59 resultados para NSA"s
Resumo:
Big Brother Watch and others have filed a complaint against the United Kingdom under the European Convention on Human Rights about a violation of Article 8, the right to privacy. It regards the NSA affair and UK-based surveillance activities operated by secret services. The question is whether it will be declared admissible and, if so, whether the European Court of Human Rights will find a violation. This article discusses three possible challenges for these types of complaints and analyses whether the current privacy paradigm is still adequate in view of the development known as Big Data.
Resumo:
Edward Snowden revealed that America’s National Security Agency (NSA) had tapped Chancellor Angela Merkel’s mobile phone and had collected date en masse. This has caused the largest crisis of confidence in relations between Germany and the US since the Iraq war. Due to the technological advantage which American intelligence services have, Germany wishes to continue close co-operation with the US but is making efforts to change the legal basis of this co-operation dating back to Cold War times. Berlin would like to secure part of provisions similar to the Five Eyes alliance – agreements signed between the US, the UK, Canada, New Zealand and Australia in the second half of the 1940s, aimed at intelligence sharing and a ban mutual bugging. This could spell the end of the last (not including the military presence) relic of Germany’s dependence on the US which emerged following World War II and took shape in the shadow of the Cold War. The process of Germany’s emancipation in trans-Atlantic relations, which began after Germany’s reunification, would be complete. The US is however opposed to such far-reaching changes as it is interested in continued co-operation with Germany without limiting it. Were it not to sign agreements satisfactory for Berlin, this would lead to a protracted crisis of confidence in German-American relations.
Resumo:
Mode of access: Internet.
Resumo:
Translation into Turkish, by Feyyaḍ Mumtāz, of La mort de notre chère France en Orient, by Pierre Loti [pseud.]
Resumo:
Russian and French.
Resumo:
"Current as of 19 March 1980"--P. i.
Resumo:
This research seeks to understand how the problem of information security is treated in Brazil by the public thematization and also how it can affect the political and economic aspects of both Brazilian companies and government by using a study case based on the document leak event of the National Security Agency by Snowden. For this, the study case of sites, blogs and news portal coverage was carried out from the perspective of evidential paradigm, studies of movement and event concept. We are interested in examining how the media handles the information security topic and what its impact on national and international political relations. The subject matter was considered the largest data leakage in history of the NSA, which ranks as the world's largest agency of expression intelligence. This leak caused great repercussions in Brazil since it was revealed that the country was the most watched by the United States of America, behind only USA itself. The consequences were: a big tension between Brazil and the US and a public discussion about privacy and freedom on Internet. The research analyzed 256 publications released by Brazilian media outlets in digital media, in the period between June and July 2013.
Resumo:
This research seeks to understand how the problem of information security is treated in Brazil by the public thematization and also how it can affect the political and economic aspects of both Brazilian companies and government by using a study case based on the document leak event of the National Security Agency by Snowden. For this, the study case of sites, blogs and news portal coverage was carried out from the perspective of evidential paradigm, studies of movement and event concept. We are interested in examining how the media handles the information security topic and what its impact on national and international political relations. The subject matter was considered the largest data leakage in history of the NSA, which ranks as the world's largest agency of expression intelligence. This leak caused great repercussions in Brazil since it was revealed that the country was the most watched by the United States of America, behind only USA itself. The consequences were: a big tension between Brazil and the US and a public discussion about privacy and freedom on Internet. The research analyzed 256 publications released by Brazilian media outlets in digital media, in the period between June and July 2013.
Resumo:
SIMON is a family of 10 lightweight block ciphers published by Beaulieu et al. from the United States National Security Agency (NSA). A cipher in this family with K -bit key and N -bit block is called SIMON N/K . We present several linear characteristics for reduced-round SIMON32/64 that can be used for a key-recovery attack and extend them further to attack other variants of SIMON. Moreover, we provide results of key recovery analysis using several impossible differential characteristics starting from 14 out of 32 rounds for SIMON32/64 to 22 out of 72 rounds for SIMON128/256. In some cases the presented observations do not directly yield an attack, but provide a basis for further analysis for the specific SIMON variant. Finally, we exploit a connection between linear and differential characteristics for SIMON to construct linear characteristics for different variants of reduced-round SIMON. Our attacks extend to all variants of SIMON covering more rounds compared to any known results using linear cryptanalysis. We present a key recovery attack against SIMON128/256 which covers 35 out of 72 rounds with data complexity 2123 . We have implemented our attacks for small scale variants of SIMON and our experiments confirm the theoretical bias presented in this work.
Resumo:
At CRYPTO 2006, Halevi and Krawczyk proposed two randomized hash function modes and analyzed the security of digital signature algorithms based on these constructions. They showed that the security of signature schemes based on the two randomized hash function modes relies on properties similar to the second preimage resistance rather than on the collision resistance property of the hash functions. One of the randomized hash function modes was named the RMX hash function mode and was recommended for practical purposes. The National Institute of Standards and Technology (NIST), USA standardized a variant of the RMX hash function mode and published this standard in the Special Publication (SP) 800-106. In this article, we first discuss a generic online birthday existential forgery attack of Dang and Perlner on the RMX-hash-then-sign schemes. We show that a variant of this attack can be applied to forge the other randomize-hash-then-sign schemes. We point out practical limitations of the generic forgery attack on the RMX-hash-then-sign schemes. We then show that these limitations can be overcome for the RMX-hash-then-sign schemes if it is easy to find fixed points for the underlying compression functions, such as for the Davies-Meyer construction used in the popular hash functions such as MD5 designed by Rivest and the SHA family of hash functions designed by the National Security Agency (NSA), USA and published by NIST in the Federal Information Processing Standards (FIPS). We show an online birthday forgery attack on this class of signatures by using a variant of Dean’s method of finding fixed point expandable messages for hash functions based on the Davies-Meyer construction. This forgery attack is also applicable to signature schemes based on the variant of RMX standardized by NIST in SP 800-106. We discuss some important applications of our attacks and discuss their applicability on signature schemes based on hash functions with ‘built-in’ randomization. Finally, we compare our attacks on randomize-hash-then-sign schemes with the generic forgery attacks on the standard hash-based message authentication code (HMAC).
Resumo:
Torque teno virus (TTV) was discovered in 1997 in the serum of a Japanese patient who had a post-transfusion hepatitis of unknown etiology. It is a small virus containing a circular single-stranded DNA genome which is unique among human viruses. Within a few years after its discovery, the TTVs were noted to form a large family of viruses with numerous genotypes. TTV is highly prevalent among the general population throughout the world, and persistent infections and co-infections with several genotypes occur frequently. However, the pathogenicity and the mechanism for the sustained occurrence of the virus in blood are at present unclear. To determine the prevalence of TTV in Finland, we set up PCR methods and examined the sera of asymptomatic subjects for the presence of TTV DNA and for genotype-6 DNA. TTV was found to be highly prevalent also in Finland; 85% of adults harbored TTV in their blood, and 4% were infected with genotype-6. In addition, TTV DNA was detected in a number of different tissues, with no tissue-type or symptom specificity. Most cell-biological events during TTV infections are at the moment unknown. Replicating TTV DNA has, however, been detected in liver and the hematopoietic compartment, and three mRNAs are known to be generated. To characterize TTV cell biology in more detail, we cloned in full length the genome of TTV genotype 6. We showed that in human kidney-derived cells TTV produces altogether six proteins with distinct subcellular localizations. TTV mRNA transcription was detected in all cell lines transfected with the full-length clone, and TTV DNA replicated in several of them, including those of erythroid, kidney, and hepatic origin. Furthermore, the viral DNA replication was shown to utilize the cellular DNA polymerases. Diagnoses of TTV infections have been based almost solely on PCR, whereas serological tests, measuring antibody responses, would give more information on many aspects of these infections. To investigate the TTV immunology in more detail, we produced all six TTV proteins for use as antigens in serological tests. We detected in human sera IgM and IgG antibodies to occur simultaneously with TTV DNA, and observed appearance of TTV DNA regardless of pre-existing antibodies, and disappearance of TTV DNA after antibody appearance. The genotype-6 nucleotide sequence remained stable for years within the infected subjects, suggesting that some mechanism other than mutations is used by this minute virus to evade our immune system and to establish chronic infections in immunocompetent subjects.
Resumo:
To measure the effect of maturity and cooking on phytochemical composition and antioxidant capacity of fruit and leaves of four commercially available Australian papaya cultivars (RB1, RB2, RB4 and YB1).