Pirates jointly nominate Manning and Snowden for Nobel …

Representatives in the EU parliament from the Pirate Party of Sweden along with MPs from the Pirate Party of Iceland have come together to nominate whistleblowers Chelsea Manning and Edward Snowden for the Nobel Peace Prize. Snowden has already been nominated for the prize this year by two Norwegian politicians, while Manning received several nominations last year. This year's joint nomination gives the Nobel Prize panel the opportunity to recognize and encourage the contributions of whistleblowers everywhere, while governments are increasingly trying to criminalize their noble efforts.

Chelsea Manning is widely credited with jump-starting the Arab Spring revolutions across the Middle-East, most notably in Tunisia and Egypt. Her efforts were rewarded with 35 years imprisonment while everyone from the Obama administration to Condoleezza Rice and George W. Bush attempt to co-opt the credit for her bravery. Manning was demonized while the results of her whistleblowing were praised.

Edward Snowden is still a free man living under temporary asylum in Russia, but he is wanted in the U.S. to face charges of espionage and theft of government property. This alleged espionage, preferably referred to as whistleblowing, alerted Congress and President Obama to unconstitutional acts by the NSA that even they were unaware of. Because the acts against the people revealed by Snowden are indefensible, the talking heads have been forced to give lip service to the concerns of government overreach. At the same time they try to demonize the messenger while taking the credit for surveillance reform, not an end to unconstitutional surveillance, merely reform. They don't want it to end, they just want people to stop talking about it.

As we can see, today's world requires much more vigilance on the part of the people to remain free. Criminalizing the behavior of whistleblowers discourages future whistleblowers, which is precisely what is intended. A Nobel Peace Prize jointly awarded to both Manning and Snowden, however, would make the U.S. targeting of whistleblowers harder to justify. It would make it more difficult to claim they harmed national security when the same actions are recognized as bringing more peace and stability to the world as a whole. It is, therefore, the duty of the Nobel Prize committee panel, in its effort to promote peace, to award the Nobel Peace Prize to Snowden, Manning, and whistleblowers everywhere. Otherwise, Snowden might just be the last.

Exposing criminals is never a crime.

Continue reading here:
Pirates jointly nominate Manning and Snowden for Nobel ...

Additional Charges and Current Situation — Bradley …

Around the time of Crowleys resignation, the government doubled down on Manning's charges. Nearly a year after he'd been arrested and imprisoned, Bradley Manning was hit with 22 more offenses. This time, the charges were far more serious. Among these charges: "aiding the enemy," a capital offense, punishable by death.

The charges were also more specifically connected to the WikiLeaks documents. According to the charge under the section "Mutiny and Sedition," Manning allegedly did

"wrongfully and wantonly cause to be published on the internet intelligence belonging to the United States government, having knowledge that intelligence published on the internet is accessible to the enemy, such conduct being prejudicial to good order and discipline in the armed forces and being of a nature to bring discredit upon the armed forces."

The new, extended charges seem designed to make sure that Manning doesn't get off with a slap to the wrist. In the meantime, Manning now sits in a cell at Ft. Leavenworth, where he awaits court martial. His one-year anniversary in prison will be coming up at the end of May.

Read more:
Additional Charges and Current Situation — Bradley ...

‘The Snowden Files’, by Luke Harding – FT.com

The Snowden Files: The Inside Story of the Worlds Most Wanted Man, by Luke Harding. Guardian Faber Publishing RRP12.99/Vintage RRP$14.95, 352 pages

First WikiLeaks and then Edward Snowden such has been the tsunami of leaks from Americas national security state in recent years, it sometimes feels like there is nothing left to know about how Washingtons diplomats and spies go about their business. The revelations from Snowden, a contractor for the National Security Agency, the omnivorous US eavesdropping body, have far surpassed the initial state department document dump released by Julian Assange.

Not only are Snowdens documents classified at a much higher level of secrecy. He has unveiled as never before the intimate architecture and entrenched networks of the most secretive postwar institution, the Five Eyes intelligence alliance binding the US with the UK, Canada, Australia and New Zealand. Snowdens documents have disclosed so much about its operations, from the national leaders bugged to the mind-boggling masses of data trawled in search of terror targets, that the extraordinary new material still pouring out is losing its ability to shock.

In many ways, the NSA has tried to subvert the internet itself, tapping into offshore cables carrying the data of US technology giants such as Google and Yahoo, and manipulating telecommunications systems so as to gain access to them remotely. It is no wonder Washington is so worried about Beijing tapping into equipment made by Chinese telecoms companies such as Huawei and sold around the world. Everything the Americans accuse China and Huawei of doing, they can do themselves, only much better.

The Snowden Files arrives just ahead of an account of the NSA scandal to be published in April by Glenn Greenwald, the lawyer-cum-journalist whom Snowden entrusted with his material. The Guardian journalist Luke Hardings involvement in the story came later; he has interviewed people who worked with Snowden but not Snowden himself, and his portrait of the disillusioned intelligence IT expert-turned-leaker inevitably suffers from the kinds of faults you would expect from a book written so quickly. After all, it is only eight months since Snowdens first leak.

Harding skirts difficult questions about how intelligence agencies can keep up with legitimate targets in the internet age. The arguments justifying the publication of details of intelligence over-reach and lawbreaking, similarly, do not necessarily support the disclosure of sensitive digital tradecraft that can only aid geopolitical rivals of the west such as Russia and China. But this is little discussed here.

In passing, the author also draws snooty comparisons between what he sees as a timid US journalistic establishment and the bravehearts of the British press. But the sometimes self-important deliberativeness of the US media is hardly self-censorship. Who brought the world the Pentagon Papers and Watergate, and more recently, Abu Ghraib and details of the US intelligence penetration of Irans nuclear programme?

As a journalist who was kicked out of Putins Russia, however, Harding at least has the perspective to admit there is something creepy about Snowden, fleeing the US in the name of free speech, taking refuge in an unapologetically authoritarian country.

Snowden himself remains an enigma, someone who once raged in chat rooms against leaking secrets only to turn into perhaps the biggest leaker in intelligence history. One explanation is his politics. Snowden, and indeed many of the people he worked with notably Greenwald are as much libertarians as they are civil-libertarians. As Harding notes, Snowden donated money to Ron Paul, the Republican libertarian presidential candidate and long an avowed opponent of the national security state. Greenwald, likewise, has expressed sympathy for Pauls ideas.

The book works best in its first half, which recounts the incredible story of how Snowden becomes angry about the abuses he says he witnessed inside the system, resolves to pull off a stunning electronic heist by downloading the NSAs and its partners most sensitive files, and gives them to journalists he has persuaded to meet him in Hong Kong. Harding captures nicely the moment when The Guardian pushes the button on its first Snowden story, an intense, adrenalin-filled cocktail of high-minded journalistic zeal and the sheer thrill of publishing sensitive information.

Read more here:
‘The Snowden Files’, by Luke Harding - FT.com

Glenn Greenwald’s News Site to Focus on Snowden Leaks

Glenn Greenwald, pictured here testifiiying before the investigative committee of the Senate that examines charges of espionage by the United States in Brasilia on October 9, 2013, will lead a new website that launches next week focused on leaks from former NSA contractor Edward Snowden.

Image: EVARISTO SA/AFP/Getty Images

By Jason Abbruzzese2014-02-07 00:12:09 UTC

A new website led by investigative journalist Glenn Greenwald will launch next week with a focus on the remaining treasure trove of leaked documents from NSA whistleblower Edward Snowden.

The "digital magazine" will be the first in a series of new titles that fall under the umbrella of First Look Media, the media company recently founded by eBay founder Pierre Omidyar, according to this company blog post.

Journalists Laura Poitras and Jeremy Scahill will work with Greenwald on the publication, which has also added Peter Maass as senior staff writer, Marcy Wheeler as senior policy analyst and Ryan Gallagher as a reporter.

"First Look will uphold the rights of journalists everywhere to report on the sensitive and often controversial information that they learn from sources. We are launching the new site as a public service, committed to reporting on one of the most pressing issues of our time in a transparent and responsible manner," Omidyar and former Rolling Stone editor Eric Bates wrote in the blog post.

The official name of Greenwald's site will be released next week, according to a First Look spokesperson.

Greenwald's readers have been awaiting his next movesince he left The Guardian to join Omidyar late last year. Other publications within First Look are forthcoming and will cover a variety of subjects including entertainment and sports.

The announcement comes a day after a fresh revelation from Snowden document was published by NBC News, highlighting the use of DDoS attacks by British intelligence.

See more here:
Glenn Greenwald's News Site to Focus on Snowden Leaks

Cryptography Breakthrough Could Make Software Unhackable …

As a graduate student at the Massachusetts Institute of Technology in 1996, Amit Sahai was fascinated by the strange notion of a zero-knowledge proof, a type of mathematical protocol for convincing someone that something is true without revealing any details of why it is true. As Sahai mulled over this counterintuitive concept, it led him to consider an even more daring notion: What if it were possible to mask the inner workings not just of a proof, but of a computer program, so that people could use the program without being able to figure out how it worked?

The idea of obfuscating a program had been around for decades, but no one had ever developed a rigorous mathematical framework for the concept, let alone created an unassailable obfuscation scheme. Over the years, commercial software companies have engineered various techniques for garbling a computer program so that it will be harder to understand while still performing the same function. But hackers have defeated every attempt. At best, these commercial obfuscators offer a speed bump, said Sahai, now a computer science professor at the University of California, Los Angeles. An attacker might need a few days to unlock the secrets hidden in your software, instead of a few minutes.

Secure program obfuscation would be useful for many applications, such as protecting software patches, obscuring the workings of the chips that read encrypted DVDs, or encrypting the software controlling military drones. More futuristically, it would allow people to create autonomous virtual agents that they could send out into the computing cloud to act on their behalf. If, for example, you were heading to a remote cabin in the woods for a vacation, you could create and then obfuscate a computer program that would inform your boss about emails you received from an important client, or alert your sister if your bank balance dropped too low. Your passwords and other secrets inside the program would be safe.

You could send that agent into the computing wild, including onto untrusted computers, Sahai said. It could be captured by the enemy, interrogated, and disassembled, but it couldnt be forced to reveal your secrets.

As Sahai pondered program obfuscation, however, he and several colleagues quickly realized that its potential far surpassed any specific applications. If a program obfuscator could be created, it could solve many of the problems that have driven cryptography for the past 40 years problems about how to conduct secure interactions with people at, say, the other end of an Internet connection, whom you may not know or trust.

A program obfuscator would be a powerful tool for finding plausible constructions for just about any cryptographic task you could conceive of, said Yuval Ishai, of the Technion in Haifa, Israel.

Precisely because of obfuscations power, many computer scientists, including Sahai and his colleagues, thought it was impossible. We were convinced it was too powerful to exist, he said. Their earliest research findings seemed to confirm this, showing that the most natural form of obfuscation is indeed impossible to achieve for all programs.

Then, on July 20, 2013, Sahai and five co-authors posted a paper on the Cryptology ePrint Archive demonstrating a candidate protocol for a kind of obfuscation known as indistinguishability obfuscation. Two days later, Sahai and one of his co-authors, Brent Waters, of the University of Texas, Austin, posted a second paper that suggested, together with the first paper, that this somewhat arcane form of obfuscation may possess much of the power cryptographers have dreamed of.

This is the first serious positive result when it comes to trying to find a universal obfuscator, said Boaz Barak, of Microsoft Research in Cambridge, Mass. The cryptography community is very excited. In the six months since the original paper was posted, more papers have appeared on the ePrint archive with obfuscation in the title than in the previous 17 years.

However, the new obfuscation scheme is far from ready for commercial applications. The technique turns short, simple programs into giant, unwieldy albatrosses. And the schemes security rests on a new mathematical approach that has not yet been thoroughly vetted by the cryptography community. It has, however, already withstood the first attempts to break it.

Read the rest here:
Cryptography Breakthrough Could Make Software Unhackable ...

Cryptography 1. List some of the attacks on the Diffie …

1. List some of the attacks on the Diffie-Hellman key exchange protocol we discussed in the lecture. Present your solution for avoiding such attacks. 2. In the Diffie-Helman protocol, g=11, p=29, x=5, and y=7. What is the value of the symmetric key?What is the value of R1 and R2?Variations of data g=7, p=23, x=3, and y=5g=5, p=19, x=7, and y=3g=11, p=31, x=3, and y=9g=7, p=43, x=2, and y=7 3. In the Diffie-Helman protocol, what happens is x and y have the same value, that is, Alice and Bob accidentally chosen the same number? Are R1 and R2 same? Do the session key calculated by Alice and Bob have the same value? Explain what would adversary observe? Could she guess Alices and Bobs private key? Use an example to prove your claims. 4. Using RSA scheme, let p=23, q=31, d=457, calculate the public key e. Provide detailed description of all steps, explain what information will be published and what destroyed.Optionally: Encrypt and decrypt simple message M1=100. Variation of data p=23, q=31, d=233p=23, q=31, d=139 5. Suppose Fred sees your RSA signature on m1 and m2, (i.e., he sees (m1d mod n) and (m2d mod n)). How does he compute the signature on each of m1j mod n (for positive integer j), m1-1 mod n, m1 x m2 mod n, and in general m1j m2k mod n (for arbitrary j and k)?

See the article here:
Cryptography 1. List some of the attacks on the Diffie ...

Julian Assange, WikiLeaks editor – News, Articles …

February 3, 2014 02:01 p.m.

Members of Sweden's parliament have publicly urged prosecutors to step up their efforts to question WikiLeaks founder Julian Assange on sexual-assault allegations he faces in Sweden.

Subscriber Content Read Preview

The Super Bowl and football health issues, as well as the GOP retreat and President Barack Obama's agenda coming out of the recent State of the Union speech, are set to be in the spotlight on this Sunday's political talk shows. Here are the scheduled guests.

Subscriber Content Read Preview

WikiLeaks Founder Julian Assange collaborated with the band Calle 13 and guitarist Tom Morello on the new video "Multi_Viral." Watch the video.

Subscriber Content Read Preview

M.I.A. may have found a new hype man: WikiLeaks Founder Julian Assange.

Subscriber Content Read Preview

Here is the statement released by Wikileaks's Julian Assange reacting to the sentencing of Bradley Manning.

Read the original here:
Julian Assange, WikiLeaks editor - News, Articles ...

Cryptocurrency Hackathon will talk Bitcoin, Dogecoin and …

Whether you're well-versed in the ways of Bitcoin or you're a fan of the "Doge" meme and can't quite believe it inspireda form of digital currency,theCryptocurrency Hackathonat the Madworks Coworking Space is the occasion to dig deeper.

The Hackathon will run similar to a Startup Weekend, said Brian Samson, who is overseeing the event. Rather than focusing on jump-starting a business, though, the goal of participants will be to create and complete a tech project.

The winner of the Hackathon will receive one bitcoin valued currently at about $850.

"All day long, we'll be focused on making cool stuff writing software, doing a project," Samson said.

The event is scheduled to run from 8 a.m.-9 p.m. on Feb. 15, at the Madworks Coworking Space, 550 S. Rosa Road, Suite 225. The entry fee is $5 (or 0.005887 BTC), which includes registration, some Dogecoins and breakfast, lunch and dinner. Participants can pay via credit card, or with Bitcoin, Dogecoin or Litecoin.

The Hackathon is designed for people who know how to write code and are interested in learning more about cryptocurrency, Samson said. But for people who aren't well-versed in programming, there's another option.

After announcing the event, interest grew among non-coders who had a general interest in learning more about cryptocurrency. Because of that, the organizers decided to host an "unconference" that will run parallel to the Hackathon.

"While people are writing code and hacking on stuff, were going to have some of the other conference rooms, giving little talks," Samson said. "An intro to what is cryptocurrency, how does it work."

The first cryptocurrency to begin trading was Bitcoin, in 2009. The digital exchange medium has grown in popularity in recent years, with a number of "altcoins" some serious, like Litecoin, and some based on jokes, like Dogecoinand the recently shut-down Coinye West entering the market.

But even the joke-coins can have some serious real-word impact. Although Dogecoin was inspired by a Shiba Inu who thinks in Comic Sans, it's also sending athletes from India and Jamaica to the Olympics. An effort to fund the Jamaican bobsleigh team's travel expenses surpassed its $30,000 goal in one day, with more than 26 million DOGE donations. A separate effort netted more than $6,000 and will send two skiers from India to the games.

View post:
Cryptocurrency Hackathon will talk Bitcoin, Dogecoin and ...