Guess Who’s Coming to Dinner? The NSA

NSA Director Keith Alexander is on the guest list for the White House state dinner.

President Barack Obama has been fending off international criticism about the NSA spying on foreign leaders, but French President Francois Hollande must not mind as much, as NSA Director Keith Alexander is on the guest list for Tuesday's banquet honoring the visiting leader.

It might not have been a good idea to have Alexander drinking wine in the same dinner party if the guest instead was German Chancellor Angela Merkel, who has beenoutraged in recent months following reports that the NSA monitored her phone.Brazilian President Dilma Rousseff canceled her state visit to the U.S. in 2013 following reports that the NSA spied on her phone calls.

[ALSO:White House Calls on Colbert and Cooper for French Fling]

No reports have indicated whether the NSA monitored Hollandes phone calls, but the French president seemed at ease speaking about U.S. surveillance during a joint news conference with Obama on Tuesday. Hollandes visit with Obama is an effort by the two leaders to show a stronger international partnership following tensions that spiked during the Bush administration, when France refused to join the U.S. in the 2003 invasion of Iraq.

Hollande said during the news conference on Tuesday that he and Obama are increasing their partnership in the fight against terrorism and "mutual trust has been restored" between the leaders following the NSA spying reports.

"Mutual trust must be based on respect for each other's country, but also based on the protection of private life, of personal data," Hollande said.

Read more:
Guess Who's Coming to Dinner? The NSA

A Deeper look into NSA spying: Watch Jacob Applebaum Videos

YouTube Videos Tweets Comments

This post originally appeared on securitycurrent.

The reactions to the depth and scope of the NSAs surveillance apparatus has varied from ho-hum, thats their job, to OMG its the end of the world as we know it! Somewhere in the middle is the slow-boil rage that is going to transform the IT industry.

If you are of the ho-hum mindset that is perplexed at the outrage, even looking down at those that are so naive in their surprise at NSA surveillance, you should watch these videos of Jacob Applebaum.

Applebaum is a security researcher best known for his involvement with the anonymizing Tor network but also famous for breaking Apples File Vault encryption system. He came under the spotlight for his advocacy of Wikileaks, which reportedly led to his Twitter account being subpoenaed by the US Justice Department in 2010. Applebaum has been subject to numerous detentions at US borders; every travelers nightmare expectation. He believes that he is under constant surveillance and that his apartment in Berlin, where he resides now, was subjected to a black-bag job.

With that as background watch this presentation at the recent Chaos Computing Conference in Germany. Applebaum itemizes some of the more spooky capabilities of the NSA that appeared in a seminal article in Der Spiegel the same day. It was an article that he helped write as he is one of the few technical people who has had access to the trove of Snowden documents.

[Note: Contains Classified Material]

Watch it to the end. Your lack of surprise will begin to turn to shock.

Next watch this meeting which occurred at the Whitney Museum of Art in April, 2012, well before the Snowden June 6 revelation of the NSAs secret collection of meta data from Verizon. Jake Applebaum interviews Bill Binney, one of the ThinThread whistleblowers. ThinThread was a data capture and analysis project of the NSA that was abandoned post 9/11 in favor of TrailBlazer.

Binneys presentation skills are no match for Applebaums but pay particular attention to the clips they show of Congressional testimony. Remember, this is prior to Snowden.

Excerpt from:
A Deeper look into NSA spying: Watch Jacob Applebaum Videos

Root Encryption for Backtrack 5 with Eighty of Dual Core Music, Hak5 1102.1 – Video


Root Encryption for Backtrack 5 with Eighty of Dual Core Music, Hak5 1102.1
This time on the show, Ubuntu 12.04 is around the corner and we have a first-look at its new Head-Up Display. Then Eighty of Dual Core joins us to setup Back...

By: Show! Music Core

See the original post:
Root Encryption for Backtrack 5 with Eighty of Dual Core Music, Hak5 1102.1 - Video

CloudLock Launches A Fully Cloud-Based Selective Encryption Product

Cloud security startup CloudLock will launch new encryption product to make it easier for software-as-a-service and cloud platforms to protect sensitive data. Called CloudLock Selective Encryption, the products launch comes a few weeks after CloudLock announced that it had raised $16.5 million in Series C funding led by Bessemer Venture Partners, bringing its total funding to $28.2 million. It will make its public debut next week at the 2014 RSA Conference in San Francisco.

CloudLock Selective Encryption will protect data on the two platforms, Salesforce.com and Google Apps, that CloudLock currently covers, as well as new cloud service providers the startup signs up as it expands.

Cloud traffic is expected to reach a total of 7.7 zettabytes, or two-thirds of global data center traffic, by 2017. For SaaS and cloud platforms, rapid growth also presents a significant security challenge because certain types of information have to protected in specific ways to meet compliance laws and regulations. This data includes personal information; credit card data; medical records protected under the HIPAA privacy law; and intellectual property.

By making it easier for customers to provide higher levels of security for just the data that requires it, CloudLock Selective Encryption can help cloud service companies scale up more efficiently while complying with security regulations.

CloudLock Selective Encryption looks for sensitive data and then automatically encrypts it to meet compliance laws without affecting the apps performance. The product can be used for either end-user and corporate-governed encryption, and it protects data that is being uploaded to the cloud, as well data that is already in storage.

In a statement, CloudLock CTO and co-founder Ron Zalkind said: Weve heard from hundreds of our customers that the gateway-based and reverse-proxy solutions out there require heavy deployments, are highly prone to breaking cloud apps, and are often unavailable from mobile apps. CloudLock is provisioned completely in the cloud, in minutes.

Image by picjumbo

The rest is here:
CloudLock Launches A Fully Cloud-Based Selective Encryption Product