Whistleblower: Border hold on Iranians was a local initiative – The Daily Herald

By Patrick Grubb / The Northern Light

A Blaine-area Customs and Border Protection (CBP) officer says the recent extreme vetting of travelers with Iranian backgrounds occurred under the direction of Blaine port managers. The allegation was revealed by local immigration attorney Len Saunders, a frequent commentator on border issues.

As earlier reported by The Northern Light, more than 60 U.S. citizens and permanent residents of Iranian heritage were subjected to enhanced screenings on Jan. 4 and 5 as they entered the U.S. at the Peace Arch border crossing. Many were returning home from an Iranian pop concert that had taken place in Vancouver.

Following a U.S. airstrike on an Iranian military commander in Iraq, some of the travelers reported being detained for up to 12 hours, while others said they were turned away and refused entry due to CBPs lack of capacity to handle them. Border security was enhanced nationwide during the period of escalating military tensions with Iran.

At the time, it was thought that the detentions were limited to the Peace Arch crossing, but the CBP whistleblower said Iranian-born travelers were detained at other border crossings in the Blaine sector as well. Saunders told The Northern Light that the CBP officer asked not to be identified due to concerns about retribution, with the officer citing the existence of a blacklist of officers blocked from career advancement.

Travelers were selected for counterterrorism inspections based solely upon their national origin, the officer said, adding that there were no immigration or customs reasons to detain them. Once the detentions became national news, Blaine port director Kenneth Williams put out a directive on Jan. 5 at 1 p.m. saying the operation was suspended, the CBP officer said. According to the source, officers have been told not to talk to the press about the matter.

The CBP officer also addressed the issue of expedited removals (ERs), saying assistant port director John Dahm was behind the recent increase in the number of ERs being imposed on Canadians crossing the border. ERs typically mean that individuals are banned from entering the U.S. for a period of time, usually five years. In December, the CBC reported that ERs on the northern border had jumped 97 percent to 616 from October 2018 to September 2019, compared to 312 in the previous 12-month period. According to Saunders, CBPs Seattle Field Office accounted for 309 and 91, respectively, of those numbers, about 50 percent of the total in 2019 versus 29 percent in 2018. There are four field offices on the northern border.

The CBP officer said there was very little support from line officers for the ERs that the Blaine area has been imposing on Canadians since last year, describing the ERs as outrageous and contrary to the Immigration and Nationality Act and past government practice.

CBPs Seattle Office of Field Operations, headquartered in Blaine, is responsible for 54 ports of entry along the northern border from Washington to Minnesota. The Office of Field Operations director overseeing the ports is Adele Fasano, who was named to her position in the spring of 2019. She was previously port director for New York and New Jersey and director of field operations in San Diego.

While in San Diego, Fasano was named in a lawsuit against the Department of Homeland Security brought by former CBP officer Julia Davis, who claimed that Fasano had engaged in retribution after Davis had made a whistleblowing disclosure to the FBI. While in New Jersey, her office was the subject of complaints by documentary filmmaker Laura Poitras for being repeatedly harassed when returning from overseas. Poitras won the 2015 Academy Award for best documentary feature for Citizenfour about Edward Snowden.

In 2018, Fasano was reported to receive a base salary of $187,000 which puts her in the top 10 percent of the highest paid CBP officials.

There has been significant backlash to the reports that people of Iranian heritage were subjected to harsh vetting. National and international media have picked up the story, while The Seattle Times published an editorial on January 17 calling for answers from CBP. Governor Jay Inslee and other politicians have criticized CBP on the matter, while the Department of Homeland Securitys Office for Civil Rights and Civil Liberties (CRCL) disclosed that it was opening an investigation into the incidents. A request for comment made to CRCL was unanswered at press time. Saunders said he had yet to be contacted by the office, nearly two weeks after he reported being an eyewitness to the detentions.

Reprinted with permission from The Northern Light.

Continue reading here:
Whistleblower: Border hold on Iranians was a local initiative - The Daily Herald

Mohammed bin Salman Tests Americas Ability to Forgive – The Atlantic

Read: What Jeff Bezoss reported phone hack says about billionaires

That Bezoss net worth is comparable to the GDP of a state (such as Kuwait or Morocco, two fellow Arab monarchies that Saudi Arabia has almost surely tried to bug) does not reduce the hideousness of the accusation. Yet Bezoss wealth and global influence put the alleged phone hack in a different context, as an act of espionage akin to what developed nations have done for a long time, and without apology.

The fury at the current accusation resembles in some ways the anger at the United States after allegations by Edward Snowden that it had tapped German Chancellor Angela Merkels phone. Merkel told the Americans that spying between friends just isnt on. Yet in fact, a certain amount of espionage is not only on but standard and responsible practice, and when done between friends, it does not entirely unravel the friendship. What is not standard practice is to be caught and exposedas the United States was then, and as Israel was, most dramatically, in the case of Jonathan Pollard.

The key question for MbS is whether he stands in the same category as Israel and Germany, and whether offenses taken and given will sever affections forever. It sometimes appears that MbS is doing everything he can to encourage his own vilification, in the confidence that Saudi Arabia is as close a friend to the United States as Israel and Germany are. His strategy appears to be to wait for America to forget the state-sponsored murder of the Posts Jamal Khashoggi. For him to be personally involved in the sordid targeting of a private citizen, due to his ownership of a critical newspaperand then get caughtwould be an enormous gift to MbSs enemies, and it would further test the U.S.-Saudi relationships capacity for forgiveness.

Read: The U.S. loved the Saudi crown prince. Not anymore.

The current administration in Washington dislikes Bezos and will not alter its policies over his exposure. But MbS is 34 years old, and he is seeking allies for a reign that may last the next half century, long past the second Kushner administration. And the disappearance of trust and goodwill between him and his various American counterparts is a setback from which he will not easily recover, as Israel and Germany have. (Indeed, the Bezos hack is both a symptom and a cause of that disappearance of trust: Many news sources have reported the hack as fact, even though the best technical analysis of the device has failed, as of this writing, to show more than circumstantial evidence that MbS infected his phone.)

MbS should be asking what marks an ally as one capable of receiving the benefit of the doubt and, finally, pardon. What Israel and Germany share with the United States is a commitment (sometimes honored in the breach) to basic liberal democratic values, rule of law, and the unalienable rights of their citizens. This commitment is a salve that Saudi Arabia will have great difficulty whipping up, given that democracy and liberalism are utterly foreign to it. Saudi Arabia has liberalized dramatically since MbSs de facto rule began three years ago, but it is still an absolute monarchy and will probably remain one. Those who wish it would democratize will find that they have to decide between political and social liberalization, at least in the short term, because MbS has promoted the latter at the expense of the former.

Link:
Mohammed bin Salman Tests Americas Ability to Forgive - The Atlantic

Gen Z’s Top 5 Trusted Brands Are WAY Different Than Boomers’ | Chloe Anagnos – Foundation for Economic Education

Intergenerational wars are all the rage on social media, especially after the OK, boomer meme made headlines nationwide. But the apparent conflict between the older and younger American generations is not just a struggle for cultural scores. It is also a reality in the consumer market.

Recent reports from Business Insider have shed some light on this market warfare, These reports show how consumers react to politics and other important issues.explaining that recent polls suggest younger and older consumers are at odds when it comes to brand trust.

While at a glance, this bit of information may seem like just another claim regarding generational preferences, it also provides insights into what brands particular consumers are into. This is golden information for the market and may help to shape how brands interact with their potential audiences. Further, it provides important information on how consumers react to politics and how privacy and other important politically charged issues come to light when consumers are ready and willing to spend their money.

Tech companies often deal with privacy issues. So do government-backed enterprises such as USPS.

Both types of businesses have had their share of scandals thanks in part to the way these companies deal with our private property, whether its located online or in a physical envelope. The difference between these two sectors is how they respond (or dont) to criticism in order to give the consumer peace of mind.

The US Postal Service has long been at the center of serious debate regarding privacy and how far a mail carrier service can go to aid government and law enforcement, even if that means taking part in unconstitutional acts. Unfortunately, Americans have yet to see a real change in how the agency does business.To Generation Z consumers, accountability seems to matter. Younger consumers are also happy to see companies engaging in real-time culture.

The government-backed service doesnt have real competitors, as US law forbids any other company or individual from delivering private correspondence.

Companies like Apple, Google, Facebook, Twitter, Amazon, etc. all have reasons to fear that their current leadership positions may no longer be a reality if they anger enough consumers.

Thats why after former NSA contractor Edward Snowden came forward with revelations regarding private tech companies aiding the federal government in unconstitutional spying practices, these firms felt the backlash.

To this day, many of them still struggle and wont go one day without being attacked for their practices, putting them in the unholy position of offering government aid in killing their competitors.

To Generation Z consumers, accountability seems to matter, especially when you consider what Instagram Shopping's product lead, Layla Amjadi, has to say about young consumers and their preferences.

According to Business Insider, Amjadi sees Gen Z shoppers like herself truly valuing authenticity, meaning that Gen Z wants you to give it to them straight. According to the market researcher, younger consumers are also happy to see companies engaging in real-time culture, meaning privacy issues might really be a driving force both personally and culturally.

When a brand repeatedly fails to address scandals, younger shoppers feel they can no longer trust them. But what about older shoppers? Have their feelings regarding services such as USPS changed over the years?

According to Business Insider, the answer is no.

[W]hen it comes to the brands that they trust the most, Gen Z gravitates toward tech, ranking Google, Netflix, Amazon, YouTube, and Playstation as its top picks. Those rankings have no common ground with those of the baby boomers.

For older shoppers, the United States Postal Service delivers the most when it comes to trust. The federal mail service is followed closely by the United Parcel Service, Hershey, the Weather Channel, and Cheerios.

In the years after the Snowden files surfaced, tech companies took a beating in the public arena, which forced them to be loud and proud about their new and creative approaches to privacy in order to gain back consumer trust. The same did not happen with USPS, yet baby boomers have no problem putting their trust in the service.

While Gen Z members put their trust in entertainment-focused brands such as Netflix, Playstation, and YouTube, companies like Amazon and Google are also in the business of making consumption and knowledge respectively more readily accessible to a greater audience.

If anything, younger consumers arent only after amusement, but they do seek more amusement opportunities precisely because now they have the free time for it.

Options such as Amazon Fresh and Prime Pantry help young shoppers stay home while their groceries come to them.

To many, Google has provided enough remote working opportunities that even to those with little schooling, working from home has become a full-time gig. It will be interesting to see whether agencies like USPS will adapt at all or whether the government will continue to pay the price.Younger Americans arent spending hours driving to and from work and are now more available at home, meaning they can consume what firms like Netflix have to offer.

Older Americans, on the other hand, are slowly making the change to more online life, but this shift hasnt happened fast enough, and they still value getting things done the old-fashioned way.

While theres plenty of room for improvement among brands trying to cater to a younger audience, it is clear that there are certain styles that will prevail over the next few years, whereas other, less market-based approaches will continue to lose favor among the younger crowds.

It will be interesting to see whether agencies like USPS will adapt at all or whether the government will continue to pay the price for the growing discontent with the postal service.

Read more:
Gen Z's Top 5 Trusted Brands Are WAY Different Than Boomers' | Chloe Anagnos - Foundation for Economic Education

$10 Million Lab in New York Exists Just to Break Into iPhones – Wccftech

A $10 million lab has been created in New York by the district attorney of Manhattan to break into iPhones and iPads. The lab houses technology experts who use state-of-the-art equipment to try and break into smartphones used by criminals.

Fast Company has published a profile of the cyber lab built by the district attorney of Manhattan, Cyrus Vance Jr. The lab was built to compete against the encryption efforts by technology giants like Apple and Google, who implemented stronger security measures on their platforms. The lab has specialized hardware to repair damaged devices and even a supercomputer to generate passcodes to be used for brute force attacks.

Disintegration Multiplayer Beta Giveaway Check Out This New Shooter

Proprietary software provides prosecutors with real-time information about each smartphone in their possession, which can be removed from the radiofrequency-shielded room using Ramsey boxesminiaturized versions of the isolation chamber that allow technicians to manipulate the devices safely.In other corners of the lab are a supercomputer that can generate 26 million random passcodes per second, a robot that can remove a memory chip without using heat, and specialized tools that can repair even severely damaged devices.

As per Vance, Apple used to happily provide data from iPhones before September 2014. But things changed ever since Edward Snowden exposed the surveillance program operated by the United States National Security Agency, also known as the NSA. Edward had revealed that Apple, Google, Microsoft, and Facebook participate in the surveillance program by providing direct access to their servers to the NSA. This was denied by Apple and it double-downed its encryption efforts next year with iOS 8, and started encrypting iPhones with passcodes. The company also introduced longer passcodes, and limits to how many times a passcode could be entered per second. This time would increase exponentially with every wrong entry, which made it almost impossible to brute force into an iPhone.

Awareness of smartphone security has also increased. As per Moran, director of the High Technology Analysis Unit, the number of locked smartphones that come in for investigation has changed from 52% five years ago, to 82% now.

Although Apple provides iCloud backups for investigation, which are not end-to-end encrypted, it sometimes is not enough. It usually does not include the latest backup from the time of the incident, which causes difficulties in investigation. The latest communications, GPS coordinates and other important information is usually missing from such backups. Automated iCloud backups usually take place at night when the iOS device is connected to WiFi and plugged in for charging.

Not all investigations result in charging criminals. Many wrongly accused suspects have been exonerated because of the data and evidence extracted from their smartphones. These are the kind of examples that are used by Vance to try and convince the CEOs of Apple and Google, as well as the Congress, to legislate a "compromise" against encryption. Vance somehow also believes that Apple has a backdoor for iOS, even though the company refuses to create one.

Despite the security measures put into place by Apple, devices like Jeff Bezos' iPhone X have fallen to hacks. Even the FBI unlocked an iPhone 11 and an iPhone 11 Pro Max, without Apple's help. United States President Donald Trump has been pressurizing Apple to help with iPhone unlocks, especially for the Florida shooting case, where the FBI has been unsuccessful.

This cat and mouse game between law enforcement and tech companies will not end anytime soon. Each time Apple and Google release software updates, they make it even more difficult for law enforcement agencies to crack into iPhones and Android smartphones and conduct investigations. The tech companies rightfully believe that creating backdoors will compromise the security of everyone. Including those who ask for the backdoor.

Share Submit

Read the rest here:
$10 Million Lab in New York Exists Just to Break Into iPhones - Wccftech

To spot next-generation insider threats, think like Snowden – Verdict

A well-placed malicious insider has the potential to cause more damage and at a greater speed than an external threat actor due to their knowledge of, and access to, a companys IT environment.

Think back to June 2013, when the UK press published the first of a seemingly endless string of national security secrets leaked by Edward Snowden. Reports say Snowden downloaded 1.5 million files while working as a contractor for the National Security Agency. And no one noticed until it was too late.

In the years after the Snowden leaks, businesses continue to put themselves at risk. Sensitive documents are exposed to too many users, and files are often kept long after theyve lost their business value. The Varonis Global Data Risk Report found that, on average, employees could access 17 million documents.

Internal threat actors use a number of different techniques to find and copy the data they are after, as well as trying to cover their tracks to avoid detection. Threat actors working within an organisation have an obvious advantage over outsiders: they are already on the system. This means that they do not need to use malware to break in or communicate with command and control external servers, both of which can trigger alerts for the IT security team to investigate.

Unlike external attackers, insiders with access to a network do not need to carry out much, if any, reconnaissance. They often know where to look for valuable information or can quickly identify the assets to target without tripping any of the security alarms that an external agent might trigger as they extensively trawl an IT system.

Such activity becomes easier when insiders have elevated systems access. For instance, Snowden used admin-level privileges to cover up his activities for as long as he did by concealing his identity and deleting system logs.

Our Global Data Risk Report reveals the extent to which employees have access to data they shouldnt. For instance, more than half of the companies surveyed (53%) found that 1,000 sensitive files were open to every employee, while nearly a quarter (22%) of all folders were accessible to the whole business. That is a lot of exposed information that could fall into the wrong hands.

In one case,we discovered an organisation had a payroll file open to the entire staff. Even the receptionist on the front desk could use her account to easily access confidential payroll files.

Businesses need to employ a least privilege approach where employees can only access those folders and files needed for their work. The added challenge comes with employees who need higher levels of access across a range of systems. With these super users there is the danger that they could use easy-to-guess passwords such as admin123. They could also be at risk from giving away their credentials to unscrupulous employees, either by accident or persuasion.

This kind of situation can be combatted by enforcing a policy of strong passwords, employing two-factor authentication and giving passwords an expiry date to compel users to change their passwords on a regular basis.

Sometimes users with the correct level of access misuse their permissions for their own gain. A recent example is of a Tesla employee who, after being turned down for a promotion, allegedly used their elevated access to leak gigabytes of confidential, proprietary information to unknown third parties.

Conversely, insiders that dont have the access needed for their malicious actions can easily search the internet for effective open-source hacking tools and operating instructions. Many that are freely available. With a modicum of technical knowledge, a malevolent employee can become an amateur hacker or a script kiddie. They can try to find out passwords on a device using Mimikatz, or crack them through tools such as John the Ripper. Further, by visiting hacker forums they can get hints and tips for success.

Get the Verdict morning email

While insiders can be more difficult to detect than external threat actors, they can be identified through specific behaviours. These will be different from the actions of innocent users, meaning that solutions based on threat models will detect unusual movement patterns to identify anyone within the organisation who might be a threat. Once a threat has been detected, the IT security team will be alerted, enabling it to take remedial action, such as account suspension, while they investigate the issue.

Businesses must implement a range of measures to ensure employees only have access to those files necessary for their job and monitor the behaviour of users to identify anything suspicious. In this way, they will stop themselves from becoming the next victims of a wannabe Snowden.

Snowden is probably one of the most notorious whistleblowers in recent history and the scale of information leaked was vast. It also served as a wakeup call on what one individual can do to expose an organisations secrets. If we can learn one lesson from insider breaches, it is that while businesses should have confidence in their employees, they must also use measures to prevent this trust from being abused.

Read more: The new Edward Snowden book is being used to spread malware

See the original post here:
To spot next-generation insider threats, think like Snowden - Verdict

Lawmakers introduce bill to reform controversial surveillance authorities | TheHill – The Hill

A group of privacy-focused lawmakers on Thursday introducedlegislation to reform a set of controversialsurveillance authorities set to expire in March,setting up ambitious goalposts in the upcoming battle overwhether Congress shouldpare down the government's ability to spy on people in the U.S.

Thebill, from a bipartisan and bicameral coalition, wouldnarrow down the kinds of information the government is allowed to collect without a warrant and officiallyshut down its ability to collectphone records on millions of Americans.

And it wouldreform a secretive court that President TrumpDonald John TrumpMnuchin knocks Greta Thunberg's activism: Study economics and then 'come back' to us The Hill's Morning Report - House prosecutes Trump as 'lawless,' 'corrupt' What to watch for on Day 3 of Senate impeachment trial MORE and Republican allies have bitterly criticized in the wake of a critical inspector general report last year.

The Safeguarding Americans Private Records Act seeks to capitalize on a wave of renewed bipartisan interest in theForeign Intelligence Surveillance Court (FISA court), an instrumental part of the country's intelligence-gathering and national security operations.

Liberty and security arent mutually exclusive, and they arent partisan either, Sen.Ron WydenRonald (Ron) Lee WydenRestlessness, light rule-breaking and milk spotted on Senate floor as impeachment trial rolls on Hillicon Valley Presented by Philip Morris International UN calls for probe into alleged Saudi hack of Bezos | Experts see effort to 'silence' Washington Post | Bezos tweets tribute to Khashoggi Bezos tweets tribute to Khashoggi in wake of reports of Saudi phone hacking MORE (D-Ore.), who has long called for surveillance reform,said in a statement. Im proud our bipartisan coalition is standing up for Americans rights and commonsense reforms to protect our people against unnecessary government surveillance."

The bill was introduced by Wyden and Sen. Steve DainesSteven (Steve) David DainesKoch network could target almost 200 races in 2020, official says GOP senators introduce resolution to change rules, dismiss impeachment without articles Congress to clash over Trump's war powers MORE (R-Mont.) in the upper chamber, with a companion introduced by longtime privacy hawk Rep. Zoe LofgrenZoe Ellen LofgrenDemocrats begin to present case for Trump impeachment to Senate GOP rejects effort to compel documents on delayed Ukraine aid White House appoints GOP House members to advise Trump's impeachment team MORE (D-Calif.) and progressive leader Rep. Pramila JayapalPramila JayapalSanders wants one-on-one fight with Biden The Hill's Morning Report - Trump trial begins with clash over rules Jayapal: 'We will end up with another Donald Trump' if the US doesn't elect a progressive MORE (D-Wash.).

It sets the stage fora bipartisan coalition between Trump allies, who have criticized the FISA court as part of a deeply political battle over whether the FBI exhibited bias against Trump, and progressives who want to reform government surveillance authorities.

The legislation would permanently end the phone records program disclosed by whistleblower Edward Snowden, which shuttered last year amid technical difficulties.It would also officially prohibit intelligence agencies from collecting geolocation information without a warrant.

Significantly, it would ensure independent attorneys have access to the proceedings of the FISA court.

The government filed 1,117 warrant applications to the FISA court last year, including 1,081 that requested electronic surveillance.

Congressis facing a mid-March deadline to extend three expiring surveillance authorities.

"The surveillance capabilities intended to keep us safe from foreign threats have all too often trampled on Americans Fourth Amendment rights to due process," Josh Withrow, a senior policy analyst for conservative group FreedomWorks, said in a statement. "The Safeguarding Americans Private Records Act would be an enormous step forward in securing those rights."

See the article here:
Lawmakers introduce bill to reform controversial surveillance authorities | TheHill - The Hill

Greenwald charges are existential threat to journalism in Brazil, says Edward Snowden – The Guardian

Press and internet freedom advocates including Edward Snowden have criticised a decision by Brazilian federal prosecutors to charge the journalist Glenn Greenwald with cybercrimes as a blatant abuse of power and an existential threat to investigative reporting in the country.

Prosecutors claimed on Tuesday that Greenwald, 52, helped, encouraged and guided a group of hackers who obtained phone messages between key figures in a sweeping Brazilian anti-corruption investigation.

The leaked messages formed the basis for several stories published on Intercept Brazil, which Greenwald co-founded, and exposed what appeared to be collusion between then judge Srgio Moro and prosecutors.

The prosecutors investigation resulted in the jailing of Luiz Incio Lula da Silva, Brazils highest-polling presidential candidate at the time, and the subsequent presidential election was won by the far-right Jair Bolsanaro, who appointed Moro as his justice minister.

Snowden, who leaked files to Greenwald and others that became a Pulitzer prize-winning series of Guardian stories exposing illegal spying by US intelligence agencies, said the reporters arrest was an absolute red alert.

This is unbelievably naked retaliation for revealing extreme corruption at the highest levels of Bolsanaros administration, and an existential threat to investigative journalism in Brazil, he said on Twitter.

Lula, who was released from prison in November to appeal against his conviction, also voiced support for Greenwald. All my solidarity to journalist @ggreenwald who was a victim of another blatant abuse of authority against freedom of press and democracy, the former president tweeted.

Congresspeople from both left and right-leaning parties in Brazil have condemned the charges, which came as a surprise. Though Bolsanaro had joked that Greenwald could do jail time over the leaks, Brazils federal police had said a month ago it was not possible to identify moral or material participation by the journalist.

Brazils supreme court had issued an injunction last year that prohibited Greenwald for being investigated in the alleged hackers case, citing press freedom laws.

The Electronic Frontiers Foundation, an internet freedom group, said it was dismayed to learn of the charges. Computer crime laws should never be used to criminalise legitimate journalistic practice, it said. Prosecutors must not apply them without considering the chilling effects on the free press, and the risk of politicised prosecutions.

The American Civil Liberties Union said Donald Trumps attacks on the press in the US had softened the ground for the prosecution of American journalists abroad. The United States must immediately condemn this outrageous assault on the freedom of the press, the group said in a statement.

These sham charges are a sickening escalation of the Bolsonaro administrations authoritarian attacks on press freedom and the rule of law. They cannot be allowed to stand.

Greenwald said he only received the leaks and played no role in the hacking. But in a 95-page criminal complaint, Brazilian prosecutors said new audio evidence showed the journalist had played a clear role in facilitating the commission of a crime.

They cited a purported transcript of a conversation between Greenwald and alleged hacker Luiz Henrique Molio in which the reporter was informed the group as still monitoring the communications of its targets and asked for his opinion on how they should proceed.

The transcript quotes Greenwald telling Molio: I cant give you advice. But prosecutors allege he also told the hackers there was no reason to keep archives of message they had already shared with the Intercept Brazil, which they said constituted participation in the crime.

The charges would have to be accepted by a judge before Greenwald would stand trial.

It is impossible to separate these charges against Glenn from his work as an investigative reporter, said Summer Lopez from the American branch of the free-speech group PEN. While we dont know all the contours of this story, we do know two things. First, Glenns reporting has deeply embarrassed the Brazilian government. Second, Brazils president has repeatedly and consistently attacked the press in general and Glenn in particular. As such, Its hard to take these charges at face value.

The Committee to Protect Journalists said the criminal complaint was intended to rattle investigative reporters in the country. Charging a journalist with criminal activity based on interactions with sources sends a chilling message to reporters working on sensitive stories at a time when the media in Brazil is increasingly under attack from officials in its own government, it said.

Greenwald has called the allegations an obvious attempt to attack a free press in retaliation for the revelations we reported about minister Moro and the Bolsonaro government.

We will not be intimidated by these tyrannical attempts to silence journalists, he said.

See the original post here:
Greenwald charges are existential threat to journalism in Brazil, says Edward Snowden - The Guardian

The prosecution of Glenn Greenwald and the global war on free speech – World Socialist Web Site

The prosecution of Glenn Greenwald and the global war on free speech 23 January 2020

The criminal conspiracy charges levelled by the Brazilian government against Intercept Brasil publisher and renowned investigative journalist Glenn Greenwald is the latest in a series of state attacks internationally on the hard-won historical right to freedom of speech. The arrest of WikiLeaks founder Julian Assange has opened the floodgates for a global war on independent and critical journalism and the imposition of sweeping censorship.

The allegations made in Brazil against Greenwald are essentially identical to the first charge issued in April 2019 by the US Department of Justice to file for the extradition of Assange from the United Kingdom to stand trial in the United States. Both men have been accused of assisting whistleblowers to access information that, once published, exposed criminality and corruption at the highest levels of the state apparatus.

In Greenwalds case, a prosecution is being prepared on the pretext that he conspired with people to hack messaging accounts and obtain information that proved top officials had used a corruption investigation to undermine the political opponents of fascistic demagogue Jair Bolsonaro. In the lead-up to the 2018 presidential election, which was won by Bolsanaro, former President Luiz Incio Lula da Silva was convicted of corruption and imprisoned and his Workers Party mired in scandal.

In the case of Julian Assange, he has been charged with conspiring with courageous American whistleblower Chelsea Manning in 2009-2010 to access troves of classified documents that exposed US war crimes in Iraq and Afghanistan, and the sordid intrigues carried out around the world to prop up pro-US regimes and assert American strategic and corporate interests. A further 17 counts of espionage were then added to the charge list, threatening him with a life sentence of 175 years if he is extradited and condemned by a show trial in the US.

Greenwald has not yet been arrested, but it is almost certain that US intelligence agencies are involved in the legal moves to prosecute him. He would have been on their hitlist of priority media targets since he played a key role in 2013 in publishing the leaks made by National Security Agency (NSA) contractor Edward Snowden. The Snowden leaks exposed the staggering degree to which the NSA spies on the communications of virtually every American citizen and much of the worlds population.

Julian Assange sought to protect himself from the revenge of the US state by gaining political asylum in 2012 in the tiny Ecuadorian embassy in London, until he was evicted and arrested last April. Just prior to Assanges eviction, Chelsea Manning was sent back to prison for refusing to appear before a grand jury and retract her categorical testimony during her trial that she acted alonewithout any assistance from Assange and WikiLeaksto access the information she leaked.

The imprisonment of Manning and arrest of Assange was quickly followed by the Macron government initiating moves to prosecute eight journalists over the exposure of Frances complicity in Saudi Arabias illegal war in Yemen. In June 2019, unprecedented police raids on journalists homes and media offices took place in Australia. Three journalists are threatened with prosecution over the publication of leaks exposing war crimes committed by Australian troops in Afghanistan and plans to legalise mass surveillance.

Glenn Greenwald had not visited the US since 2013 due to his legitimate concern that he would be arrested. With Bolsanaro now in power, the hands of the CIA, NSA and FBI can well and truly reach into Brazil, where Greenwald has residency rights through his partner.

The WSWS warned in 2010 that if Julian Assange was not defendedafter his detention in Britain over blatantly fabricated allegations that he had committed sexual offences in Swedenit would open the way for a full-scale assault to terrorise and silence genuine journalism. Then vice-president Joe Biden in Barack Obamas Democratic Party administration had labelled Assange a high-tech terrorist. The Labor government in Australia, where Assange holds citizenship, had denounced WikiLeaks publications as illegal activity.

Within a matter of months, however, the vast majority of the ex-left and ex-liberal political and media fraternity lined up with the US state and its allies against Assange. Publications such as the New York Times and the Guardian which had worked with WikiLeaks to publish the Manning leaks because they were going to be published anywaydevoted their resources to slandering Assange as a suspected rapist and self-serving narcissist, undeserving of any popular sympathy and support. The unions and fake left organisations internationally actively opposed any campaign in his defence, refusing to discuss his case and boycotting all actions taken to demand his freedom.

The political reasons this turn against WikiLeaks took place must never be forgotten. It occurred in the wake of massive social upheavals, which were in part triggered by information contained in the Manning leaks, that brought down US-backed regimes. Foreign Policy magazine nervously asked in January 2011 if Tunisia was the first WikiLeaks Revolution. Just weeks later, the seemingly all-powerful dictatorship of Hosni Mubarak was overthrown by a mass movement of the Egyptian working class.

The establishment left parties, unions and media are tied by a thousand threads to the financial and corporate oligarchy and benefit from the ruthless exploitation of the vast majority of the worlds population. The way in which the truth had motivated ordinary people to rise up in open rebellion against entrenched elites was viewed in these circles with horror. A mass upheaval demanding an end to social inequality and political injustice in the United States, for example, would threaten the wealth and power of the capitalist class and privileged upper middle class, of which they are part and which they serve.

The instinctive response of the establishment organisations and media was to join with the state apparatus in seeking to prevent or censor future exposures. As New York Times editor Bill Keller bluntly wrote in November 2010 in response to WikiLeaks: When we find ourselves in possession of government secrets, we think long and hard about whether to disclose them Freedom of the press includes freedom not to publish, and that is a freedom we exercise with some regularity. [emphasis added]

The hatred of the ex-liberal publications for Assange reached visceral levels in 2016 when WikiLeaks published leaked emails that shed further light on the militarist, big business and authoritarian agenda of Hillary Clinton and the Democratic Partytheir preference in the US presidential election. The Times and the Guardian spearheaded the campaign to promote the fabrications that Assange had conspired with Russian intelligence to hack the emails and to smear him as a tool of Vladimir Putin and Donald Trump.

In July 2019, a US court dismissed the allegations that WikiLeaks had worked with Russian agencies as entirely divorced from the facts and defended its right to publish the leaks as plainly of the type entitled to the strongest protection that the First Amendment offers.

The Times and Guardian, however, have never retracted their false accusations and slanders. To this day, the Times and the Democratic Party machine publicly advocate that Assange be criminally prosecuted over their incessant claims that Russian interference cost Clinton the 2016 election. In April 2019, the Times published comments that described the first conspiracy charge against Assange as an indisputable crime.

Given its record, the New York Times plumbed the depths of hypocrisy in its editorial on January 22 on the charging of Glenn Greenwald. It asserted that Greenwalds publication of leaks in Brazil did what a free press is supposed to do: they revealed a painful truth about those in power. The editorial concluded: Attacking the bearers of that message is a serious disservice and a dangerous threat to the rule of law.

The reality is that the Times, along with numerous ex-left and ex-liberal organisations and publications, has proven through its complicity in the persecution of Assange and WikiLeaks that its class allegiances lie with the corporate oligarchy and the capitalist state.

A genuine defence of persecuted journalists and whistleblowers will only be taken forward by the working class, whose right to know the truth they have courageously served.

Julian Assange is imprisoned in Britain and his extradition trial begins on February 24 in London. Chelsea Manning is in a cell in the United States, Edward Snowden is in forced exile in Russia and now Glenn Greenwald is under threat in Brazil. All those who defend the fundamental democratic rights at stake in their cases have the responsibility to fight for the greatest possible independent mobilisation of workers and young people to demand their immediate and unconditional freedom.

James Cogan

2019 has been a year of mass social upheaval. We need you to help the WSWS and ICFI make 2020 the year of international socialist revival. We must expand our work and our influence in the international working class. If you agree, donate today. Thank you.

See more here:
The prosecution of Glenn Greenwald and the global war on free speech - World Socialist Web Site

We need to make it even easier for UK terror cops to rummage about in folks’ phones, says govt lawyer – The Register

The British government's view of people who encrypt their communications

The Government Reviewer of Terrorism Laws has declared that safeguards protecting Britons from police workers demanding passwords for their devices must be watered down.

In a speech delivered to conservative think tank the Henry Jackson Society yesterday, Jonathan Hall QC, the "Independent Reviewer of Terrorism Legislation"* said section 49 of the Regulation of Investigatory Powers Act (RIPA) 2000 is too "difficult" for police and others to work with.

Section 49 of RIPA is the part of UK law that lets police and others legally order suspects to hand over passwords for encrypted information.

There are two safeguards: one is subsection (3), which says the state can only demand your password if it is "in the interests of national security", for "preventing or detecting crime" or for the "economic well-being of the United Kingdom".

The other safeguard, identified by Hall, is subsection (2)(d), which says password demands can only be made by the state if it is "not reasonably practicable" to get at the encrypted information without demanding the password. Failure to obey is a crime punishable with up to five years in prison.

Even these sweeping permissions and slim safeguards are too narrow, in Hall's view. In his speech he said:

The truth is that these preconditions may be difficult to establish, especially when counter-terrorism police are working against the clock in relation to multiple individuals and multiple devices, where those individuals are in precharge detention and must be either charged or released unconditionally...

Pre-charge detention arrest and incarceration without being charged for people apprehended under terrorism powers lasts for up to a fortnight. After 14 days police must ask a judge's permission to carry on jailing a suspect without setting out a case against them.

Hall went on to call for the creation of a new offence of failing to hand over a password during a terrorism investigation. It was unclear whether the barrister was calling for the word "terrorism" to be inserted alongside "child indecency" and "national security" in RIPA section 53(5A)(a), which sets longer sentences for refusals to decrypt in certain types of case.

In a coded warning, Hall appeared to suggest that opposing an expansion of forced-decryption powers could lead to "longer and longer periods of pre-trial detention being sought" by police, spies and the like.

Lest all this is thought to be an edge case that only applies to nasty people who had it coming to them anyway, British police abused their Terrorism Act powers to target a journalist's courier who was changing flights at Heathrow while carrying encrypted material from Edward Snowden. In an act of great national shame, a senior judge decided this was perfectly legal.

Hall's proposal would see people in similar circumstances journalists, your lawyer, your family members facing a potential five-year prison term for quite reasonably refusing to incriminate themselves or others. Such abuses, and potential abuses, must be confronted and taken outside the range of lawful options open to police and others.

Hall's full speech is available as a PDF on the government website, gov.uk.

* The Independent Reviewer of Terrorism Legislation's official name is deliberately misleading: the post is now used by the government of the day for prominent barristers to prove their political loyalty before promotion into senior politico-legal posts.

Hall's immediate predecessor, Max Hill QC, echoed then-Home Secretary Amber Rudd's demands for encryption and online anonymity to be outlawed, something that did not in any way slow down his promotion to Director of Public Prosecutions top job in the criminal legal world 10 months later.

Before Hill came David Anderson QC, who was widely accepted to have been as neutral as is possible in the post; nonetheless, this didn't stop his elevation to the House of Lords as a crossbench peer after he stepped down in 2017.

The first permanent reviewer and Anderson's predecessor was Lord (Alex) Carlile QC, who, though nominally a Lib Dem, took a post in 2001 in Tony Blair's Labour government. He spent the next nine years overseeing the introduction of intrusive legal powers for police, spies, local councils and anyone else in the public sector who fancied themselves as James Bond.

Sponsored: Detecting cyber attacks as a small to medium business

Excerpt from:
We need to make it even easier for UK terror cops to rummage about in folks' phones, says govt lawyer - The Register

IT Teams Need More Than Password Managers – Security Boulevard

IT departments need more than a password manager to keep themand a companys datasafe from cyberthreats

All companies today are, to some extent, dependent on technology and the IT teams driving their systems and security in the background. These IT administrators, of course, have privileges to modify system or application configurations, install or remove software, make changes to the operating system, and more. Most companies only use a simple password management app to manage all passwords, including for these privileged admin accounts. Sadly, this is no longer sufficient to protect them from malicious insiders, cybercriminals and hackers.

Before we get into why theyre not sufficient, lets first talk about the typical capabilities of a password management solution. A password manager is a good way to begin securing general accounts such as NetFlix, Amazon, social media accounts, bank accounts, marketing tools such as Google Analytics and other apps. It helps users to consolidate passwords into a centralized vault, manage logins and streamline access to shared general accounts. However, when we look at any high-profile data breachessuch as those that occurred at Target, Marriott and Sonywe see cybercriminals primarily target privileged accounts. These could be local admin accounts, privileged user accounts, domain administrative accounts or service accounts, all of which are usually scattered across the companys internal IT infrastructure.

Apart from using password-based authentication for IT systems, some companies (especially those in finance, high-tech and government) prefer using secure shell (SSH) keys to protect their privileged accounts. Most companies leave these privileged accounts unmanaged or orphaned, and only a handful of privileged accounts are stored in the password management app. According to the 2019 Data Breach Investigations Report by Verizon, privilege abuse is one of the most common threats in data breaches.

This Verizon report offers crucial perspectives on threats that organizations face. It is built on real-world data from 41,686 security incidents and 2,013 data breaches provided by 73 data sources, both public and private entities, spanning 86 countries worldwide. Remember the American whistle-blower Edward Snowden, who breached the National Security Agency (NSA)? He simply used this privileged account management loophole to gain access to one of the worlds most advanced and sophisticated security agencies. Similarly, once cybercriminals get access to a privileged account, they can eventually gain access to all of the organizations sensitive information, deploy remote access tools, steal as much data as possible and even may perform financial fraud.

A password manager can work well for many departments including marketing, finance and human resources. However, your IT teams need a comprehensive privileged account management (PAM) solution to protect your companys IT infrastructure in this era of cyberattacks. Your typical privileged account management solution can:

These important differences between a password manager and a fully-featured PAM solution could be the key to protecting your organizations information. According to leading research firm Gartner, privileged account management is also the number one security priority for chief information security officers (CISOs). Implementing a PAM solution alone may not help you to keep hackers at baythere is always more to be done. However, a PAM solution will provide you with a solid foundation to continue building your defenses against cybercriminals.

Read this article:
IT Teams Need More Than Password Managers - Security Boulevard