Interview with NSA Whistleblowers on privacy and metadata (with subtitles) – Video


Interview with NSA Whistleblowers on privacy and metadata (with subtitles)
On January 22nd, the Ceremony for the Sam Adams Award was held in Berlin. This year #39;s awardee William Binney gave us an interview, as well as the Whistleblowers Thomas Drake, Coleen Rowley...

By: netzpolitik

Here is the original post:

Interview with NSA Whistleblowers on privacy and metadata (with subtitles) - Video

Posted in NSA

NIST pledges transparency in NSA dealings over crypto standards

A U.S. agency that develops widely used standards for encryption has pledged to be more transparent about its dealings with the National Security Agency, amid concerns the NSA undermined those standards to boost its surveillance efforts.

The National Institute of Standards and Technology outlined new proposed operating procedures in an updated draft published Friday. Its seeking public comments on the proposal through March 27.

The document follows a report last July from independent security experts who concluded NIST had put too much faith in the NSA in developing cryptographic standards.

The new draft expands on NISTs interactions with the National Security Agency (NSA), explaining how the agencies work together and what steps are now in place to ensure NSAs contributions to the standards development process are transparent, NIST said.

The new processes will ensure that NIST attributes to the NSA all algorithms, standards or guidelines contributed by the agencys staff, and acknowledges all comments received from the NSA.

NIST has been in the spotlight since 2013, when reports based on leaked documents from Edward Snowden claimed the NSA used its influence over NIST to insert a backdoor in at least one cryptographic standard and possibly to weaken others.

Last February, NIST appointed an independent panel of technologists review its practices, including Ed Felten, a computer scientist at Princeton University, Ron Rivest, an MIT professor, and Internet pioneer Vint Cerf, who works at Google.

They concluded that NIST needed to hire more cryptographic experts and reduce its reliance on the NSA for decisions about standards.

Fridays proposal reflects the feedback in that report and from public comments on the first draft, which was published last February and said much less about NISTs work with the NSA.

NIST is part of the U.S. Department of Commerce. Formed in 1901, its charged with making U.S. businesses more competitive by creating standard measures for weights and time, as well as standards for encryption, x-ray radiation and other areas.

Visit link:

NIST pledges transparency in NSA dealings over crypto standards

Posted in NSA

Litvinenko inquiry: the proof Russia was involved in dissident's murder

It is revealed as part of a Telegraph investigation which also unearthed an audio recording appearing to capture Litvinenko giving a detailed account of his investigations into links between Vladimir Putin and one of the worlds most dangerous criminals.

The tape will reignite claims that Litvinenko could have been killed as a result of investigative work he carried out in a series of European countries after leaving Russia.

These claims are likely to be played out in the High Court as the Litvinenko Inquiry, chaired by Sir Robert Owen, a former high court judge, conducts its hearings.

Last year Sir Robert said that he had seen prima facie evidence that the Russia state was involved in the murder.

It is likely that the NSA intelligence formed part of the evidence that Sir Robert was given.

The disclosure of the material is likely to be put pressure on the British governments relationship with the Kremlin and will renew calls for the UK to toughen its stance.

The start of the inquiry comes after years of campaigning by Marina Litvinenko, the widow of the former KGB spy, for an official verdict on his death.

Mrs Litvinenko has applied to the NSA to disclose telephone intercepts, and says that all information should be disclosed to Sir Robert.

Litvinenko was poisoned in November 2006 during a meeting at a Mayfair hotel. He died three weeks later. Tests revealed that he ingested a rare isotope, polonium 210, which is hard to detect.

British prosecutors want two men, Andrei Lugovoy and Dimitri Kovtun, both of whom are former KGB bodyguards, to face murder charges over the murder.

Read the original:

Litvinenko inquiry: the proof Russia was involved in dissident's murder

Posted in NSA

US spy program has financial, security impacts, says Snowden

The U.S. National Security Agency needs to consider the repercussions of its spying on electronic communications and data, especially how that impacts U.S. economic interests, former NSA analyst Edward Snowden said today.

Theres a big question on if the potential intelligence we gain is worth the effort. Theyre reducing the trust of the security in American products. This is critical in American industry. It has a real cost, not just moral but financially, said Snowden, speaking Friday via video at a Harvard University conference on privacy in a networked society. He also said the NSA must understand that the methods it employs to secretly collect data can also be used against the U.S.

Snowden made international headlines in 2013 after releasing classified U.S. government documents that detailed the NSAs extensive spying programs. Some of those documents, which are still being released, showed that the NSA placed or attempted to insert back doors in hardware, software and Web services from U.S. tech companies. This discourages potential customers and has cost the U.S. at least US$35 billion, said Snowden, citing studies.

Snowden now resides in Russia after the country granted him a three-year residency permit in 2014, as he expects to be prosecuted for his disclosures by the U.S.

Using encryption is still the best way to keep data private, said Snowden. The leaked documents show that the NSA still struggles to break encryption programs like PGP and Tor. Instead of trying to crack encrypted data, the NSA looks for other ways to obtain the information.

When they do attack, it is through a weakness. The wall is high so rather than go over it, they want to go around it or under it, Snowden said.

Exploiting a weak point, like a zero-day vulnerability, is one way that the NSA gets around encryption. With many governments, companies and people using the same technology, the same exploit that the U.S. government uses can also be used by another entity to attack the U.S. And while both countries may use the same exploit, the value of the data they acquire varies tremendously, he said.

Snowden offered the example of North Korea, whose government computer systems the NSA has been able to hack since 2010. Despite having this access, the U.S. missed information on missile launches, leadership changes and a recent hack that targeted Sony. The massive attack, which exposed sensitive information from the companys entertainment division, allegedly came from the reclusive, Communist nation. The U.S. gained very little information while North Korea was able to attack core U.S. beliefs.

If we have a weak end point and they hack us once, it doesnt matter if we hacked them 10 times. If they hack us once, because they have that one common standard, theyre far, far ahead. With Sony, everyone in the country is saying that they are attacking our basic values. It was so much [more] valuable for them than for us, he said.

As for who the NSA hires to carry out its hacks, theyre not mystical hacker steroid guys. A great portion of them are junior enlisted military guys, Snowden said, adding that their training isnt exceptional. This explains why the NSA publishes detailed guides on how its staff obtains information.

Go here to read the rest:

US spy program has financial, security impacts, says Snowden

Posted in NSA

City to pay about $1M to settle suit

The city of Denton is expected to pay out about $1 million to settle a long-running inverse condemnation case over power lines placed along Bonnie Brae Street in 2009.

Inverse condemnation is defined as government taking private property without fair compensation, which is required under the Fifth Amendment.

The property owners attorney, Charles Orsburn, asked Judge Doug Robison of the 393rd Judicial District Court to dismiss the case during a hearing Friday afternoon. But Robison said that he would retain the case on his docket for another 90 days.

All but three of the property owners have settled with the city in the past few months, according to court records. The city agreed to pay each property owner in exchange for dropping out of the lawsuit.

Orsburn told the judge that he and the citys attorneys have agreed to finish the last three property owners settlements even if the lawsuit is dismissed.

Weve got some subrogation of lien problems with banks out of California, Orsburn told the judge.

The city needs clear title to pay for an easement. Typically, the city works through any title issues in a condemnation case, according to Paul Williamson, the citys real estate manager.

But to settle inverse condemnation, the burden to convey clear title is on the property owners, Orsburn said in an interview after the hearing. Some of the lien holders havent been very cooperative, he added.

Without that condition satisfied, the three properties would end up in regular condemnation hearings, Orsburn said.

As it should have been in the beginning, he said. If I hadnt filed this lawsuit, these people wouldnt have received anything. The 2,000-pound gorilla rule no longer applies.

Follow this link:

City to pay about $1M to settle suit

Talking SHOT with Sheriff David A. Clarke Jr. – 2015 SHOT Show – Video


Talking SHOT with Sheriff David A. Clarke Jr. - 2015 SHOT Show
Milwaukee County Sheriff, David A. Clarke Jr., discusses his experience combating the Anti-gun Lobby, and the importance of events like the SHOT Show for the preservation of our Second Amendment ...

By: National Shooting Sports Foundation | NSSF

See the original post here:

Talking SHOT with Sheriff David A. Clarke Jr. - 2015 SHOT Show - Video