, videos, diplomatic cables and battlefield accounts to WikiLeaks in the biggest breach of classified materials in U.S. history.

Manning worked as an intelligence analyst in Baghdad when she gave WikiLeaks the government material, which also included a 2007 video of a U.S. Apcache helicopter firing at suspected militants in Baghdad, killing two Reuters employees.

More here:
Chelsea Manning might be moved to civilian prison