Merkel Ally Says Snowden Would Face U.S. Extradition by Germany

Lawmakers from Chancellor Angela Merkels coalition are blocking an opposition bid to bring Edward Snowden to Germany to testify, saying the German government wont grant him safe passage.

Inviting Snowden to Germany would harm relations with the U.S. and probably force Merkels government to extradite him to face U.S. espionage charges for unveiling National Security Agency data on surveillance, Gerda Hasselfeldt, caucus leader of Merkels Christian Social Union ally, said in an interview.

If Mr. Snowden came to Germany, I see the risk that he would have to be extradited to the U.S. right after his testimony, Hasselfeldt said. Trans-Atlantic relations wouldnt exactly be improved either, she said.

Snowdens leak of NSA documents last year let to a rift between the U.S. and Germany when news reports of mass surveillance included allegations that the U.S. agency had tapped Merkels mobile phone. In Washington last week, Merkel said she and President Barack Obama still have differences of opinion on the scale of U.S. surveillance and intelligence cooperation between the two countries.

A parliamentary panel investigating what German media have dubbed the NSA affair voted yesterday to seek testimony from Merkel, former Chancellor Gerhard Schroeder and former cabinet members. It will also invite journalist Glenn Greenwald, who reported on Snowdens allegations, and officials from Facebook Inc. (FB), Google Inc. (GOOG) and Apple Inc. (AAPL)

The panel also agreed to seek testimony from Snowden, though coalition lawmakers blocked an opposition effort to bring the former contractor in person.

Opposition lawmakers on the committee from Green and Left parties said its mandate requires Snowdens presence. Snowden offered last October to testify to German authorities when he met a Green lawmaker, Hans-Christian Stroebele, in Moscow.

Testimony by video link would be as valid a personal appearance, Hasselfeldt said in the interview yesterday.

To contact the reporters on this story: Patrick Donahue in Berlin at pdonahue1@bloomberg.net; Arne Delfs in Berlin at adelfs@bloomberg.net

To contact the editors responsible for this story: Alan Crawford at acrawford6@bloomberg.net Tony Czuczka, Leon Mangasarian

Read more here:
Merkel Ally Says Snowden Would Face U.S. Extradition by Germany

IMA Public Lectures : Secrecy, privacy, and deception: the mathematics of cryptography; Jill Pipher – Video


IMA Public Lectures : Secrecy, privacy, and deception: the mathematics of cryptography; Jill Pipher
Secrecy, privacy, and deception: the mathematics of cryptography 7:00P.M., Wednesday, March 9, 2011, 2011, Willey Hall 175 Jill Pipher (Mathematics Departmen...

By: IMA UMN

Originally posted here:
IMA Public Lectures : Secrecy, privacy, and deception: the mathematics of cryptography; Jill Pipher - Video

World’s First Covert Communications System with Camouflage Guaranteed

Sometimes encrypting messages isnt enough, and the very act of sending them must be hidden as well. Now physicists have discovered how to camouflage messages and guarantee that they remain hidden.

The world of cryptography has undergone a quiet revolution in recent years. Thats largely because of the advent of techniques that exploit the laws of quantum mechanics to send messages with perfect privacy. So-called quantum cryptography ensures that an eavesdropper cannot decode a message under guarantee by the laws of physics.

But sometimes perfect privacy isnt enough. Sometimes the knowledge that a message has been sent is all that an adversary needs. So the question arises of how to hide a message so that an eavesdropper cannot tell whether it has been sent or not.

Read this article:
World's First Covert Communications System with Camouflage Guaranteed

China’s largest bank bars Bitcoin trading

SHANGHAI: Chinas biggest bank ICBC has banned activities related to trading in Bitcoin, joining at least 10 other Chinese banks participating in a government crackdown on virtual currencies.

Bitcoin, invented in the wake of the global financial crisis by a mysterious computer guru, is a form of cryptography-based e-money that can be stored either virtually or on a users hard drive, and offers a largely anonymous payment system.

Speculators drove Chinas Bitcoin prices into the financial stratosphere last year, peaking at 7,588.88 yuan (now US$1,224) in November, before they crashed following moves by exchanges, financial institutions and the government to rein in the virtual currency.

From this date, any institution or individual must not use accounts set up with our bank for the deposit and withdrawal and transfer of funds for Bitcoin and Litecoin trading, the Industrial and Commercial Bank of China (ICBC) said in a statement.

Litecoin is another virtual currency

The move aimed to protect the property rights and interests of the public, prevent money laundering risks as well as to safeguard the status of the renminbi as the legal currency, ICBC said, referring to Chinas yuan currency.

China tightly controls the yuan and enforces capital controls, which e-currencies threaten by their very nature.

ICBC threatened to suspend and close bank accounts if clients failed to comply with the new rules.

In its annual financial stability report released late last month, Chinas central bank labelled Bitcoin a tool for speculation and warned against risks the e-money could pose to capital flows as well as its possible use in illegal activities including drug dealing and money laundering.

Last month, the central Peoples Bank of China instructed banks and third-party payment providers to completely cut off the capital chain for Bitcoin trading, the Southern Metropolis Daily newspaper reported.

See the original post here:
China’s largest bank bars Bitcoin trading

Four weeks on, huge swaths of the Internet remain vulnerable to Heartbleed

Aurich Lawson / Thinkstock

More than four weeks after the disclosure of the so-called Heartbleed bug found in a widely used cryptography package, slightly more or slightly less than half the systems affected by the catastrophic flaw remain vulnerable, according to two recently released estimates.

A scan performed last month by Errata Security CEO Rob Graham found 615,268 servers that indicated they were vulnerable to attacks that could steal passwords, other types of login credentials, and even the extremely sensitive private encryption keys that allow attackers to impersonate websites or monitor encrypted traffic. On Thursday, the number stood at 318,239. Graham said his scans counted only servers running vulnerable versions of the OpenSSL crypto library that enabled the "Heartbeat" feature where the critical flaw resides.

A separate scan using slightly different metrics arrived at an estimate that slightly less than half of the servers believed to be vulnerable in the days immediately following the Heartbleed disclosure remain susceptible. Using a tool the researcher yngve called TLS Prober, he found that 5.36 percent of all servers were vulnerable to Heartbleed as of April 11, four days after Heartbleed came to light. In a blog post published Wednesday, he said 2.33 percent of servers remained vulnerable. It's important to remember the results don't include the number of Heartbleed-vulnerable servers providing services such a virtual private networks or e-mail.

Even more concerning, he said, was data showing the number of vulnerable Web servers running specialized encryption accelerators manufactured by F5 has held steady. The lack of a decline is most likely the result of new F5 BigIP systems coming online using unpatched versions of OpenSSL.

"As BigIP servers are used by sites serving large number[s] of users, this represents a significant security problem for those users," the researcher wrote. Also troubling, he said, was that of the vulnerable sites that have been patched in the past four weeks, as many as two-thirds of them may not have revoked their old digital certificates and regenerated a new one. As Ars explained previously, installing OpenSSL updates is only one step in the Heartbleed recovery regimen. Since the bug exposed private keys and passwords for more than two years, all vulnerable sites should assume their certificates are compromised and get new ones as soon as possible after upgrading.

An important proviso about the results of both scans: the estimates can be heavily skewed by the difficulty of probing millions of IP addresses or domain names, particularly when scans are carried days or weeks apart from each other. Graham said he suspects some servers have begun blocking his Heartbleed-detecting probes or that congestion inside the network of his ISP could throw off the accuracy of his findings. For the sake of comparison, a separate scan that surveyed 156,022 websites found 1,291 of them vulnerable to Heartbleed. Whatever scan is considered, the estimates are significant given the severity of the Heartbleed bug. The silver lining is that most big sites that were vulnerable have since been patched.

Read the original post:
Four weeks on, huge swaths of the Internet remain vulnerable to Heartbleed

Exclusive Interview: NSA whistleblower on what he’d do differently now

WASHINGTON, May 7 (UPI) -- The high-profile cases of Edward Snowden and Chelsea Manning have turned a microscope onto the U.S. intelligence community, launching a serious discussion on the balance of civil liberties in a post-9/11 world.

Secondary to Snowden and Manning's revelations, but perhaps no less important, was the treatment of the whistleblowers themselves: Snowden lives exiled, and without a passport, in Russia, while Manning faces 35 years in federal prison. Both saw grievous abuses within the U.S. government that they felt must be revealed, and both paid for their consciences with their freedom.

Thomas Drake, a former NSA executive, was more fortunate. Drake witnessed what he said were privacy and Fourth Amendment violations, as well as a massive waste of funding on the Trailblazer project, which collected intelligence data off the Internet. He initially took his concerns to internal authorities, including the NSA Inspector General and the Defense Department Inspector General, then to the staff of the House Intelligence and Oversight Committees. He also passed his concerns on to a reporter at the Baltimore Sun, carefully avoiding divulging classified information.

In 2007, Drake's home was raided by the FBI, in 2010, he was indicted by a grand jury and charged with illegally holding sensitive information, obstruction of justice and making a false statement. All along, he refused to plead guilty or help the government prosecute fellow whistleblowers.

The 10 charges filed against him under the Espionage Act were ultimately dropped, in exchange for a guilty plea on a misdemeanor count of misusing the NSA's computer system.

Drake has since worked as a privacy activist, speaking out against the surveillance state. In an interview with UPI this week, he talked about what it takes to blow the whistle on the U.S. government and just how difficult it is to do.

(This interview has been edited and condensed for clarity.)

UPI: What would you have done differently?

Drake: I would not have spoken with the FBI at all. I was speaking to them to report high crimes and misdemeanors; I was expecting them to come to my house for quite some time. I would have hired an attorney sooner.

Even though I made a conscious choice [to go through the proper channels], I didn't have to. Under the NSA portion [of the Intelligence Community Whistleblower Protection Act], I could go directly to the Department of Defense or directly to Congress and not inform the NSA. That was the statute that you would exercise if you had a responsible belief as a whistleblower. Now there's huge cutout: Any national security position is not covered by that act.

See the original post here:
Exclusive Interview: NSA whistleblower on what he'd do differently now

re:publica 2014 – WikiLeaks, Manning and Snowden: From USA to USB – Video


re:publica 2014 - WikiLeaks, Manning and Snowden: From USA to USB
Find out more at: http://14.re-publica.de/session/wikileaks-manning-and-snowden-usa-usb WikiLeaks journalist Sarah Harrison, who rescued Edward Snowden from Hong Kong, is interviewed by Alexa...

By: re:publica

Continue reading here:
re:publica 2014 - WikiLeaks, Manning and Snowden: From USA to USB - Video

OUTLAST Whistleblower [HD+] #01 – Edward Snowden! – Let’s Play Outlast Whistleblower – Video


OUTLAST Whistleblower [HD+] #01 - Edward Snowden! - Let #39;s Play Outlast Whistleblower
Zur Playlist: http://goo.gl/PD04MB Vlogs: http://goo.gl/884gRA Facebook: http://www.fb.com/MrPugnax Twitter: http://de.twitter.com/PugnaxLP Instagram: http://instagram.com/hips...

By: Pugnax

Visit link:
OUTLAST Whistleblower [HD+] #01 - Edward Snowden! - Let's Play Outlast Whistleblower - Video