2014-01-10

‎NSA seeks to develop Quantum computer

← Older revision

Revision as of 17:42, 10 January 2014

(4 intermediate revisions by one user not shown)

Line 18:

Line 18:

 

The documents also reveal an additional project called "Owning the Net" that is geared toward using quantum research to break encryption, including the widely used RSA encryption tool ([http://www.washingtonpost.com/world/national-security/nsa-seeks-to-build-quantum-computer-that-could-crack-most-types-of-encryption/2014/01/02/8fff297e-7195-11e3-8def-a33011492df2_story.html widely used] by web browsers to encrypt financial transactions and encrypted e-mails).

 

The documents also reveal an additional project called "Owning the Net" that is geared toward using quantum research to break encryption, including the widely used RSA encryption tool ([http://www.washingtonpost.com/world/national-security/nsa-seeks-to-build-quantum-computer-that-could-crack-most-types-of-encryption/2014/01/02/8fff297e-7195-11e3-8def-a33011492df2_story.html widely used] by web browsers to encrypt financial transactions and encrypted e-mails).

 

 



The new documents seem to show that the American security agency has not made any substantial progress than the rest of the scientific community. They seem to have expected to be able to have some of the building blocks of the computer by the end of September. However, an MIT professor of quantum mechanical engineering [http://www.washingtonpost.com/world/national-security/nsa-seeks-to-build-quantum-computer-that-could-crack-most-types-of-encryption/2014/01/02/8fff297e-7195-11e3-8def-a33011492df2_story.html said] of the September success “That’s a great step, but it’s a pretty small step on the road to building a large-scale quantum computer,” Lloyd said.

+

The new documents seem to show that the American security agency has not made any
more
substantial progress than the rest of the scientific community. They seem to have expected to be able to have some of the building blocks of the computer by the end of September. However, an MIT professor of quantum mechanical engineering [http://www.washingtonpost.com/world/national-security/nsa-seeks-to-build-quantum-computer-that-could-crack-most-types-of-encryption/2014/01/02/8fff297e-7195-11e3-8def-a33011492df2_story.html said] of the September success “That’s a great step, but it’s a pretty small step on the road to building a large-scale quantum computer,” Lloyd said.

 

 

 

The Washington Post have published an annotated version of the "Penetrating Hard Targets" project on their [http://apps.washingtonpost.com/g/page/world/a-description-of-the-penetrating-hard-targets-project/691/ website].

 

The Washington Post have published an annotated version of the "Penetrating Hard Targets" project on their [http://apps.washingtonpost.com/g/page/world/a-description-of-the-penetrating-hard-targets-project/691/ website].

Line 49:

Line 49:

 

===Defamation Act 2013 comes into effect===

 

===Defamation Act 2013 comes into effect===

 

 



The [[Defamation Act 2013|Defamation Act]] came into [http://www.bbc.co.uk/news/uk-25551640 effect] at the start of the New Year. The new regulations are aimed at improving defamation laws in the UK, including
the
targeting
of
'libel-tourism' and
the protection of
statements made in scientific and academic peer-reviewed publications.  

+

The [[Defamation Act 2013|Defamation Act]] came into [http://www.bbc.co.uk/news/uk-25551640 effect] at the start of the New Year. The new regulations are aimed at improving defamation laws in the UK, including targeting 'libel-tourism' and
protecting
statements made in scientific and academic peer-reviewed publications.  

 

 



[[
Defamation Act
2013#
Section 5
|
Section 5
]]
of the Act
,
provides a defence for
website operators
in the event a defamation case is made against them. In brief, the website operators cannot be
held accountable
if they can prove they did not write the alleged
defamatory
statement (
[
http://www.legislation.gov.uk/ukpga/
2013
/26/section/
5
/enacted subsection 2
]
). However, they can be held accountable if the claimant can prove they could not identify the poster
of the
statement
,
had issued
a
complaint to the operator and the operator failed to respond in accordance with the provisions contained in the regulations([http://www.legislation.gov.uk/ukpga/2013/26/section/5/enacted subsection 3])
.

+

[[
ORG parliamentary and policy update/
2013
-w41
#
ECHR_ruling_on_offensive_anonymous_comments
|
Previously
]], website operators
have been
held accountable
for anonymous
defamatory
comments on their websites.

 

+

However,
[
[Defamation Act
2013
#Section
5
| Section 5]
] of the
new Act
,
now provides them with
a
defence
.

 

 



The [[Ministry of Justice]] has published a [[Defamation Act 2013#Regulations_by_the_Ministry_of_Justice| guidance document]] on
section
5 and the regulations. The document (which can be accessed [https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/269138/defamation-guidance.pdf online] in PDF format) provides information on what should be included in a complaint against a defamatory statement and how website operators should respond to maintain their Section 5 defence.  

+

In brief, the website operators cannot be held accountable if they can prove they didn't write the alleged defamatory statement ([http://www.legislation.gov.uk/ukpga/2013/26/section/5/enacted subsection 2]). However, they can be held accountable if the claimant can prove they could not identify the poster of the statement, had issued a complaint to the operator and the operator failed to respond in accordance with the provisions contained in the regulations([http://www.legislation.gov.uk/ukpga/2013/26/section/5/enacted subsection 3]).

 

+

 

 

+

The [[Ministry of Justice]] has published a [[Defamation Act 2013#Regulations_by_the_Ministry_of_Justice| guidance document]] on
Section
5 and the regulations. The document (which can be accessed [https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/269138/defamation-guidance.pdf online] in PDF format) provides information on what should be included in a complaint against a defamatory statement and how website operators should respond to maintain their Section 5 defence.  

 

 

 

The new process is said to simplify the instances of defamatory disputes by creating a direct link with the person who posted the comments.

 

The new process is said to simplify the instances of defamatory disputes by creating a direct link with the person who posted the comments.

Line 72:

Line 75:

 

[[James Brokenshire MP| The Minister for Security]], [http://www.publications.parliament.uk/pa/cm201314/cmhansrd/cm140106/text/140106w0002.htm#140106w0002.htm_spnew24 answered] that the issue of peer-to-peer networks will be tackled by a pilot project involving the [[Internet Watch Foundation]] and the [[Child Exploitation and Online Protection Centre]] (the dedicated wing of the [[National Crime Agency]]).

 

[[James Brokenshire MP| The Minister for Security]], [http://www.publications.parliament.uk/pa/cm201314/cmhansrd/cm140106/text/140106w0002.htm#140106w0002.htm_spnew24 answered] that the issue of peer-to-peer networks will be tackled by a pilot project involving the [[Internet Watch Foundation]] and the [[Child Exploitation and Online Protection Centre]] (the dedicated wing of the [[National Crime Agency]]).

 

 



He also said the taskforce in question will work with online industry to tackle child-abuse online. Joanna Shields, CEO of Tech City UK and the UK ambassador for business for digital industries will
run the Industry Solutions group which will run
the industry engagement project
for one year
.

+

He also said the taskforce in question will work with online industry to tackle child-abuse online. Joanna Shields, CEO of Tech City UK and the UK ambassador for business for digital industries will
lead
the industry engagement project
through the Industry Solutions group
.

 

 

 

== International Developments ==

 

== International Developments ==

Line 100:

Line 103:

 

: "Considers it very doubtful that data collection of such magnitude is only guided by the fight against terrorism, as it involves the collection of all possible data of all citizens;  points therefore to the possible existence of other power motives such as political and economic espionage"

 

: "Considers it very doubtful that data collection of such magnitude is only guided by the fight against terrorism, as it involves the collection of all possible data of all citizens;  points therefore to the possible existence of other power motives such as political and economic espionage"

 

 



Another point raised was that it was likely similar programmes to [[Tempora]] existed in Germany and France, but on smaller scales. They thus call on the [[European Commission]] to
present
an EU-wide strategy on [[Internet governance| internet governance]].  

+

Another point raised was that it was likely similar programmes to [[Tempora]] existed in Germany and France, but on smaller scales. They thus call on the [[European Commission]] to
produce
an EU-wide strategy on [[Internet governance| internet governance]].  

 

 

 

The full report can be found [http://www.scribd.com/doc/198068763/EU-LIBE-Committee-Report-on-NSA-GCHQ-%E2%80%9CUntargeted-Secret-Illegal-Programs-Prohibit-Mass-Surveillance-Bulk-Processing%E2%80%9D online].

 

The full report can be found [http://www.scribd.com/doc/198068763/EU-LIBE-Committee-Report-on-NSA-GCHQ-%E2%80%9CUntargeted-Secret-Illegal-Programs-Prohibit-Mass-Surveillance-Bulk-Processing%E2%80%9D online].

Line 138:

Line 141:

 

The motion is supported by the party's president, [[Tim Farron MP|Tim Farron]] and [[Julian Huppert MP|Julian Huppert]]. The commission would be independent of business and security services and is thought to be modelled from the American [http://www.pclob.gov/about-us privacy and civil liberties oversight board].  

 

The motion is supported by the party's president, [[Tim Farron MP|Tim Farron]] and [[Julian Huppert MP|Julian Huppert]]. The commission would be independent of business and security services and is thought to be modelled from the American [http://www.pclob.gov/about-us privacy and civil liberties oversight board].  

 

 



It will also call for an annual release of government transparency reports that will [http://www.theguardian.com/politics/2014/jan/08/surveillance-security-review-lib-dems-gchq-snowden include] "annual number of user data requests made by law enforcement, the intelligence agencies, and other authorities, broken down by requesting authority, success rates, types of data requested and category of crime or event being investigated"; information the
current
[[Interception of Communications Commissioner]] and [[Intelligence Services Commissioner]] do not currently provide.

+

It will also call for an annual release of government transparency reports that will [http://www.theguardian.com/politics/2014/jan/08/surveillance-security-review-lib-dems-gchq-snowden include] "annual number of user data requests made by law enforcement, the intelligence agencies, and other authorities, broken down by requesting authority, success rates, types of data requested and category of crime or event being investigated"; information the [[Interception of Communications Commissioner]] and [[Intelligence Services Commissioner]] do not currently provide.

 

 

 

== ORG Media coverage ==

 

== ORG Media coverage ==

Show more