Linguist Noam Chomsky joins University of Arizona faculty – Arizona Daily Star

Renowned linguist Noam Chomsky is joining the University of Arizona faculty this fall and will begin teaching in the spring semester.

Having a scholar of Dr. Chomskys caliber on our campus presents a tremendous opportunity for our students, faculty and staff, and truly speaks to the greatness of this university, said UA President Robert Robbins in a prepared statement.

Chomsky, who has been a guest lecturer and teacher at the UA for about five years, will join the Department of Linguistics in the College of Social and Behavioral Sciences in a quarter-time appointment as a laureate professor, Robbins said.

He will also serve as an Agnese Nelms Haury Chair in the Agnese Nelms Haury Program in Environment and Social Justice.

Chomskys salary is $62,500 a year, all of which is funded by philanthropic donations, mostly from the Agnese Nelms Haury Program.

And while Chomsky is not a full-time faculty member, John Paul Jones III, dean of the College of Social and Behavioral Sciences, expects him to have a full schedule, splitting his time between teaching and public events.

Chomsky is among the most cited scholars in history and has written more than 100 books.

He is considered the father of modern linguistics, and his work has influenced many fields, including cognitive science, philosophy, psychology, computer science, mathematics, childhood education and anthropology.

He is also a powerful voice on sociopolitical issues, including free speech, foreign policy, political engagement, environmental destruction and the rights of indigenous populations, among many other topics.

Hes been a figure on campus since 2012, Jones said. The first talk we had in Centennial Hall, 6,000 showed up for 2,500 seats. We had to scramble to find classrooms (for overflow).

Since then, hes visited Tucson often, including for A Conversation on Privacy, in which the College of Social and Behavioral Sciences invited Chomsky, Glenn Greenwald, co-founding editor of the Intercept; Nuala OConnor, president and CEO of the Center for Democracy and Technology; and Edward Snowden, who participated through Skype, to talk about the balance between government surveillance and individual rights.

He wouldnt have come here (permanently) if it hadnt been for the Linguistics Department, Jones said, not only referring to former students who are now at the UA, but the department is also intellectually engaged in the same questions that hes interested in.

Weve very much come to appreciate the intellectual environment and the lifestyle, Chomsky said in a statement. The linguistics department, which is excellent, happens to be full of former students of mine. In general, we felt that the UA would be a good place to work and think and interact with people we like and can work with.

Chomsky worked as a linguistics professor at the Massachusetts Institute of Technology since 1955 then as a professor emeritus.

Teaching undergraduates regularly again was also a big draw, Chomsky said. He hadnt taught undergrads for about 10 years until spring 2016, when he co-taught an elective course on politics and global issues with UA geography professor emeritus Marv Waterstone.

Half of the 500 people who signed for the course were undergraduate students. The other 250 were community members enrolled through the Humanities Seminars Program, Jones said.

I think about the students who are going to be sitting around a dinner table some day, Jones said. And someone will mention Noam Chomsky, and hell say, I took his class! and theyll say, Where? and theyll say, At the U of A.

Chomskys former students and departmental fellows who have also made the move to the UA were just part of his decision to call Tucson home.

We fell in love with Tucson the mountains, the desert, Chomsky said. Tucson has an atmosphere that is peaceful and manageable.

Original post:
Linguist Noam Chomsky joins University of Arizona faculty - Arizona Daily Star

The struggalo is real as radical ICP fans mobilize online – A.V. Club

If youve any interest in politics, rapping clowns, and/or the intersection of the two, youve probably heard by now that the National Mall has been double-booked on September 16, with the pro-Trump Mother of All Ralliespresumably named to honor the mothers who will be dropping protesters off at the marchset to collide with ICPs planned Juggalo March on Washington. The Juggalo march is in protest of the FBIs classification of ICP fans as a loosely organized hybrid gang, a label organizers say has unfairly cost Juggalos jobs and custody of their children, and encouraged police harassment of Juggalos.

Save for this one issue, ICP is not an explicitly political band, and there are some pro-Trump Juggalos. But the overlap between the Juggalo March and rabid Trumpies is likely to be minimal. Juggalos view their community as a loving family that accepts everyone just as they are, which is the opposite of what Nazi pricksor, as they prefer to be known, white nationalistsadvocate. And, in the unlikely venue of a Time magazine editorial on last years wave of creepy clown sightings, ICPs Violent J had this to say about the clowns in Washington:

These clowns threaten the very fabric on which our nation was supposedly founded uponand for some fing crazy-a reason, theyre getting away with it. From keystone-cop clowns shooting unarmed citizens, to racist clowns burning down Islamic centers or clowns in the NSA spying on us through our cell phones and laptops, America has turned into something far more terrifying than Insane Clown Posses Dark Carnival.

So perhaps it shouldnt be too much of a surprise that radical leftist Juggalos are mobilizing online in opposition to the Trump supporters who are giving clowns a bad name. One of those organizers runs a Twitter account called Struggalo Circus, a ragtag and messy coalition between radicals and juggalos which started in June with this tweet:

And distributed these Protesting 101 flyers at this years Gathering:

Well give that a whoop whoop. Struggalo Circus also has a Facebook group, and the feminist Juggalo group Lettes Respect has emerged to advocate for Juggalette rights. The rest of the Juggalo movement is less organized, but a quick search of the largest Juggalo March on Washington Facebook event turns up a number of left-leaning political posts, from the eloquentAll irony aside, Juggalos are true working class people suffering under the exploitive capitalist system and I would be proud to stand with yall against the rich elite class ruining our society and trashing our world. Can I get a whoop whoopto the more straightforward seems like theyre trying to lump us in with people spouting hate. We need to come in with a strong message of Juggalo Love.

Screenshot: Facebook

Screenshot: Facebook

This all goes down on September 16, when the M.O.A.R march is set to kick off at 11 a.m. at the Washington Monument, and the Juggalo March at noon at the Lincoln Memorial, according to Consequence Of Sound. Thats when well see if Juggalos truly are ready to, to quote ICPs 1992 song Your Rebel Flag, shit on a motherfuckin Rebel flag.

Submit your Great Job, Internet tips here.

Next Great Job, Internet! Watch America rid itself of Confederate statues with this constantly updating map

Link:
The struggalo is real as radical ICP fans mobilize online - A.V. Club

The Government Is Seeking Information on Anti-Trump Website Visitors and People Are Concerned – POPSUGAR

If you weren't already concerned enough with the abnormal trickle-down effects of the Donald Trump White House, there's something else you should worry about: the government potentially tracking you down because you visited an anti-Trump website.

The United States Department of Justice is trying to obtain visitor logs and IP addresses of anyone who visited DisruptJ20.org, a web resource for various resistance-based activities associated with January's inauguration. The DOJ is hoping to get information on more than 1.3 million IP addresses connected to the website from Dreamhost, the company that hosts the J20 website, in the hopes of connecting them to more than 200 people arrested during inaugural protests.

News of the measure comes in advance of a hearing to be held this Friday by the Washington DC Superior Court one that could shape how the government gains access to supposedly private First Amendment-protected free speech via online interactions. The move has been denounced by many in the digital rights community: the Electronic Frontier Foundation stated "no plausible explanation exists" for such an overreaching measure and it is monitoring the situation; digital advocacy blog Popehat called the matter "chilling" as the administration carries "overt hostility to protesters;" net neutrality nonprofit Fight For the Future simply stated that the issue is "outrageous government overreach;" and the ACLU wrote that there is a "vast danger" in letting the government target political speech in this way.

The DOJ's move appears to put many online dissenters in potential danger, and experts like Bennet Kelley, founder of the Internet Law Center, are concerned. Kelley believes people should be worried about the government requesting this kind of private data. "What's striking about this request is that they're seeking anyone who went to the site without limitation to day," Kelley tells POPSUGAR, explaining that DisruptJ20.org offered information on everything from the Women's March to maps of inaugural events.

Kelley contrasts a sweeping request like this to a "vacuum cleaner search," one that hones in on what information is needed instead of demanding it all, as the former "burdens free speech" by giving the DOJ too much information. As Dreamhost noted in a statement that resists the request and supports users, using a site like DisruptJ20.org is protected by the First Amendment as a means to "exercise and express political speech."

Yet this situation isn't entirely surprising. As Kelley points out, the leading web platforms have seen increasing numbers of government requests which have been shared in public reports. Facebook alone saw a nine percent increase in requests for user account data in the latter half of 2016. Moreover, technology users are mostly not protecting themselves, ignoring Edward Snowden's distrust of US cloud services as they risk NSA spying and rarely reading terms and conditions. People are not protecting their free speech accordingly and, as the DisruptJ20.org situation proves, tech users should be more vigilant in their online interactions.

At the heart of the issue is protecting online anonymity. Akin to Apple's opposing the unlocking of the San Bernardino shooter's phone, "Our success depends on our ability for people to feel secure on these platforms," Kelley says. "[Anonymous speech] has a long history in our constitutional republic. It's very highly regarded as a key element of speech."

Beyond encrypting everything, people should feel empowered in another way: reach out to your congressperson and similar representatives to express concern. "If you are concerned about this, talk to your congressman or senator," Kelley says. "Tell them you want to hold a hearing and that you want to restrict the Justice Department."

Image Source: Getty / Drew Angerer

This SNL Writer's Epic Trolling of Trump Will Make You Laugh Until Your Side Hurts

by Terry Carter 13 hours ago

Here's a List of Businesses to Boycott or Support If You Oppose Trump

by Valerie Cools 5 hours ago

Need a Reason to Be Proud of America? Visit a National Park

by Annie Gabillet 18 hours ago

Here's What You Need to Know About Trump and the 25th Amendment

by Chelsea Hassler 14 hours ago

10 Ways to Join the Resistance and Fight Back Against Trump Right Now

by Chelsea Hassler 15 hours ago

Read more:
The Government Is Seeking Information on Anti-Trump Website Visitors and People Are Concerned - POPSUGAR

Beginner’s guide to Windows 10 encryption – Windows Central


Windows Central
Beginner's guide to Windows 10 encryption
Windows Central
Encrypting a drive or a folder or a file generally means you have a single password that must be used in order to decrypt and access. Not only does this stop outside parties from hacking their way into your files, it also protects in the event that you ...

Read the original here:
Beginner's guide to Windows 10 encryption - Windows Central

Lancaster County EMS concerned for safety after decision for police radio encryption – FOX43.com

Please enable Javascript to watch this video

LANCASTER, Pa. -- Lancaster County EMS officials fear they need to be concerned for their own safety. That's after county commissioners decided to encrypt police radio calls.

As soon as November, when the public, media or emergency responders listen to a police scanner or radio in Lancaster County, they may hear muddled voices.

EMS officials are now asking county commissioners to exempt them from police radio encryption, but they are in support of encryption so the public and the media can't hear all the calls.

Darrell Fisher, the president of the Lancaster County EMS Council said, "What we feel is that EMS should not be put into the same umbrella as the public. We're out on the streets, we're on the forefront with the police department. Any large situation or any violent scene that requires an ambulance, we're there with them."

Lancaster Police Chief Keith Sadler said even though the radios for EMS would be encrypted, those emergency responders would still get updates from dispatchers.

Sadler said, "Our radio dispatch, the county dispatch in Lancaster County allows us to communicate with them and vice versa. So they don't necessarily have to be on the same band as we are."

Emergency responders said it takes more time for dispatch to communicate to them than to hear police calls. And that time is precious for first responders.

Fisher said, "So if they're on a scene that maybe we're traveling to and they update saying now the patient is violent or the scene is unsafe, we don't approach that scene. Where now those messages can be delayed seconds or even up to a minuteat atime."

Sadler said it's an issue of where do you draw the line.

He said, "If we were to expand that to EMS and fire, there's still a risk that we don't necessarily know who's listening in."

Fisher said EMS needs to know as soon as possible if a situation they are responding to has become violent.

"So we're not looking to undo what the commissioners have voted to do. We support that. We want the officers to stay safe out in the public. But we're also hoping to keep our people safe in the county," he said.

Fisher said although he has brought the issue to commissioners, none of them have responded to his request yet.

The chief clerk with the commissioners said there was no discussion about changes to the encryption policy at the last county meeting.

40.037875 -76.305514

View original post here:
Lancaster County EMS concerned for safety after decision for police radio encryption - FOX43.com

Five good questions to ask before buying encryption – Techseen

General Data Protection Regulation (GDPR) together with growing number of data breaches are the most pressing reasons why small and medium businesses are implementing data protection technologies including encryption. With the limited time and market flooded by various products, it can be a difficult task for company owners and decision makers to find the right fit for their needs.

If you are faced with the decision yourself, avoid pitfalls in selecting an encryption product by asking the following questions:

This might seem like a pointless question with an obvious answer; systems are more liable to loss or theft when away from the office, but making this distinction and keeping it in mind is the right place to start and when you have settled on a solution, be sure to test its effectiveness at managing problem scenarios for your remote users.

All major Endpoint Encryption products offer the means to manage remote systems, but look carefully at the requirements. Most need either an open incoming connection to a demilitarized zone (DMZ) on your Server, or a VPN connection. All involve a higher level of IT skills and additional costs and may require the user to initiate the connection to function; not much use with a rogue employee or stolen laptop. A well-designed product will give you the remote management necessary without creating additional security problems, requiring specialist knowledge or adding expense to the project.

Why is this important?

Being able to quickly vary security policy, encryption keys, features and operation of endpoint encryption remotely, means that your default policy can be strong and tight. Exceptions can be made only when and where they are needed, and reverted just as easily. If you cant do this youll be forced to leave a key under the doormat just in case, tearing holes in your policy before deployment is complete.

The answer might be crucial if a company computer with full-disk encryption gets stolen while in sleep mode or with operating system booted up, not to mention those systems with the pre-boot password affixed on a label or tucked in the laptop bag. If a remote lock or wipe function is not available, then the system is either unprotected or secured only by the OS password, with the encryption being bypassed in either case.

Similarly, it is important to know whether the solution has been designed to accommodate the typical use-cases that would otherwise unravel a well-designed security policy.

With an array of writeable devices that people use for their everyday work, it is almost impossible for the admins to whitelist each and every one of them and decide if they can be read from or written to. It is much easier to set a file-level policy distinguishing between files that need encryption and those that dont and keep these protected every time they move from workstation or corporate network to any portable device.

In other words, if you connect your own USB stick, it wont force you to encrypt your private data, however anything coming from the company system will be encrypted without the keys being held on your device. A simple idea, but one which makes any device safe, without the need for whitelisting.

If the setup of the solution takes hours or even days and needs additional tools for its operation, it might cause new headaches for company admins and create new security risks. Aim for an easy-to-deploy solution that doesnt require advanced IT expertise, preserving your finances as well as human resources. If the user-experience mirrors that easy deployment, then IT staff wont be further taxed by user-lockouts, lost data and other frustrations.

Closing remarks: The security was there a long time ago; what will make or break your deployment is flexibility and ease of use.

All validated, commercial encryption products have been more than strong enough for many years, yet a significant proportion of the recorded data breaches involving lost or stolen laptops and USB drives happened to organizations who had bought and deployed encryption products. Reading the case notes for these incidents reveals being able to fit the solution your environment and working practices and making encryption easy for everyday users as the real challenges.

See more here:
Five good questions to ask before buying encryption - Techseen

Encryption key for iPhone 5s Touch ID exposed, opens door to … – AppleInsider (press release) (blog)

By Mike Wuerthele Thursday, August 17, 2017, 11:14 am PT (02:14 pm ET)

First spotted by Redmond Pie on Wednesday, Twitter user "xerub" posted the information, and an extraction tool for the Secure Enclave firmware, in advance of the Singapore Hack in the Box conference.

The tool and hack is not for the inexperienced. The outputs of the tool are binaries of the kernel and related software regulating the communications between the Touch ID sensor and Secure Enclave but not any information transmitted presently or in the past between the Touch ID sensor and the Secure Enclave.

The exposure of how to extract the encryption key from an iPhone 5s does not mean that the device is no longer secure. However, it does mean that people angling to make exploits for the device are able to examine the Secure Enclave firmware on the device in more detail than previously possible.

At present, there is no known exploit utilizing the tool, or the gleaned data, and it is not clear how one would even be produced or installed on a target device. Any exploit developed with the tool would be specific to the iPhone 5s, and require physical access to the device to load custom firmware as well.

Apple's Secure Enclave is in Apple's A7 processor and later and provides all cryptographic operations for data protection in iOS devices. The Secure Enclave utilizes its own secure boot and can be updated using a personalized software update process that is separate from the application processor which is how any exploit would have to be installed, one device at a time.

The Secure Enclave is responsible for processing fingerprint data from the Touch ID sensor, determining if there is a match against registered fingerprints, and then enabling access. Each pairing of the Touch ID uses the shared encryption key, and a random number to generate that session's full encryption key.

Read the original:
Encryption key for iPhone 5s Touch ID exposed, opens door to ... - AppleInsider (press release) (blog)

Survey Says Security Professionals Doubt Effectiveness of Encryption Backdoors – PYMNTS.com

Share

Share

Share

Share

Print

Email

Venafi, the provider of machine identity protection, announced Thursday (Aug. 17) that, based on survey results, the majority of IT security professionals think encryption backdoors arent effective and can be potentially dangerous.

The survey, which polled 296 IT security professionals on encryption backdoors found 72 percent of the respondents do not believe encryption backdoors would make their nations safer from terrorists. Giving the government backdoors to encryption destroys our security and makes communications more vulnerable, said Kevin Bocek, chief security strategist for Venafi, in a press release announcing the results of the survey. Its not surprising that so many security professionals are concerned about backdoors; the tech industry has been fighting against them ever since global governments first called for unrestricted access. We need to spend more time protecting and supporting the security of our machines, not creating purposeful holes that are lucrative to cybercriminals.

Other findings in the survey include that only nine percent believe the technology industry is doing enough to protect the public from the dangers of encryption backdoors, while 81 percent feel governments should not be able to force technology companies to give them access to encrypted user data. The survey also revealed 86 percent believe consumers dont understand issues around encryption backdoors. Encryption backdoors create vulnerabilities that can be exploited by a wide range of malicious actors, including hostile or abusive government agencies, said Venafi in the release. Billions of people worldwide rely on encryption to protect critical infrastructure including global financial systems, electrical grids and transportation systems from cyber criminals who steal data for financial gain or espionage, the company noted.

This isnt the first time that IT professionals have expressed concerns about encryption backdoors. A survey in January of 2016 found 63 percent of IT professionals remain opposed to the idea. According to a survey by global IT and cybersecurity association ISACA, nearly 59 percent of respondents said privacy was being compromised by the governments effort to impose stricter cybersecurity laws. The Cybersecurity Snapshot shows that the professionals on the front lines of the cyberthreat battle recognize the value of information sharing among consumers, businesses and government but also know the challenges associated with doing so, Christos Dimitriadis, international president of ISACA and group director of information security at INTRALOT, said in a press release.

Share

Share

Share

Share

Print

Email

Read the rest here:
Survey Says Security Professionals Doubt Effectiveness of Encryption Backdoors - PYMNTS.com

Changing the security landscape for entrepreneurs – TechCrunch

Bob Ackerman Jr. Contributor

Robert Ackerman Jr. is the founder and a managing director of Allegis Capital, an early-stage cybersecurity venture firm, and a founder of DataTribe, a startup studio for fledgling cyber startups staffed by former government technology innovators and cybersecurity professionals.

Throughout the course of human history, disruptive innovation has been required to unleash higher tiers of human potential. Think of Gutenberg and movable type, Edison and electricity or Berners-Lee and the World Wide Web.

We are in need of another such breakthrough today. Cloud computing and the Internet of Things (IoT) embody vast promise for advancing civilization. But they also have given rise to seemingly intractable security exposure, including nation-state rifts, not to mention profound quandaries about the erosion of individual privacy.

The good news is that a new technological advance could unleash the full promise of cloud computing and put IoT on the verge of everyday use by U.S. intelligence agencies and in the private sector. This advance two decades in the making is called homomorphic encryption, and it allows data to be queried and analyzed without decrypting it.

Homomorphic encryption is the Holy Grail of encryption, says Ellison Anne Williams, a math PhD, former NSA senior researcher and co-founder and CEO of ENVEIL, a security startup that has fine-tuned a homomorphic encryption system for commercial use.

The explosive growth of cloud computing makes this crucial. Amazon EC2, Google Cloud and Microsoft Azure have made cloud storage and processing services a major enabler of digital commerce. An enterprise that uses one of these services is effectively extending the boundary of their trusted enterprise compute environment, owned and managed by them, to an untrusted location owned and managed by a third party.

The problem is that there is a security gap in cloud services today. Companies routinely encrypt data kept in storage and make certain only encrypted data is transported to and from cloud storage facilities. But in order to act on this data to, say, do a simple search or perform an analytic both the query and the stored data must be decrypted. This creates an opportunity for an alert intruder lurking on the network to steal the data in unencrypted form.

Threat actors are acutely aware of this Achilles heel of cloud computing and are salivating to exploit it. We know this because business networks routinely falter and briefly expose decrypted data. When this happens, security analysts at large enterprises pay close attention. In a few cases recently, network intruders have been detected doing much the same type of reconnaissance of a companys crown jewels.

The current roots of homomorphic encryption date back to 2008, when IBM researcher Craig Gentry came up with a way to perform mathematical operations on encrypted data without first needing to decrypt the data the first working example of homomorphic encryption.

Trouble was, it took gargantuan computing power to make Gentrys rudimentary prototype work. Steady progress was made over time by others, however, and today we are finally on the threshold of seeing homomorphic encryption deployed in daily business use.

Speaking recently at the Billington Cybersecurity Summit in Washington, Jason Matheny, director of the governments Intelligence Advanced Research Projects Activity (IARPA), told attendees it has taken math magic for this technology to arrive at this point. IARPA is in the late phase of developing a database query system based on homomorphic encryption.

The embrace of homomorphic encryption is powerful. For example, authorities, acting on evidence, will be able to search travel and financial records or telephone and email logs, while, say, hot on the trail of a terrorist. And they will be able to do so without ever exposing the underlying data personal information that belongs to the wider citizenry, muting the possibility of abusing power.

Computer processing power, of course, has advanced steadily since IBMs Gentry produced his prototype. But it is really the collective brainpower of a group of math geniuses who followed him that brought us to the point we are at today. Driving efforts within the federal government and in private research labs at places like IBM and Microsoft, these highly insightful experts have been pushing the envelope.

Last year, Microsoft researchers smashed a homomorphic encryption speed barrier. While there is still work to be done, Kristin Lauter, a principal research manager at Microsoft, has said that initial results look very promising and that the technology could be used, for example, on specialized devices for medical or financial predictions. We are definitely going toward making it available to customers and the community, she told The Register, a British technology news website.

IBM also continues to make progress. It has been granted a patent, for instance, on a particular homomorphic encryption method. This is a strong hint that it continues to work toward a practical solution, not simply continued pursuit of theoretical research. Meanwhile, ENVEILs Williams, who spent years at the NSA chiseling away at a practical version of homomorphic encryption, now has 10 pending customers analyzing its proof of concept.

It is in the commercial arena, in particular, where homomorphic encryption is destined to be truly disruptive. To start with, it shrinks the attack surface for organizations increasingly dependent on cloud services. That alone will make compliance much easier, both in meeting data handling rules and, for governments, enforcing them. Neither is a small feat. Meeting federal rules for the handling of medical and financial records or the handling of transaction data is significantly easier for companies with well-defended networks.

Meanwhile, regulatory pressure to better protect data is intensifying. There is a rising tide of state-imposed data security rules, such as those recently enacted in New York, Massachusetts, Vermont and Colorado. In addition, there is Europes pending new General Data Protection Regulation, one replete with exhaustive data protection requirements and onerous penalties if they are not met.

A key byproduct of the elimination of the unencrypted security gap will be heightened innovation, and at an important juncture. Consider, for example, the oceans of sensitive personal information that will be collected as IoT continues to grow. Analysts will be far more inclined to gather this broad expanse of data if they know it will be protected properly. They are keenly aware of a personal privacy line that must not be crossed in mining IoT data for marketing purposes, lest consumers revolt.

Beyond consumerism, opportunities to enhance the world of medicine could open up with the embrace of homomorphic encryption. Imagine, for example, medical researchers being able to query millions of HIPAA-protected patient records to identify disease trends by demographics and geographic location. We could enter a golden age of medical advances.

No doubt, other amazing developments are sure to spin out of the mainstreaming of homomorphic encryption. Stay tuned. This disruption can change everything for the better.

Read the original post:
Changing the security landscape for entrepreneurs - TechCrunch

Risk: The film Julian Assange doesn’t want you to see – Stuff.co.nz

STEPHANIE MERRY

Last updated15:07, August 16 2017

Madman Films

Risk is screening as part of the New Zealand International Film Festival

Riskwasn't the movie Laura Poitras expected to make.

The documentarian, who won an Oscar for chronicling Edward Snowden's whistleblowing in Citizenfour,spent years following Julian Assange and his WikiLeaks team starting in 2011, including his right-hand woman, Sarah Harrison, and co-founder Jacob Appelbaum.

But as she filmed, a movie about the dangerous business of disseminating classified information turned into a story about avoiding extradition, not to mention a character study of the highly controversial figure. Assange made waves by releasing the Chelsea Manning-leaked war logs and video of what WikiLeaks called a "collateral murder" in Iraq long before Hillary Clinton partially blamed him for losing her the presidency.

Poitras couldn't have guessed she'd end up capturing footage of Assange sneaking around and donning a disguise in order to seek asylum at London's Ecuadorian embassy. He did so in 2012 after a British court ruled he had to go to Sweden and answer questions about allegations from two women of sexual misconduct, and he's been holed up at the embassy ever since.

Poitras recently talked to The Washington Post:

Risk turned out to be a very different documentary to the one Laura Poitras originally set out to make.

READ MORE: *You are being watched: Attention citizens *Watching the whistleblower: Behind Edward Snowden doco Citizenfour

I'm sure it's not easy for Assange to let people in.

It took time. It's not easy for good reason. They were really under extreme pressure in terms of the U.S. government investigation (for releasing information handed over by Manning).

Starting in 2011, documentarian Laura Poitras spent years following Julian Assange and his WikiLeaks team.

How often were you filming him?

The type of filmmaking I do, verite observational filmmaking I'm interested in when things are happening. So things happening would be like: him going to court or when he was calling the State Department trying to reach Hillary Clinton when they realised that there was a journalist who had published one of their passwords.

That happened when I was in New York, and I got a message from somebody who works with Julian saying, "Something's happening now if you want to get on a plane".I heard about it at noon and I was on a plane by the end of the day. I was in Norfolk (England)24 hours later filming.

The thing to know about Julian is he's trying to protect information. So when he decided to seek asylum, even people on his staff didn't know he was doing that. And he wouldn't tell me; I'd just be there and I'd film and find out later what was happening.

I got into the car thinking we were going to court, and realised that his mom was [in town]. When I walked into the hotel room, I thought we were there just to meet his mom, but then he was changing his appearance and I was thinking, "Okay, what is happening here?"

I liked the occasional first-person narration, which helped explain some of the contradictions about him as a character. At one point you say something like, "I don't know why he's letting me do this. I don't even think he likes me".Why did you decide to include those observations?

I take notes when I'm working and write down ideas and that was coming from what I was writing at the time when I was working on the film. I think it was a way to articulate the contradictions and ambivalence I was feeling and it was also for the audience to have a way to be okay with that. I think the film contains or shows incredible bravery and brilliance and also some disturbing attitude and behaviours.

I understand Assange's not crazy about the movie. Are you in contact at all?

You hear in the film I quote a text that he sent me where he says the film is a severe threat to his freedom and he's forced to treat it accordingly. He sent me that right before a screening we did a year ago at the Cannes Film Festival. I haven't really talked to him since I received that, but my producer has, so we're still in contact. And my producer screened the film for him in early April. I think he's still not happy, and what he's expressed and asked us to do is to remove scenes where he's speaking about the Swedish case, which we haven't done.

Risk(M) is screening as part of the New Zealand International Film Festival. See nziff.co.nz for more information and session times.

-The Washington Post

See the rest here:
Risk: The film Julian Assange doesn't want you to see - Stuff.co.nz