From NSA to Gmail: Ex-spy launches free email encryption service

The surveillance bombshells revealed by Edward Snowden have prompted many Americans to reconsider what they say and do online.

Hoping to seize upon amplified privacy concerns, a former National Security Agency architect launched a free service this week that allows users to easily encrypt their Gmail, Yahoo (YHOO) and Outlook emails.

Virtru, which has received $4 million in angel financing, emerged from stealth mode on Tuesday and has already attracted interest from a number of potential corporate customers, including big Wall Street banks.

There is mass concern about privacy. The issue is people dont know where to go to take action. Were trying to meet that need, said John Ackerly, a former White House official who co-founded Virtru with his brother Will.

While working at the NSA, Will Ackerly helped invent an encryption format that has become the standard for sharing sensitive data between U.S. intelligence agencies. Seeing the great demand to protect personal and commercial documents, the Ackerly brothers are now deploying that platform to a much wider audience.

Services like Virtru will probably give most commercial users a degree of security that only governments have enjoyed to this point, said Cedric Leighton, a former NSA official who does not know the Ackerly brothers.

'Very Hard to Break'

Virtru appears to be launching at a perfect time given the enormous amount of attention on government surveillance, which classified documents leaked by Snowden show is far greater than the American public realized.

According to a poll of 2,000 U.S. adults by Harris Interactive that Virtru commissioned, 73% of Americans online are concerned about the privacy of their email communications. But just 34% of online adults said they had taken steps like using a secure email provider or encrypted technologies.

While the Snowden revelations caused the country tremendous harm in terms of national security, John Ackerly said the issues are real and the balance of power has shifted away from the individual.

See the article here:

From NSA to Gmail: Ex-spy launches free email encryption service

Eric Schmidt: Encryption will break through the Great Firewall of China

Summary: Google Chairman Eric Schmidt says the firm is intent on developing encryption services to "give people a voice" in strictly censored states.

Google Chairman Eric Schmidt says that the tech giant's encryption services could eventually open up countries with stringent censorship rules.

At the World Economic Forum at Davos, as reported by the Wall Street Journal, Schmidt said that countries including North Korea and China could be opened up within the next decade through encryption technologies.

"It is possible, within the next decade, using encryption, we would be able to open up countries that have strict censorship laws [..] giving people a voice," Schmidt said.

In China, YouTube access is totally out of the question, and Gmail is accessible sporadically. According to censorship monitor Greatfire's latest data, Facebook, Twitter, blogspot.com, netflix.com, bloomberg.com and liveleak.com are also currently unavailable in all Chinese provinces.

Hundreds of domains are banned by the Chinese government for a number of reasons. Websites are often blocked for violating Chinese laws on free speech, may contain "terrorist' content or pornographic material, and social networks are a target due to their user content sharing nature, which would be impossible for the government to control.

In the wake of rampant domain blocking by the Chinese government -- including a number of Google services -- as well as the surveillance scandal involving the U.S. National Security Agency (NSA) thanks to disclosures by former contractor Edward Snowden, Schmidt says Google has been working to improve and strengthen its encryption. The tech giant hopes to eventually create protocols that governments won't be able to penetrate or spy upon.

"This creates a problem for governments like Chinas, Schmidt commented.

While the Google Chairman views the Chinese as equals in the realm of technology, he also blamed the country for most of the world's cyberespionage campaigns. In May, current and former U.S. officials said that when Chinese hackers broke in to Google servers in 2010, rather than seeking data concerning human rights activists, the attackers were actually looking for information relating to U.S. surveillance and law enforcement.

Schmidt added:

Excerpt from:

Eric Schmidt: Encryption will break through the Great Firewall of China

EnterpriseDB Expands in Korea to Meet Rising Demand for Postgres

BEDFORD, Massachusetts, January 23, 2014 /PRNewswire/ --

Sweeping government initiatives to adopt open source software alternatives are driving greater demand for Postgres software and expertise

EnterpriseDB(EDB), the leading worldwide provider of enterprise-class Postgres products andOracle database compatibilitysolutions, today announced its expansion in South Korea with the opening of a new branch office in Seoul. EnterpriseDB has appointed Jihoon (James) Kim as manager to provide local support to Korean governments and corporations adopting Postgres.

The use of open source software has expanded dramatically in Korea in recent years following government initiatives to adopt and develop solutions that utilize open source software to avoid proprietary lock-in. Under the stewardship of Korea's National IT Industry Promotion Agency and the National Computing & Information Agency (NCIA), government agencies are working to convert systems to open source to meet goals set by national initiatives. The NCIA is working to create benchmark deployments that help Korean government agencies achieve the government's goal of running 40 percent of its operations on open source software by 2016.

"Major initiatives in Korea to use open source software wherever possible have propelled Postgres to the forefront in the database sector. Postgres is gaining widespread recognition among global enterprises for its performance and stability," said Jihoon (James) Kim, Branch Manager at EnterpriseDB. "Organizations in Korea have been particularly aggressive given government initiatives and the nation's overall drive for innovation. We're expanding in Korea to ensure organizations have the resources they need to succeed with Postgres."

In the Korean corporate sector, the telecommunications industry has taken a leadership position in adopting open source based database solutions. KT Corporation, for example, is working on one of the largest enterprise database migrations from a proprietary vendor to EnterpriseDB's open source based Postgres Plus Advanced Server. KT Corp. has deployed Postgres to support multiple mission-critical applications with tremendous success and is currently identifying workloads across the enterprise that can be migrated from a costly traditional database to Postgres.

"We continue to be impressed by the performance of Postgres and we're actively seeking more opportunities to deploy the database," said Jungsook Jaegal, General Manager, IT Architecture team, IT Strategy and Planning BU, at KT. "We enjoy a rewarding partnership with EnterpriseDB in our efforts to deploy Postgres in place of more costly, traditional solutions based on proprietary technology."

Connect with EnterpriseDB

Read our blog:http://blogs.enterprisedb.com/

Follow us on Twitter:http://www.twitter.com/enterprisedb

Here is the original post:

EnterpriseDB Expands in Korea to Meet Rising Demand for Postgres

An Overview of Cryptography – Gary C. Kessler

Does increased security provide comfort to paranoid people? Or does security provide some very basic protections that we are naive to believe that we don't need? During this time when the Internet provides essential communication between tens of millions of people and is being increasingly used as a tool for commerce, security becomes a tremendously important issue to deal with.

There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of cryptography, which is the focus of this chapter. But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient. The reader is advised, then, that the topics covered in this chapter only describe the first of many steps necessary for better security in any number of situations.

This paper has two major purposes. The first is to define some of the terms and concepts behind basic cryptographic methods, and to offer a way to compare the myriad cryptographic schemes in use today. The second is to provide some real examples of cryptography in use today.

I would like to say at the outset that this paper is very focused on terms, concepts, and schemes in current use and is not a treatise of the whole field. No mention is made here about pre-computerized crypto schemes, the difference between a substitution and transposition cipher, cryptanalysis, or other history. Interested readers should check out some of the books in the references section below for detailed and interesting! background information.

Cryptography is the science of writing in secret code and is an ancient art; the first documented use of cryptography in writing dates back to circa 1900 B.C. when an Egyptian scribe used non-standard hieroglyphs in an inscription. Some experts argue that cryptography appeared spontaneously sometime after writing was invented, with applications ranging from diplomatic missives to war-time battle plans. It is no surprise, then, that new forms of cryptography came soon after the widespread development of computer communications. In data and telecommunications, cryptography is necessary when communicating over any untrusted medium, which includes just about any network, particularly the Internet.

Within the context of any application-to-application communication, there are some specific security requirements, including:

Cryptography, then, not only protects data from theft or alteration, but can also be used for user authentication. There are, in general, three types of cryptographic schemes typically used to accomplish these goals: secret key (or symmetric) cryptography, public-key (or asymmetric) cryptography, and hash functions, each of which is described below. In all cases, the initial unencrypted data is referred to as plaintext. It is encrypted into ciphertext, which will in turn (usually) be decrypted into usable plaintext.

In many of the descriptions below, two communicating parties will be referred to as Alice and Bob; this is the common nomenclature in the crypto field and literature to make it easier to identify the communicating parties. If there is a third or fourth party to the communication, they will be referred to as Carol and Dave. Mallory is a malicious party, Eve is an eavesdropper, and Trent is a trusted third party.

There are several ways of classifying cryptographic algorithms. For purposes of this paper, they will be categorized based on the number of keys that are employed for encryption and decryption, and further defined by their application and use. The three types of algorithms that will be discussed are (Figure 1):

With secret key cryptography, a single key is used for both encryption and decryption. As shown in Figure 1A, the sender uses the key (or some set of rules) to encrypt the plaintext and sends the ciphertext to the receiver. The receiver applies the same key (or ruleset) to decrypt the message and recover the plaintext. Because a single key is used for both functions, secret key cryptography is also called symmetric encryption.

Excerpt from:

An Overview of Cryptography - Gary C. Kessler

Wikileaks – Wikileaks

Disclosed documents are classified, censored or otherwise opaque to the public record. We rely on readers to alert their communities and press to the revelations here. Go to it! Big Pharma caught spying on the WHO Toll Collect Vertraege, 2002 Egads! Confidential 9/11 Pager Messages Disclosed Ratiopharm: Geld und Geschenke fr rzte Guardian still under secret toxic waste gag Ivory Coast toxic dumping report behind secret Guardian gag Verfassungsschutz soll zur Polizei werden Gmail may hand over IP addresses of journalists Turks and Caicos former PM to fight British rule Transparency after the Turks and Caicos Islands scandal WikiLeaks victorious over corruption report gag order WikiLeaks releases suppressed Turks and Caicos report Big Trouble in Little Paradise: the Turks and Caicos Islands takeover Iran blocks WikiLeaks Serious nuclear accident may lay behind Iranian nuke chief's mystery resignation WikiLeaks wins Amnesty International 2009 Media Award US detainee interrogation: a road not taken Shadowy Bilderberg group meet in Greece - and here's their address Guardian journalist arrested for trying to penetrate secret Bilderberg meet Bilderberg Group Meets In Athens Amid Tight Security Australian Senate questions government on ACMA censorship and WikiLeaks Guantanamo's Immediate Reaction Force still terrorizing detainees U.S. Denies Incendiary Weapon Use in Afghanistan The Most Wanted Leaks of 2009 Groups rip secrecy over IP protection talks O homem-bomba da Sua CRS Report Leaks Prove Tough to Stop Obama's Chilling Crew: The legal harassment of those investigating Tony Rezko East Timorese go begging as foreign advisers rake it in Correction of DPA article in respect to WikiLeaks and Steve Jobs HIV test WikiLeaks.de back in service WikiLeaks.de Theodor Reppe im Interview Interview with WikiLeaks.de domain sponsor Theodor Reppe Mehr Details zur Wikileaks.de Stilllegung More detail on WikiLeaks.de suspension Experten greifen von der Leyen an Deutsche Wikileaks Domain ohne Vorwarnung gesperrt Germany deletes WikiLeaks.de domain after raid Defence contractor suspended over neo-Nazi link Gericht: Durchsuchung wegen mittelbarer Links auf Kinderporno-Sperrliste rechtmig Western internet censorship: The beginning of the end or the end of the beginning? In Britain, Web Leaves Courts Playing Catch-Up A Blacklist for Websites Backfires in Australia Hausdurchsuchung bei WikiLeaks.de Domaininhaber Police raid home of Wikileaks.de domain owner over censorship lists Trade agency pledges to review its transparency It certainly looks like the ACMA blacklist, eh Senator Conroy Dentist's website on leaked blacklist Leaked Australian blacklist reveals banned sites Burning Toxic Waste is Making U.S. Soldiers and Iraqis Sick, But the Pentagon Refuses to Admit It There is no bigger issue than net censorship Banned hyperlinks could cost you 11,000 dollars a day Whistleblower exposes insider trading program at JP Morgan The mother of all media leaks Wikileaks, IT pro not 'in any danger' in Coleman leak, lawyer says Missouri report on militias, terrorists draws criticism Patents Being Abused To Put Your Life In Danger The Big Bad Database of Senator Norm Coleman Intelligence failures crippling fight against insurgents in Afghanistan, says report UN urges probe into Kenya murders Raila now attacks security agencies Cooperate with FBI, Raila tells Kenya police Two Kenyan rights activists shot dead How to Hijack an EU Open Source Strategy Paper Wikileaks cracks NATO's Master Narrative for Afghanistan Clearstream et le mystrieux compte Bank Madoff An insight into child porn Einblicke in die Kinderpornoszene UN probe indicts Kenya on police killings United Nations Sexual Assault/Harassment Reports on Wikileaks Decommissioning the arms trade Euro MP expenses 'can reach 1m' Secret report reveals how MEPs make millions Geographic Survey Project of the Sierra Juarez Mountains Stirs Protests Davenport Lyons Threatens to Sue Wikileaks Over Publication of Extortion Letter Anthropologists Adopt New Language Against Secret Research Afghanistan: Slipping out of control UN group to probe poll chaos deaths Demonstrators accuse police over disappearance of kin Wikileaks releases NATO report on civilian deaths Tax Gap: Rare glimpse into offshore world of big money and low taxes Tax Gap: Isles of plenty Report: new Fairness Doctrine would face high legal hurdle Thousands of Congressional Reports Now Available Online Parts for 'dirty bomb' found in slain US man's home GOP's Stimulus Talking Points Contradict Congressional Research Service Wikileaks posts 6,780 Congressional reports -- fun, but no smoking gun J.Baer confirms trading incident, shares off lows How One Fund's Profits Ended Up in the Caymans Nuevos audios ilegales quedan en poder de juez Anticorrupcin Counterinsurgency A royal offence Commission blushes as banks are stripped bare Lists of allegedly illegal websites always leak Bank Fees: Banking on silence Sex, Waffenhandel, Korruption: Ungeheuere Vorwrfe gegen die Uno UN peacekeeping logistics not secure in 2008 UN finds 217 sex abuse claims against blue helmets United Nations confidential reports Swiss banks crafty strategy shows how difficult it is to clamp down on tax havens Hackers blow whistle on banks Competition body wants hackers prosecuted Secret gag orders undermine core Western values Die angebliche E-Mail vom BND-Chef 1,203 new websites censored by Thailand German spy chief threatens Wikileaks MPs accuse courts of allowing libel tourism Kafka comes to the British courts Bank Julius Br Bank Julius Br vs. Wikileaks How One Fund's Profits Ended Up in the Caymans Ex-Rock Impresario Tony Defries lost $22 million in offshore tax evasion scheme Rudolf Elmer files against Swiss banking secrecy at ECHR Exbanker klagt die Schweiz an Full correspondence between Wikileaks and Bank Julius Baer Notfallsuberung des BND nach Wikileaks Enthllung German intelligence scrubs European records after Wikileaks exposure Northern Rock vs. Wikileaks Changes in Guantanamo Bay SOP manual (2003-2004) Die Deutsche Telekom und ihr Kunde BND

For many more media reports see Google news reports on Wikileaks, past 30 days (without syndications)

Topcountries

Go here to read the rest:

Wikileaks - Wikileaks

WikiLeaks, drought and Syria

IN the 1970s, I got my bachelor's and master's degrees in modern Middle East studies, and I can assure you that at no time did environmental or climate issues appear anywhere in the syllabi of my courses.

Today, you can't understand the Arab awakenings or their solutions without considering climate, environment and population stresses.

I've been reporting on the connection between the Syrian drought and the uprising there for a Showtime documentary that will air in April, but recently our researchers came across a WikiLeaks cable that brilliantly foreshadowed how environmental stresses would fuel the uprising.

Sent on Nov 8, 2008, from the United States embassy in Damascus to the State Department, the cable details how, in light of what was a devastating Syrian drought -- it lasted from 2006 to 2010 -- Syria's United Nations' food and agriculture representative, Abdullah Yehia, was seeking drought assistance from the UN and wanted the US to contribute.

Here are some key lines:

"The UN Office for Coordination of Humanitarian Affairs launched an appeal on Sept 29 requesting roughly US$20.23 million (RM67.2 million) to assist an estimated one million people impacted by what the UN describes as the country's worst drought in four decades.

"Yehia proposes to use money from the appeal to provide seed and technical assistance to 15,000 small-holding farmers in northeast Syria in an effort to preserve the social and economic fabric of this rural, agricultural community. If UNFAO (UN Food and Agriculture Organisation) efforts fail, Yehia predicts mass migration from the northeast, which could act as a multiplier on social and economic pressures already at play and undermine stability."

"Yehia does not believe that the (government of Bashar al-Assad) will allow any Syrian citizen to starve. ... However, Yehia told us that the Syrian minister of agriculture... stated publicly that economic and social fallout from the drought was 'beyond our capacity as a country to deal with'. What the UN is trying to combat through this appeal, Yehia says, is the potential for 'social destruction' that would accompany erosion of the agricultural industry in rural Syria.

"This social destruction would lead to political instability.

"Without direct assistance, Yehia predicts that most of these 15,000 small-holding farmers would be forced to depart al-Hasakah province to seek work in larger cities in western Syria.

Read more here:

WikiLeaks, drought and Syria