Showing posts with label WikiLeaks. Show all posts
Showing posts with label WikiLeaks. Show all posts

Saturday, May 6, 2017

'Risk' Is A Messy, Ambitious Portrait Of WikiLeaks Founder Julian Assange; NPR, May 5, 2017

John Powers, NPR; 

'Risk' Is A Messy, Ambitious Portrait Of WikiLeaks Founder Julian Assange


"Assange clearly believes that the world's power elite maintains control by doing things the public never gets to see. By leaking documents, he thinks, WikiLeaks is revealing how the world actually works — for instance, how Democratic National Committee big shots actually were conspiring to help Hillary Clinton beat Bernie Sanders.

Yet here's the problem. Just as most of us don't want our government secretly hoarding people's private information, we also don't want the release of sensitive documents to be controlled by a handful of leakers who answer to no one.

In last year's election, WikiLeaks didn't just leak things to damage Clinton — whom Assange considered a personal threat. The leaks failed to redact personal info about Clinton donors, like credit-card numbers, a violation of privacy called out by Snowden himself, though ignored by Poitras.

I don't trust Assange or any other unvetted source — and there will be more — to decide which documents from Russian hackers or NSA leakers get put on the web."

Saturday, April 1, 2017

WikiLeaks’ latest release of CIA cyber-tools could blow the cover on agency hacking operations; Washington Post, March 31, 2017

Ellen Nakashima, Washington Posr; WikiLeaks’ latest release of CIA cyber-tools could blow the cover on agency hacking operations

"WikiLeaks’ latest disclosure of CIA cyber-tools reveals a technique used by the agency to hide its digital tracks, potentially blowing the cover on current and past hacking operations aimed at gathering intelligence on terrorists and other foreign targets.

The release Friday of the CIA’s “Marble Framework” comes less than a month after the WikiLeaks dumped onto the Internet a trove of files — dubbed “Vault 7” — that described the type of malware and methods the CIA uses to gain access to targets’ phones, computers and other electronic devices...

WikiLeaks, founded by Julian Assange, has sought to position itself as a champion of transparency and defender of privacy rights. It described the Marble Framework as “the digital equivalent of a specialized CIA tool to place covers over the English language text on U.S. produced weapons systems before giving them to insurgents secretly backed by the CIA.”"

Wednesday, March 8, 2017

With WikiLeaks Claims of C.I.A. Hacking, How Vulnerable Is Your Smartphone?; New York Times, March 7, 2017

Steve Lohr and Katie Benner, New York Times; 

With WikiLeaks Claims of C.I.A. Hacking, How Vulnerable Is Your Smartphone?


"If the documents are accurate, did the C.I.A. violate commitments made by President Barack Obama?

In 2010, the Obama administration promised to disclose newly discovered vulnerabilities to companies like Apple, Google and Microsoft. But the WikiLeaks documents indicate that the agency found security flaws, kept them secret and then used them for surveillance and intelligence gathering.

Why is it so hard to keep these cyberweapons under wraps?

Unlike nuclear weapons, which can be guarded and protected, cyberweapons are “just computer programs which can be pirated like any other,” WikiLeaks notes. “Since they are entirely comprised of information they can be copied quickly with no marginal cost.”

There is a growing black market dedicated to trading these weapons, and government agencies from around the world will pay well for their discovery."

WikiLeaks Releases What It Calls CIA Trove Of Cyber-Espionage Documents; NPR, March 7, 2017

Camila Domonoske, NPR; 

WikiLeaks Releases What It Calls CIA Trove Of Cyber-Espionage Documents

"WikiLeaks has released thousands of files that it identifies as CIA documents related to the agency's cyber-espionage tools and programs.

The documents published on Tuesday include instruction manuals, support documents, notes and conversations about, among other things, efforts to exploit vulnerabilities in smartphones and turn smart TVs into listening devices. The tools appear to be designed for use against individual targets, as part of the CIA's mandate to gather foreign intelligence."

Thursday, August 18, 2016

A Break in the Assange Saga; New York Times, 8/17/16

Editorial Board, New York Times; A Break in the Assange Saga:
"Whether or not Sweden decides to formally charge Mr. Assange after questioning him, he may still be reluctant to abandon the Ecuadorean Embassy. But at least the focus of this curious saga will move closer to the serious legal, ethical and security issues at its core."

Sunday, August 7, 2016

For Putin, Disinformation Is Power; New York Times, 8/5/16

Arkady Ostrovsky, New York Times; For Putin, Disinformation Is Power:
"Fifteen years ago, a few months into his presidency, Vladimir V. Putin told Larry King on CNN that his previous job as a K.G.B. officer had been like that of a journalist. “They have the same purpose of gathering information, synthesizing it and presenting it for the consumption of decision makers,” he said. Since then, he has excelled at using the media to consolidate power inside Russia and, increasingly, to wage an information war against the West.
So the apparent hacking by Russian security services of the Democratic National Committee emails, followed by their publication by WikiLeaks, should come as no great surprise to Americans. It is only the latest example of how Mr. Putin uses information as a weapon. And the Kremlin has cultivated ties with WikiLeaks for years.
It has also used disinformation in its annexation of Crimea and in its war in Ukraine, launched cyberattacks on Finland and the Baltic States, and planted hoax stories in Germany to embarrass Angela Merkel. During the Cold War, the Kremlin interfered in American politics for decades. The K.G.B.’s so-called active measures — subversion, media manipulations, forgery and the financing of some “peace” organizations — lay at the heart of Soviet intelligence."

Thursday, July 28, 2016

Is the Elite Media Failing to Reach Trump Voters?; Slate, 7/28/16

Isaac Chotiner, Slate; Is the Elite Media Failing to Reach Trump Voters? :
"Has your opinion of him or WikiLeaks’ project changed?
Yeah, it has, because when WikiLeaks first began—one of the things that people have forgotten—they were actually very careful in redacting. In fact, there were tons of redactions when they were releasing Pentagon documents about the Afghanistan and Iraq wars. And they even wrote a letter to the State Department before they released the cables requesting the State Department’s help in figuring out which information ought to be withheld. And I used to defend WikiLeaks all the time on the grounds that they were not indiscriminate dumpers of information; they were carefully protecting people’s reputations. And they have changed their view on that—and no longer believe, as Julian says, in redacting any information of any kind for any reason—and I definitely do not agree with that approach and think that they can be harmful to innocent people or other individuals in ways that I don’t think is acceptable."

Wednesday, July 27, 2016

Assange, Avowed Foe of Clinton, Timed Email Release for Democratic Convention; New York Times, 7/26/16

Charlie Savage, New York Times; Assange, Avowed Foe of Clinton, Timed Email Release for Democratic Convention:
"Six weeks before the anti-secrecy organization WikiLeaks published an archive of hacked Democratic National Committee emails ahead of the Democratic convention, the organization’s founder, Julian Assange, foreshadowed the release — and made it clear that he hoped to harm Hillary Clinton’s chances of winning the presidency...
At one point, Mr. Peston said: “Plainly, what you are saying, what you are publishing, hurts Hillary Clinton. Would you prefer Trump to be president?”
Mr. Assange replied that what Mr. Trump would do as president was “completely unpredictable.” By contrast, he thought it was predictable that Mrs. Clinton would wield power in two ways he found problematic.
First, citing his “personal perspective,” Mr. Assange accused Mrs. Clinton of having been among those pushing to indict him after WikiLeaks disseminated a quarter of a million diplomatic cables during her tenure as secretary of state.
“We do see her as a bit of a problem for freedom of the press more generally,” Mr. Assange said."

Bigger than Watergate: The Russian-orchestrated DNC email hack places our national sovereignty at stake; Salon, 7/27/16

Bob Cesca, Salon; Bigger than Watergate: The Russian-orchestrated DNC email hack places our national sovereignty at stake:
"As of this writing, further details along with the chain-of-evidence is still being established by journalists, security experts and the FBI. (By the way, before anyone kneejerks to the “crazy conspiracy theory” conclusion, it’s worth noting that everyone from the former U.S. ambassador to Russia, to A-list reporter Richard Engel, along with The Daily Beast, ABC News, NBC News, Yahoo! News, Slate, TPM, Vice and The Washington Post have been uncovering new and frightening aspects of this story going back to June and culminating with the past 48 hours.) According to investigative journalists at Vice’s “Motherboard,” in particular, a security firm hired by the DNC discovered the existence of “two sophisticated adversaries” that had infiltrated the Democratic Party’s internal email network. Known as “APT 28″ and “APT 29,” the handles are used by both the Russian intelligence service, the FSB (formerly the KGB) and the Russian military intelligence agency, the GRU. Later, using a front handle known as the aforementioned “Guccifer 2.0,” the agencies announced back in June that it had given Wikileaks “thousands of files and mails.”
Regarding the content of some of the emails, bear this in mind: according to conservative author and former NSA analyst, John Schindler, who, by the way, is no fan of Hillary Clinton, part of the FSB’s tradecraft is to fabricate intelligence and toss it into a cocktail of legitimate documents. In other words, it’s fair to speculate, based on Russia’s modus operandi, that the questionable emails were doctored, if not manufactured for impact, while exculpatory emails might’ve been scrubbed from the tranche. We have to question everything here, given the tenacity of Putin’s propaganda efforts...
One last thing: if you’re only looking at this story as an internal DNC scandal, you’re missing the despotic forest for the trees. We can’t emphasize enough: this story is bigger than Bernie or Hillary. It’s bigger than Trump. It speaks directly to the sovereignty of our electoral process. The sooner it’s treated this way, the better off we’ll be."

Tuesday, July 26, 2016

The DNC Hack Is Watergate, but Worse; Slate, 7/26/16

Franklin Foer, Slate; The DNC Hack Is Watergate, but Worse:
"What’s galling about the WikiLeaks dump is the way in which the organization has blurred the distinction between leaks and hacks. Leaks are an important tool of journalism and accountability. When an insider uncovers malfeasance, he brings information to the public in order to stop the wrongdoing. That’s not what happened here. The better analogy for these hacks is Watergate. To help win an election, the Russians broke into the virtual headquarters of the Democratic Party. The hackers installed the cyber-version of the bugging equipment that Nixon’s goons used—sitting on the DNC computers for a year, eavesdropping on everything, collecting as many scraps as possible. This is trespassing, it’s thievery, it’s a breathtaking transgression of privacy. It falls into that classic genre, the dirty trick. Yet that term feels too innocent to describe the offense. Nixon’s dirty tricksters didn’t mindlessly expose the private data of low-level staff."

Sunday, July 24, 2016

Debbie Wasserman Schultz to resign as DNC chair as email scandal rocks Democrats; Guardian, 7/24/16

Dan Roberts, Ben Jacobs, Alan Yuhas, Guardian; Debbie Wasserman Schultz to resign as DNC chair as email scandal rocks Democrats:
"The most explosive new revelation from the Wikileaks release was an official’s suggestion that Sanders’ religious faith, or lack thereof, could be flagged as a way to dissuade voters from backing him in Bible belt states.
“I think I read he is an atheist,” the DNC chief financial officer, Brad Marshall, wrote in one email. “This could make several points difference with my peeps. My Southern Baptist peeps would draw a big difference between a Jew and an atheist.”
Sanders, who is Jewish, spoke little of religion during the primary, but the sight of a supposedly neutral body apparently seeking to weaken one of its own party candidates caused particular anger among progressives.
Schultz, a congresswoman from Florida who is herself Jewish, is not thought to have been directly involved in this email exchange, but she was seen in other messages writing dismissively of the Sanders campaign."

Thursday, October 22, 2015

When The Hackers Become The Hacked: Why Reading John Brennan's Emails Feels Wrong; HuffingtonPost.com, 10/21/15

Ali Watkins, HuffingtonPost.com; When The Hackers Become The Hacked: Why Reading John Brennan's Emails Feels Wrong:
"But Wikileaks is not bound by the journalistic code that most news organizations adhere to. (A request for comment from a public relations representative for the group was not returned.)
To some, it seemed a delightfully cruel irony: America’s spy chief, keeper of secrets, forced to frantically try and guard his own. But to others -- including some of the people whose very job it is to be critical of Brennan and his agency -- Wednesday's email dump felt different. It felt slimy. A bit exploitative. It feels odd to challenge Brennan and the CIA on things like his agency’s historical disregard for citizens' personal privacy -- and then turn around and casually disregard his."

Thursday, October 15, 2015

Wikileaks release of TPP deal text stokes 'freedom of expression' fears; Guardian, 10/9/15

Sam Thielman, Guardian; Wikileaks release of TPP deal text stokes 'freedom of expression' fears:
"One chapter appears to give the signatory countries (referred to as “parties”) greater power to stop embarrassing information going public. The treaty would give signatories the ability to curtail legal proceedings if the theft of information is “detrimental to a party’s economic interests, international relations, or national defense or national security” – in other words, presumably, if a trial would cause the information to spread...
“The text of the TPP’s intellectual property chapter confirms advocates warnings that this deal poses a grave threat to global freedom of expression and basic access to things like medicine and information,” said Evan Greer, campaign director of internet activist group Fight for the Future. “But the sad part is that no one should be surprised by this. It should have been obvious to anyone observing the process, where appointed government bureaucrats and monopolistic companies were given more access to the text than elected officials and journalists, that this would be the result.”"

Thursday, April 16, 2015

Don’t Keep the Trans-Pacific Partnership Talks Secret; New York Times, 4/14/15

Margot E. Kaminski, New York Times; Don’t Keep the Trans-Pacific Partnership Talks Secret:
"WHEN WikiLeaks recently released a chapter of the Trans-Pacific Partnership Agreement, critics and proponents of the deal resumed wrestling over its complicated contents. But a cover page of the leaked document points to a different problem: It announces that the draft text is classified by the United States government. Even if current negotiations over the trade agreement end with no deal, the draft chapter will still remain classified for four years as national security information. The initial version of an agreement projected by the government to affect millions of Americans will remain a secret until long after meaningful public debate is possible.
National security secrecy may be appropriate to protect us from our enemies; it should not be used to protect our politicians from us. For an administration that paints itself as dedicated to transparency and public input, the insistence on extensive secrecy in trade is disappointing and disingenuous. And the secrecy of trade negotiations does not just hide information from the public. It creates a funnel where powerful interests congregate, absent the checks, balances and necessary hurdles of the democratic process.
Free-trade agreements are not just about imports, tariffs or overseas jobs. Agreements bring complex national regulatory systems together, such as intellectual property law, with implications for free speech, privacy and public health."

Monday, March 25, 2013

In Leak Case, State Secrecy in Plain Sight; New York Times, 3/24/13

David Carr, New York Times; In Leak Case, State Secrecy in Plain Sight: "Reporters covering the government’s prosecution of Pfc. Bradley Manning, who is being court-martialed for conveying secret information to WikiLeaks, have spent a year trying to pierce the veil of secrecy in what is supposed to be a public proceeding. In pretrial hearings at Fort Meade, Md., basic information has been withheld, including dockets of court activity, transcripts of the proceedings and orders issued from the bench by the military judge, Col. Denise Lind. A public trial over state secrets was itself becoming a state secret in plain sight. Finally, at the end of last month, in response to numerous Freedom of Information requests from news media organizations, the court agreed to release 84 of the roughly 400 documents filed in the case, suggesting it was finally unbuttoning the uniform a bit to make room for some public scrutiny."

Sunday, January 16, 2011

Swiss whistleblower Rudolf Elmer plans to hand over offshore banking secrets of the rich and famous to WikiLeaks; Guardian, 1/16/11

Ed Vulliamy, Guardian; Swiss whistleblower Rudolf Elmer plans to hand over offshore banking secrets of the rich and famous to WikiLeaks:

"Elmer, who after his press conference will return to Switzerland from exile in Mauritius to face trial, is a former chief operating officer in the Cayman Islands and employee of the powerful Julius Baer bank, which accuses him of stealing the information.

He is also – at a time when the activities of banks are a matter of public concern – one of a small band of employees and executives seeking to blow the whistle on what they see as unprofessional, immoral and even potentially criminal activity by powerful international financial institutions."

Monday, January 10, 2011

1986 Privacy Law Is Outrun by the Web; New York Times, 1/10/11

Miguel Helft and Claire Cain Miller, New York Times; 1986 Privacy Law Is Outrun by the Web:

"The rules established by the 1986 Electronic Communications Privacy Act depend on what type of information is sought and how old it is. And courts in different jurisdictions have interpreted the rules differently.

But in many cases, the government does not notify people that they are searching their online information or prove probable cause, and if the government violates the law in obtaining information, defendants are generally unable to exclude that evidence from a trial, Ms. Freiwald said."

Sunday, January 9, 2011

[Podcast] Environmental Wikileaks; Living on Earth, 1/7/11

[Podcast], Living on Earth; Environmental Wikileaks:

"The classified documents made public by WikiLeaks are revealing closed door discussions on hot-button environmental issues, including whaling, climate change and genetically engineered crops. LOE’s Jeff Young looks at WikiLeaks through a green lens."

Tuesday, January 4, 2011

A Clear Danger to Free Speech; New York Times, 1/4/11

Geoffrey R. Stone, New York Times; A Clear Danger to Free Speech:

"If we grant the government too much power to punish those who disseminate information, then we risk too great a sacrifice of public deliberation; if we grant the government too little power to control confidentiality at the source, then we risk too great a sacrifice of secrecy. The answer is thus to reconcile the irreconcilable values of secrecy and accountability by guaranteeing both a strong authority of the government to prohibit leaks and an expansive right of others to disseminate information to the public."