Father of the Web Meets a Robot Edward Snowden, Calls Him a Hero

Edward Snowden made a surprise appearance at TED today, telling the mostly supportive crowd to expect more revelations from his vast cache of secret National Security Agency documents.

The NSA whistleblower took to the stage during the conferences second day via a video chatbot he controlled from what TED organizer Chris Anderson called an undisclosed location. Snowden said there are still revelations to be made and stories to be told about the intelligence agency. I dont think theres any question that some of the most important reporting to be done is yet to come, Snowden said, just one week after appearing at SXSW in Austin, Texas.

To people who have seen and enjoyed the free and open internet, its up to us to preserve that liberty for the next generation to enjoy. Edward Snowden

Rather than the traditional 18-minute TED talk, in which a single speaker addresses the audience, Anderson essentially interviewed Snowden. Through a strikingly clear connection, the bot-ified Snowden was poised and good-humored as he called on tech companies to make SSL encryption the default for browsing the web. To people who have seen and enjoyed the free and open internet, its up to us to preserve that liberty for the next generation to enjoy, he said.

Anderson suggested that Snowdens sentiments parallel those of Tim Berners-Lee, the inventor of the web, who has recently used the 25th anniversary of the world wide web to call for an internet bill of rights. But because this was TED, Anderson didnt have to speculate on the similarities between the goals of Snowden and Berners-Lee. He simply brought Berners-Lee on stage to find out.

Asked by Anderson whether he thought Snowden was a traitor or a hero, Berners-Lee went with hero, if you have to make the choice between the two. Snowden said internet rights were not just about principles but about technology. I believe a magna carta for the internet is exactly what we need, Snowden said. We need to encode our values not just in writing but in the structure of the internet.

Berners-Lee told Snowden that his hope on the webs 25th anniversary was to get everyday users who dont normally consider the internet in terms of rights to consider the web they really want. He asked Snowden how he thought the web would best work. When we think about it in terms of how far we can go, I think thats a question thats limited only by what were willing to do, Snowden said. I think the internet that weve enjoyed in the past has been exactly what we, not just as a nation but as a people around the world, need. If the webs technologists can truly enlist the webs casual users as allies, he said, well get not just the internet weve had, but a better internet.

At the end of Snowdens appearance, Anderson stuck a TED conference badge on Snowndens bot and invited him to stick around for the week. With that, he rolled offstage, accompanied by his lawyer.

Visit link:
Father of the Web Meets a Robot Edward Snowden, Calls Him a Hero

Snowden: Big revelations to come, reporting them is not a crime

Snowden on stage at the TED 2014 conference in Vancouver on Tuesday.

Edward Snowden made a surprise appearance on the TED stage in Vancouver todayusing a Beam telepresence robot from "somewhere in Russia."

Snowden, in his second remote talk in eight days after an appearance at SXSW Interactive in Texas, urged online businesses to encrypt their websites immediately. "The biggest thing that an Internet company in America can do today, right now, without consulting lawyers, to protect users of the Internet around the world, is to enable Web encryption on every page you visit," he said. "If you look at a copy of 1984 on Amazon, the NSA can see a record of that, the Russians, the French canthe world's library is unencrypted. This is something we need to change, not just for Amazonall companies need to move to an encrypted browsing habit by default."

Snowden said the leaks from his document cache would continue. "There are absolutely more revelations to come," he said. "Some of the most important [publishing] to be done is yet to come."

He argued against personalizing his own role in leaking the documents to prompt debate. "Who I am really doesn't matter at all. If I'm the worst person in the world, you can hate me and move on. What really matters is the kind of Internet we want, the kind of relationship with society... I wouldn't use words like hero or traitor. I'm an American and a citizen."

"What Boundless Informant tells us is more communications are being intercepted in America by Americans than in Russia by Russians."

He said he struggled to find a way to leak the intelligence documents in as responsible a way as he could. "We did a lot of good things in the intelligence community. But there are also things that go too far... decisions made in secret without the public's awareness, the public's consent... When I really came to struggle with these issues, I thought to myself, how can I do these things in the most responsible way?" That was through responsible media. "The first amendment of the US constitution guarantees us a free pressto challenge the government but also to work together with the government, without putting our national security at risk. By working with journalists, by putting all of my information to the American people, we've had a robust debate with a deep investment by the US government, which is resulting in benefits for everyone." There has been no evidence "of even a single incident" whereby the leaks have caused harm.

He said the NSA's PRISM program allowed the US government to "deputize corporate America to do its dirty work for the NSA." "Much of the debate in the US [about PRISM] is it's just [about collecting] metadata. PRISM is about content. Even though some of these companies, Yahoo's one, challenged them in court, they all lostthey weren't tried by an open court but a secret court. Fifteen federal judges have reviewed these programs and found them to be lawful, but what they don't tell you is these are secret judges in secret courts of law." These courts had received 34,000 requests to access information and turned down just 11, he said. "These aren't the people we want deciding what the role of corporate America should be."

The NSA "intentionally misleads corporate partners," he said. One program, Bull Run, targeted America's own superstructure in dangerous ways, he said, after being dishonest to Internet companies. "They say, 'hey, we need to work with you to secure security systems.' In reality, they're giving bad advice to these companies. They're building in back doors. This is really dangerousif we lose the trust of something like SSL [encryption], which was specifically targeted, we won't be able to access banks, commerce, without worrying about people monitoring those communications."

"People should be able to pick up the phone and call their family, should be able to send a text message to their loved one, buy a book online, without worrying how this could look to a government possibly years in the future."

Read more:
Snowden: Big revelations to come, reporting them is not a crime

Edward Snowden: The Biggest Revelations Are Yet to Come

Edward Snowden made an unscheduled appearance at TED 2014 in Vancouver on March 18.

Image: Amanda Wills, Mashable

By Amanda Wills2014-03-18 14:48:26 -0300

VANCOUVER, Canada Edward Snowden on Tuesday said the biggest revelations have yet to come out of the estimated 1.7 million documents he acquired from the National Security Agency.

In a surprise appearance via satellite robot at the 2014 TED conference in Vancouver, Snowden said there is still a lot of reporting to be done, including diving deeper into the accusation that the NSA tricks companies into building backdoors into their systems that make data vulnerable to hackers across the world.

"Is it really terrorism that we're stopping? I say no," Snowden said. "The bottom line is that terrorism [...] has always been a cover for actions. Terrorism evokes an emotional response."

Snowden, who is still in hiding somewhere in Russia, maintained that his act wasn't reckless and that he did it all for the American people. He also said he would love to return to the United States if granted immunity.

"I don't want to harm my government" he said. "The fact that they're willing to ignore due process and declare guilt without a trial [...] these are things we need to work against as a society."

Snowden remains a controversial figure throughout the world, but he was speaking to the right crowd at TED. When Anderson asked the audience who disagreed with Snowden's actions, only a few hands shot into the air. When he asked if the room felt Snowden was right in handing over the NSA's secret, the audience erupted with applause. Tim Berners-Lee, a man widely credited with inventing the World Wide Web, then stepped on stage to talk with Snowden.

He called him a "hero."

Excerpt from:
Edward Snowden: The Biggest Revelations Are Yet to Come

Keys to the castle: Encryption in the cloud

''We need to be cautious that, similar to the promises of PKI several years ago, the market is ready and the technology robust enough to service client demands'

In a bid to reassure customers following revelations of government intelligence agency snooping in 2013, cloud service providers including Google and Amazon have rushed out free automatic server-side encryption on their cloud services - and not before time.

The move has been seen by many as a positive one for companies that are mandated to protect customer data when running a business application on Google, but it could equally be argued that encouraging them to leave encryption in the hands of the cloud provider is a step in the wrong direction.

While it's obvious that Google and others are covering their own backs and jumping on the marketing opportunity of NSA-related paranoia by having these security processes in place, it's not exactly clear just how adequate their server-side measures are.

After announcing in August last year that it would be automatically encrypting all data on its cloud storage platform before it is written to disk, Google added that it would still advise data to be encrypted at the user end for those who prefer to manage their own encryption keys, emphasising that the responsibility for risk management still legally lies with the customer.

Jamal Elmellas, technical director at data security specialist Auriga, strongly advises that organisations should be wary from the outset of cloud providers with proprietary encryption software and mechanisms, especially those that retro-fit encryption to their already established solutions.

Encryption should be intrinsic to the solution, says Elmellas. It should be considered from the outset by the provider, and this enables them to offer a solution which applies the most appropriate type of encryption to the right parts of the infrastructure.

Processes, logging, auditing and total involvement by the customer are a few of the ways that risks can be minimised when outsourcing encryption, but for companies handling sensitive data, encrypting everything themselves may seem like the safest bet.

However, as Elmallas explains, this option opens up a whole new complex set of considerations.

Read this article:
Keys to the castle: Encryption in the cloud

Your U.S. government uses open source software, and loves it

Writing the words government and open source in the same sentence feels inherently wrong, almost as if lying. Recent talk of the NSA, Edward Snowden, and PRISMdoesnt make the government seem any more open. The government carries the stigma as being on of the least open things in the world. If youre a fan of House of Cards on Netflix, you understand just how not open the government is perceived to be. Yet contrary to popular belief, the government is using open source as a tool to improve agencies on the back-end and save tax dollars.

. More of the government is using open source than you may realize. To quote OpenSource.com, While the U.S. government has, to date not issued guidance requiring a preference for open source, it has clearly indicated that open source products are to be given at least as much preference as proprietary products.

OpenSource provides an example of the successful use of open source by the a U.S. government agency, with the U.S. Department of Veterans Affairs (VA). It is the second largest agency of the U.S. federal government, employing more than 280,000 people and providing health care services to almost 8.7 million patients, benefitting close to 23 million veterans. The VA also operates the nations largest health care system with more than 1,700 hospitals, clinics, community living centers, and other facilities. And the VA also happens to be one of the largest users in the federal government adopting Open Source Software (OSS).

Wes Caldwell. Image via LinkedIn

To give you more insight as to the governments use of open source software, we sat down with Wes Caldwell, Chief Architect, Intelligent Software Solutions (ISS). ISS provides the federal government and the Department of Defense with data visualization, event analysis and pattern detection software. The company places a heavy emphasis on OSS applications and affordable government off-the-shelf (GOTS) products, which make it easier for government agencies to integrate into their networks and keep them from having these inflexible programs that lead to huge cost overruns.

The following is an excerpt from a recent interview with Caldwell, who shares his thoughts on the benefits of OSS in the US government, as well as suggestions on how the country can tackle remaining obstacles to OSS adoption.

What are 2-3 immediate benefits for government agencies using open source?

.

Can you give examples of the Pentagon or other government agencies using open source?

Read more:
Your U.S. government uses open source software, and loves it

Open source project builds mobile networks without big carriers

Steven Max Patterson | March 18, 2014

Data centers, mobile phones, and the software industry have all been changed by open source. Are mobile networks next?

Open source projects garner the attention of the tech community because the passionate people behind these developments occasionally cause major disruption and create opportunities to change industries, as Android and Linux did. An open source project with the goal of changing how mobile networks are built, from expensive proprietary hardware to cheap commodity hardware - just as mainframe data centers moved to commodity X86 hardware - is certainly worth a deeper look. Learning that former Cisco CTO Ed Kozel is leading the venture, Range Networks makes it worth a deep dive.

For now at least, Range Networks isn't trying to compete with NSN, Ericsson, Huawei and Alcatel-Lucent. The company is looking for underserved areas that need a low-cost alternative to the big mobile network solutions designed for big mobile carriers. Range Networks' OpenBTS has been used to build a temporary mobile network serving 1,200 people over a 10-square-kilometer area at the 2011, 2012, and 2013 Burning Man festivals, as well as permanent mobile networks in Antarctica and Papau Indonesia.

The core of Range Networks innovation is an open source OpenBTS 3G GSM stack and a software defined radio (SDR) covering the 700 Mhz to 2.5 Ghz bands. Range Networks has plans to add 4G and LTE, but in the meantime a visitor to Papau Indonesia, where there has never been mobile phone service, would have to feel extremely entitled to complain about slow 3G Facebook download speeds.

OpenBTS runs on standard X86 hardware that can be packaged in an environmentally hardened enclosure to withstand the elements. Range Networks' engineering team includes not only open source software hackers, but open source hardware hackers too. The SDR is designed by the company's engineers and all the specifications, schematics, and production data have been made available under open source BSD, Creative Commons, and GPL licenses at OpenBTS.org, so other manufactures can improve and produce it in volume at reduced cost.

The Tier project at the University of California Berkeley is a great example of the value of Range Networks' open source model. UC Berkeley researchers have built software that runs on handsets and OpenBTS that samples the airwaves to find unused radio spectrum, called white spaces, that are free of interference from other types of radio broadcasts. Once the white space is identified, it can be used for voice and mobile data services. Because UC Berkeley built it with OpenBTS, the white space functionality is contributed back into OpenBTS.

Use of white space radio spectrum is of interest to anyone who builds any type of product that uses radios. Government radio spectrum regulators, like the FCC, auction radio spectrum for billions of dollars to commercial users. But the regulators often reserve some spectrum for free public use. If public spectrum is detected as unused by OpenBTS, it can be added to the white space table and used for voice and data. The regulations and exact use of radio spectrum differ from country to country, but a socially or financially motivated entrepreneur could build a mobile network inexpensively in an underserved part of the world using OpenBTS if he or she could identify white space.

1 2 Next Page

Read the original here:
Open source project builds mobile networks without big carriers