Colbert turns his funny gun on Snowden in RSA keynote

No joke: Stephen Colbert's not a fan of Edward Snowden's whistleblowing, the political satirist tells a packed house at the closing RSA Conference keynote speech.

Stephen Colbert kept San Francisco's Moscone Center audience of around 6,000 laughing as he mocked the state of computer security and expressed a vote of no-confidence in Edward Snowden on Feb. 28, 2014.

SAN FRANCISCO -- Don't mistake this for something out of the mouth Stephen Colbert's ultra-conservative, Bill O'Reilly-modeled TV persona: The popular funnyman actually believes that former NSA contractor and domestic spying whistleblower Edward Snowden should come back to the US and face trial.

In front of more than 6,000 people at the RSA Conference's closing keynote at the Moscone Center here, Colbert had the audience roaring within minutes over his computer security and encryption jokes.

Colbert described the conference jokingly as a place where the best security experts "gather, talk shop, and breed with each other. That's called exchanging private keys."

He quickly changed the subject to address the petition that demanded that he join the RSA Conference boycott over the conference's parent company colluding with the National Security Agency.

Colbert said that he had signed a contract with RSA that he wasn't going to break, in part because, he was "paid in Bitcoin, from Mt.Gox."

Then he got serious. There was "no evidence in Reuters' story," he said of the original report that broke the news.

"Documents leaked by former NSA contractor Edward Snowden show that the NSA created and promulgated a flawed formula for generating random numbers to create a "back door" in encryption products," wrote reporter Joseph Menn in the story.

Menn then cited two anonymous sources who said they were familiar with the $10 million contract between the NSA and the RSA division that promoted the flawed encryption as the default encryption to use in RSA's BSafe encryption tool.

See the article here:
Colbert turns his funny gun on Snowden in RSA keynote

What James Clapper Doesn’t Understand About Edward Snowden

The director of national intelligence says he can't understand the leak nor guarantee there won't be another one. So why should we trust the NSA with sensitive data about Americans?

Reuters

If you've been wondering how James Clapper, the director of national intelligence, experienced the Edward Snowden leaks, look no further than Eli Lake's latest. The sympathetic profile, published Sunday atThe Daily Beast,is interesting throughout. Two of its passages struck me as particularly noteworthy.

1) The first passage to consider is alluded to in the headline, "Spy Chief James Clapper: We Cant Stop Another Snowden." The article reports the following:

Clapper also acknowledges that the very human nature of the bureaucracy he controls virtually insures that more mass disclosures are inevitable. In the end, he says, we will never ever be able to guarantee that there will not be an Edward Snowden or another Chelsea Manning because this is a large enterprise composed of human beings with all their idiosyncrasies.

Consider the implications of that admission.

The NSA has collected information about the communications of millions of Americans. Nefarious actors, given access to metadata from the phone dragnet alone, could blackmail countless citizens and quietly manipulate the political process. The NSA doesn't deny that. They just insist that they're not nefarious actors, that safeguards are in place, and that we should trust them as stewards of this data.

Well, here is Clapper telling the truth: Despite regarding Chelsea Manning and Edward Snowden as having done grave damage to the United States with their data thefts, he can't guarantee the same thing won't happen again. And if a future whistleblower could gain access to the most sensitive data, so could a blackmailer.

So could a foreign spy.

Data retention of this sort, whether carried out by the NSA or telecoms, poses a grave threat to privacy, in part because neither the NSA nor the telecoms can guarantee that the highly sensitive information they collect on us won't be stolen. "To this day," Lake writes, "the U.S. governmentdoesnt knowthe full extent of what Snowden revealed or whether more documents that have yet to be published in the press have made their way into the hands of Russian or Chinese intelligence."

Go here to read the rest:
What James Clapper Doesn't Understand About Edward Snowden

"UK media worse than the US!" – Freedom of the press in Britain under fire – Video


"UK media worse than the US!" - Freedom of the press in Britain under fire
Watch the full episode here: http://bit.ly/1cf3PLn Investigative journalist Russ Baker tells Going Underground host Afshin Rattansi why the UK will never get any answers on GCHQ and NSA spying...

By: goingundergroundRT

See the original post here:
"UK media worse than the US!" - Freedom of the press in Britain under fire - Video

Amazon’s Cloud Keeps Growing Despite Fears of NSA Spying …

When former government contractor Edward Snowden revealed that the NSA was conducting digital surveillance on a massive scale, many feared for the future of cloud computing. The Information Technology and Innovation Foundation estimated that Snowdens revelations could cost U.S. cloud companies $22 billion to $35 billion in foreign business over the next three years, and countless pundits predicted that American businesses would flee the cloud as well. People would prefer to run software and store data on their own computers, the argument went, rather than host their operations atop outside services potentially compromised by the NSA.

But it looks like the cloud industry is still growing. And in very big way.

The worlds largest cloud computing services services where you can run software and store data without buying your own hardware are run by Amazon, and according to a new study from independent researcher Huan Liu, Amazons operation grew by a whopping 62 percent over the past two years. Whats more, the study shows that growth has been steady since June 2013, when the Snowden revelations first hit the news. In fact, theres been a surge since December of last year.

Lius research does not look at services from Amazon rivals such as Google, Microsoft, or Rackspace. But Amazon is the best barometer for the market as a whole. Software running on Amazon Web Services may account for as much as 1 percent of North American traffic, according to data collected by DeepField Networks, and about one-third of all North American internet users visit at least one site hosted in the Amazon cloud each day.

Liu, the co-founder of a mobile fitness startup called Jamo, first looked into the size of Amazons cloud during his spare time two years ago. He says he did the study just for fun it feels good to be the first one to discover something, he says but his methodical approach provides a rare glimpse into the size and growth of Amazons empire.

Amazon doesnt disclose how many servers it runs, or how much money the service makes. Even in its quarterly earnings reports, cloud revenue is lumped in with money earned from other sources. But Liu noticed a pattern in the way Amazon organized its internet addresses that revealed which addresses were part of the same rack. Since the company publicly lists all its externally facing IP addresses, Liu could determine the total number of racks in the Amazon cloud. He says his method is limited to racks that actually include active applications, so any additional infrastructure that Amazon has installed but not yet used doesnt show up in the study. Liu was originally trying to measure the size of Amazons flagship Elastic Compute Cloud, but its possible that some of the racks are used by other services as well.

Two years ago, he estimated that Amazon had about 450,000 servers, based on an assumption of 64 servers in a rack. But even if we dont know the number of servers in each rack, knowing the number of racks helps us get a sense of the size of the Amazon cloud and its rate of growth.

Amazon runs data centers in several different geographical locations. Two years ago, Liu that the noticed that the U.S. eastern region was much larger than all other Amazon regions, and thats still true today. But the other regions are now growing faster. Oregon saw the biggest increase, growing from 41 racks to 904 in the same period. But Liu also sees growth outside the U.S. Brazil has been one of the most vocal critics of NSA surveillance, but Sao Paulo was Amazons second fastest growing region, ballooning from 25 racks to 122 between March 2012 and February 2014.

Certainly, there are good reasons for businesses to be wary of putting their software and data on such services either in the U.S. or on foreign soil. Hosting data on Amazon servers in Brazil rather in the states may help protect customers from some types of surveillance from the U.S. government, but it may not prevent all. And American companies operating on foreign soil such as Amazon in Brazil are still bound by the U.S. Patriot Act to hand over data if its requested by the government. People have been grappling with this conundrum for years. But there are also dangers in hosting software with foreign operations or even on your own servers. These cloud issue is hardly cut and dry.

What we can say is that the cloud is still growing despite the NSA.

Go here to see the original:
Amazon's Cloud Keeps Growing Despite Fears of NSA Spying ...

Encryption Would Have Stopped Snowden From Using Secrets

Edward Snowden could have been thwarted from leaking classified U.S. documents if the National Security Agency encrypted the information to make it unreadable, two former senior cybersecurity officials said.

Snowden would have needed a digital key to decipher the secrets after gaining access to them if the data was scrambled, Ira Gus Hunt, former chief technology officer for the Central Intelligence Agency, and Howard Schmidt, a former U.S. cybersecurity coordinator, said in interviews yesterday at a conference in San Francisco.

Snowden, a systems administrator working for NSA contractor Booz Allen Hamilton Holding Corp. (BAH), probably would have been exposed if hed tried to get decryption keys, they said.

We have to get to the point where the data itself, independent from the systems, is appropriately protected everywhere all the time, said Hunt, who left the CIA in October and is on the advisory board at eSentire Inc., a Cambridge, Ontario-based security software company.

My goal would be that all data is encrypted everywhere all the time. The only way data can move in the system, at rest or in transit, is in an encrypted form.

The documents Snowden obtained and leaked to the Washington Post and the U.K.s Guardian newspaper exposed secret NSA programs, including the collection of billions of bulk phone records from Verizon Communications Inc. (VZ) and other carriers and the hacking of fiber-optic cables abroad to steal e-mail and Internet data from Google Inc. (GOOG) and Yahoo! Inc. (YHOO) U.S. prosecutors last year filed theft and espionage charges against Snowden, who has since been living in Russia under temporary asylum.

Google, Yahoo and Facebook Inc. (FB), among other companies, have since strengthened encryption on data flowing through their networks and made their digital keys more complex. Encryption uses a mathematical code to scramble data.

Vanee Vines, an NSA spokeswoman, declined to comment. Outgoing NSA Director Keith Alexander, in testimony yesterday to the U.S. Senates armed services committee, said the agency has made 40 changes in its systems, developed better insider-threat detection capability and conducted more random security checks.

A NSA civilian employee allowed Snowden to use his encrypted digital certificate to access classified information, according to a Feb. 10 letter the NSA sent to the House Judiciary Committee. The employee resigned, according to the letter.

Snowden encrypted the data after he stole it. The documents he exposed revealed the NSA has tried to weaken common encryption standards and is developing a computer capable of breaking encrypted data.

Read more:
Encryption Would Have Stopped Snowden From Using Secrets

The Commercial Case for Open Source Software

This post is written in association with Pentaho, a commercial open-source (COSS) provider of reporting, analysis, dashboard, data mining and data integration software.

The history of open source has already been written and rewritten a couple of times, so there's no need to go back to Genesis chapter one and revisit Linus Torvalds' "just a hobby, won't be big" comments too often.

But open source became more than the sum of its parts and the hobbyists grew successful in domains that traditionally belonged to their proprietary relatives.

Historical Note: If you do still want the history of open source, then the YouTube hosted Revolution OS is about 100 minutes of the best open development commentary you will find.

Open source grew up, we know that part. With a rich pedigree of success in the server room, open platforms eventually moved upwards through the commercial sector and across to government in many developed nations.

What open source in these (and other mission-critical implementations) demands is not only the strong active developer community that typifies any open code base - it also very often needs a level of expert support and maintenance that works at a more formalized level than that which is available for free through the community. This especially applies to teams that are trying to solve hairy' problems for which skills are in short supply, like blending and analyzing diverse, big' data sets.

Support and maintenance are important, but there's another factor here.

Locked Down, Demarcated Openness More specifically (and more technically), open code is built with inherently dynamic libraries that are subject to change and community contribution at any time. However, commercial versions of open source software are always locked down and demarcated at the point of sale and therefore not subject to these dynamic changes.

This means that when organizations like NASA and the Met Office (arguably mission critical') use commercial open source software, they are able to define the exact static form and function of applications at the point of installation.

See the article here:
The Commercial Case for Open Source Software