Wikileaks: The CIA can remotely hack into computers that aren’t even connected to the internet – Quartz

When firewalls, network-monitoring services, and antivirus software arent enough, theres always been one surefire way to protect computers that control sensitive operations like power grids and water pumps: cut them off from the internet entirely. But new documents published by WikiLeaks on June 22 suggest that even when such extreme measures are taken, no computer is safe from motivated, well-resourced hackers.

The 11 documents describe a piece of software called Brutal Kangaroo, a set of tools built for infiltrating isolated, air-gapped computers by targeting internet-connected networks within the same organization. Its the latest publication in the Vault 7 series of leaked documents, which describe myriad hacking tools WikiLeaks says belong to the US Central Intelligence Agency (CIA).

Brutal Kangaroo works by creating a digital path from an attacker to an air-gapped computer and back. The process begins when a hacker remotely infects an internet-connected computer in the organization or facility being targeted. Once it has infected that first computer, what the documents refer to as the primary host, Brutal Kangaroo waits. It cant spread to other systems until someone plugs a USB thumb drive into that first one.

Once someone does, malware specific to the make and model of the thumb drive is copied onto it, hiding in modified LNK files that Microsoft Windows uses to render desktop icons, and in DLL files that contain executable programs. From this point, Brutal Kangaroo will spread further malware to any system that thumb drive is plugged into. And those systems will infect every drive thats plugged into them, and so on, and the idea is that eventually one of those drives will be plugged into the air-gapped computer.

The major flaw in the concept of isolating sensitive computers is that the air gap around them can only be maintained if no one ever needs to copy files onto or off of them. But even for specialized systems, there are always updates and patches to install, and information that has to be fed in or pulled out. Its common knowledge among IT specialists that external hard drives are an obvious target for anyone seeking to break the air gap, and precautions are presumably taken in facilities with diligent IT specialists. Those precautions, however, can be subverted with exploitations of obscure vulnerabilities, and sometimes mistakes simply happen.

If a thumb drive infected with Brutal Kangaroo is plugged into an air-gapped computer, it immediately copies itself onto it. If a user tries to browse the contents of the infected drive on that computer, it will trigger additional malware that will collect data from the computer. As users continue plugging the drive into connected and disconnected computers, a relay is formed, ultimately creating a slow path back to the hacker, through which data copied from the air-gapped computer will be delivered if everything goes according to plan.

Many details described in the Brutal Kangaroo documents have drawn comparisons to Stuxnet, the powerful malware reportedly developed by the US and Israel to sabotage Irans nuclear program. Stuxnet was specifically built to target air-gapped computers that controlled centrifuges in an Iranian nuclear facility. The attackers in that case did not target an internet-connected network within the nuclear facility, presumably because there wasnt one, but instead targeted five outside organizations, according to a 2014 report in Wired. From there, however, the attack worked in much the same way as the methods described in the Brutal Kangaroo documents: Stuxnet also spread through thumb drives, hid in LNK files, and attempted to create a relay to send information back to the attackers.

Stuxnet was eventually discovered by security researchers because it was too powerful, and spread to far more computers than its creators apparently wanted it to. The developers of Brutal Kangaroo appear to have taken a lesson from that, and described several checks in their documents that will stop it from spreading if certain factors are met. Every time it lands on a new computer, Brutal Kangaroo first checks the computers date. If it is past a date hard-coded into the malware, the program will immediately exit, according to the documents. It also checks some sort of black list, and will quit if the computer is on it. It will also quit Brutal Kangaroo if the computer had been seen before.

The Brutal Kangaroo documents are only the latest revelation about what the CIAs hackers are allegedly capable of. Previous Vault 7 publications have included documents that suggest the agency can turn smart TVs into listening devices, hack various desktop and mobile operating systems, and monitor internet traffic by breaking into home wifi routers. In April, Symantec matched several tools described in the releases to invasive software it had been tracking since 2014. That malware had infected at least 40 targets in 16 countries since 2011, the company said in a blog post, and was possibly active as far back as 2007.

The CIA has not confirmed its ownership of the documents or tools, but as Motherboard pointed out last March, US officials said in court that the documents contain classified information, suggesting that the leaks are in fact authentic.

Go here to see the original:
Wikileaks: The CIA can remotely hack into computers that aren't even connected to the internet - Quartz

WikiLeaks founder Julian Assange explains why the Democratic … – Washington Examiner

WikiLeakers founder Julian Assange on Saturday predicted the demise of the Democratic Party.

In a post online, shared by his Twitter account, Assange argued that the party has been "consumed" by "hysteria about Russia," something he called a "political dead end." It is upon this "narrative" that the "party's elite" attempts to keep a hold on power, he said.

"Without the 'We didn't lose, Russia won' narrative the party's elite and those who exist under its patronage would be purged for being electorally incompetent and ideologically passe," Assange said.

Assange's group, WikiLeaks, is responsible for the publication of stolen documents from the Democratic National Committee and Hillary Clinton's campaign during the 2016 campaign, which has been attributed to hurting Clinton's chances. Furthermore, though WikiLeaks denies it, the U.S. intelligence community reported in January with "high confidence" that both WikiLeaks and Guccifer 2.0, among others, were being used by Russian intelligence "to release US victim data obtained in cyberoperations publicly" in order to help undermine the 2016 presidential election in favor of President Trump.

Despite this, Assange said that the "Trump-Russian collusion narrative" being investigated by a number of probes and consistently reported on by the media is unfounded, and "we are left with the Democratic establishment blaming the public for not liking the truth about what Hillary Clinton said to Goldman Sachs and blaming their own base for not liking what they said in their own emails about fixing the DNC primaries."

Filling out a list of six reasons why the Democratic Party is "doomed," Assange said the party "needs the support of the security sector and media barons to push this diversionary conspiracy agenda," but that this strategy is unsustainable. Both the CIA and the FBI, he explained, will be turned against them when they "merge" with the Trump administration.

Not all of the criticism was reserved for the Democrats. For instance, Assange said Trump is embracing "robber barons, dictators and gravitas-free buffoon's like the CIA's Mike Pompeo." In April, Pompeo called WikiLeaks a "non-state, hostile intelligence service." A week later, the Washington Post reported that the Justice Department is close to considering arresting and filing criminal charges against members of WikiLeaks, including Assange.

Still, the bulk of Assange's post focused on the Democrats. "GOP/Trump has open goals everywhere: broken promises, inequality, economy, healthcare, militarization, Goldman Sachs, Saudi Arabia & cronyism, but the Democrat establishment can't kick these goals since the Russian collusion narrative has consumed all its energy and it is entangled with many of the same groups behind Trump's policies," he wrote.

He ended his post calling on the Democratic base to start a new party, in an argument that makes references to French President Emmanuel Macron's recent campaign.

"The Democratic base should move to start a new party since the party elite shows no signs that they will give up power," Assange wrote. "This can be done quickly and cheaply as a result of the internet and databases of peoples' political preferences. This reality is proven in practice with the rapid construction of the Macron, Sanders and Trump campaigns from nothing. The existing Democratic party may well have negative reputational capital, stimulating a Macron-style clean slate approach. Regardless, in the face of such a threat, the Democratic establishment will either concede control or, as in the case of Macron, be eliminated by the new structure."

View post:
WikiLeaks founder Julian Assange explains why the Democratic ... - Washington Examiner

Wikileaks fights to suppress documentary – Fudzilla

It has to be positive or we will not allow it

The so-called open government, whistleblowing site Wikileaks, is doing its level best to censor a documentary on the outfit because it fails to praise the outfit to the skies and put a positive spin on its leaderJulian Assange.

The documentary is called Risk and the makers are complaining that the outfit is so obsessed with its image it is prepared to wield legal threats and lawyers in a way that is almost absurdly hypocritical.

The documentary makers, Brenda Coughlin, Yoni Golijov And Laura Poitras have told Newsweek that they were making a positive documentary film about Julian Assange and WikiLeaks and it unequivocally defend WikiLeaks journalistic right to publish true and newsworthy information.

However they were surprised when Julian Assange and WikiLeaks sent cease and desist letters to its distributors demanding they stop the release of Risk.

The filmmakers go into what lengths they went to work directly with Wikileaks and Assange on the film starting back in 2011. Assange himself gave consent to the film and even signed a licensing agreement to use Wikileaks footage for it.

Some people involved with Wikileaks requested not to be in the film, and the filmmakers complied. People from the site and their lawyers have been shown screenings of the film before every regional release, including as recently as April of this year. There is no claim made thus far that any of the content of the film is false.

But things turned sour in 2016. Assange and his lawyers insisted that the documentary remove scenes from the film where he speaks about the two women who made sexual assault allegations against him in 2010.

WikiLeaks comments have consistently been about image management, including: demands to remove scenes from the film where Assange discusses sexual assault allegations against him; requests to remove images of alcohol bottles in the embassy because Ecuador is a Catholic country and it looks bad; requests to include mentions of WikiLeaks in the 2016 U.S. presidential debates; and, requests to add more scenes with attorney Amal Clooney because she makes WikiLeaks look good, the documentary makers said.

The film makers statement says that all this seems to support the claims that Assange is an egomaniac.

But that charge aside, what should be abundantly clear is that the ideals of the site appear to have fallen by the wayside when it comes to a simple documentary that has refused to cinematically stroke Wikileaks to the degree it wishes. That's not a good look for a site that survives on people's belief that it is committed to open and honest information, the statement said.

Go here to see the original:
Wikileaks fights to suppress documentary - Fudzilla

WikiLeaks disclosures on Iraq, Afghanistan did not damage US report – RT

Leaked US military files provided to WikiLeaks by Chelsea Manning did not significantly harm national security, according to a recently released Department of Defense secret report published by BuzzFeed.

The whistleblowing website WikiLeaks, providing access to classified intelligence, military and diplomatic documents, has been making headlines since its creation. The US government was hunting and prosecuting whistleblowers, saying the leaks pose a huge threat to national security. But it turns out that the leaked data, specifically on wars in Iraq and Afghanistan, was not so sensitive, a secret 107-page document obtained by the BuzzFeed News revealed.

Read more

A task force of more than 20 US agencies, including NSA, CIA and FBI, carried out a line-by-line review of more than 740,000 records of known or believed compromised WikiLeaks data available as for 2011. The document was provided to BuzzFeed under a Freedom of Information Act, in response to a request filed in 2015. However, it was not fully disclosed, with only 35 pages available.

Following the comprehensive analysis, the report concludes that WikiLeaks disclosures on operation in Afghanistan has no significant strategic impact, while it is still potentially damaging for intelligence sources, informants, and the Afghan population as well as for the US and NATO collection methods and capabilities.

The leaks on the war in Iraq have no direct personal impact on current and former senior US leadership Iraq, as the reports references to it are not damaging in any way, according to the Information Review Task Force (IRTF) assessments.

The review also has chapters on leaked Guantanamo records, as well as separate parts on Baghdad and Gerani airstrikes, carried out by the US Air Force during the wars in Iraq and Afghanistan correspondingly. The attacks received worldwide coverage and condemnation following the WikiLeaks posting the video of the airstrikes. However, the provided pages of the document do not include any assessment whether those leaked videos were harmful.

READ MORE:'A testimony of evil': How Mannings 'Collateral Murder' revelation changed history

US Army private and whistleblower Chelsea Manning provided 700,000 military documents on Iraq and Afghanistan to WikiLeaks in 2010. For leaking classified information Manning was sentenced to 35 years in prison in 2013. She had served seven years behind bars before being pardoned by then-President Barack Obama and released in May.

The IRTF report also mentions another whistleblower and WikiLeaks co-founder, Julian Assange, saying with moderate confidence that his insurance file does not have anything beyond that which the IRTF has already reviewed. The task force related to Assanges password-protected file, purportedly having additional leaks, in case anything happened to him.

READ MORE:Comey hailed as intelligence porn star by Assange, as Snowden defends leak

More here:
WikiLeaks disclosures on Iraq, Afghanistan did not damage US report - RT

Shocking! Federal Prosecutors Apparently Lied About Wikileaks and Chelsea Manning – LawNewz

A recently released report obtained byBuzzfeeds Jason Leopold reveals the cache of diplomatic cables provided to Wikileaks by Chelsea Manning was not nearly as damaging to national security as the government and federal prosecutors once claimed.

In fact, Buzzfeed notes, the massive leakof U.S. diplomatic cableswas largely insignificant and did not cause any real harm to U.S. interests.

On the specific subject of Iraq War-related documents, the report states:with high confidence [Wikileaks and Mannings]disclosure of the Iraq data set will have no direct personal impact on current and former U.S. leadership in Iraq.

As for the materials released regarding U.S. war efforts in Afghanistan? Ditto, according to Buzzfeeds analysis of the report:they had [no] significant impact.

The June 15, 2011 report was prepared by a U.S. Department of Defense task force and included the input of over 20 government agencies, including the FBI, CIA, NSA, DHS, and the U.S. Department of State.

During Mannings court-martialwhere she was ultimately charged with 22 crimes, including aiding the enemythe governments prosecution relied on the now-released-yet-still-severely-redacted report and basically lied about its contents, repeatedly claiming that Manning harmed U.S. national security.

Mannings defense, of course, did not have access to the classified report.

This development is likely vindication for many on the side of transparency and justice, but can hardly be considered surprising. Federal prosecutors frequently overplay their hands, often with disastrous consequences.

The FOIA-generated report spans a lengthy 107 pages, 35 of which are available here.

[image via screengrab]

Follow Colin Kalmbacher on Twitter: @colinkalmbacher

This is an opinion piece. The views expressed in this article are those of just the author.

Excerpt from:
Shocking! Federal Prosecutors Apparently Lied About Wikileaks and Chelsea Manning - LawNewz

Let’s Check In With Umpire Joe West About Wikileaks And Russia – Deadspin

Photo Credit: Bob Levey/Getty

Umpire Joe West will take the field for his 5,000th game tonight, and Jeff Passan has a profile of him over on Yahoo Sports to commemorate the occasion. There are quite a few interesting tidbitshe golfs with Hawk Harrelson! He doesnt seem to care even in the slightest about how much people hate him!and theres also this:

When we put in replay, I thought there would be no arguments, West said. The first year we put in replay, ejections went up 20 percent. Baseball is a funny game. Its typically American. If you dont succeed its someone elses fault. And the first person you want to look at is the official. Just look at our last election. When Hillary lost, its someone elses fault. The Russians. Wikileaks. Its the fact you couldnt stand up and say I lost. Nobody in todays society wants to say I wasnt good enough. Baseball is a game of failures. The last hitter who hit .400 is dead and gone. There isnt going to be another of those. For anybody to think this is a perfect game, theyre kidding themselves. Lets be honest: How do you hit a round ball with a cylindrical bat square.

Lets be honest: Sing us a song about it.

[Yahoo Sports]

Originally posted here:
Let's Check In With Umpire Joe West About Wikileaks And Russia - Deadspin

From WikiLeaks, a Glimpse Into Ram Nath Kovind’s Views on Discrimination Against Dalits – The Wire

Featured Given his views on social justice and empowerment, choosing a leader like Kovindas their presidential candidate was a more natural choice for the Sangh parivar than any radical shift in its traditional position on the caste system.

Ram Nath Kovind with Prime Minister Modi. Credit: Governor of Bihar website

Areport by US embassy interlocutors titled Socioeconomic futureof Indian dalits remains bleak,published byWikiLeaks, which analyses the issues of discrimination on the basis of various theories, makes Kovinds positions clear.

The 2005 documentshows that Kovind toed the the Sangh parivars political line, which prefers reforms in the caste hierarchy as entrenched in the Hindu puranic system, instead of a complete annihilation of caste as advocated by Indian leaders like B.R. Ambedkar.

Kovind, then the BJPs Scheduled Caste Morchas chief, made it a point to disagree with S.K. Thorat, former UGC chairman and Dalit intellectual, and Udit Raj, then an independent Dalit leader and who is currently with the BJP.

Contradicting Thorats arguments, which were based on statistical observations, that wide-spread discrimination against Dalits persists in rural India, Kovind said that the practice has decreased considerably and even hiring personnel isusually free of caste prejudices.

Ram Nath Kovind, himself a dalit and a BJP MP from UP, expressed a more positive view to Poloff (reference to the unnamed political officer in the US embassy) recently, stating that open discrimination against dalits has decreased dramatically over the last decade, while the number of persons who genuinely care about helping dalits has increased. He maintained that while discrimination persists in the housing sector, employment decisions are usually free from bias, the document said.

While Thorat was of the view that the system of quota was only partially successful and that discrimination in private sector where he believed that high-caste Hindus would almost always hire another caste Hindu over a dalit, even if the dalit was fully qualified for the job; Kovind disagreed with him. He said that reservation has to a large degree been successful in protecting dalit rights and advocated primary education as a place to start the end of discrimination.

It may be noted that while most Dalit intellectuals would not disagree with concentrating on reforming primary education to end discrimination, most anti-reservation ideologues, especially in the Sangh parivar, see the measure as replacement for the reservation policy, and not as complimenting it.

While countering Thorats argument that only 5% Dalits have benefitted from the Indian reservation law and most others are still languishing in low-paying, unskilled jobs because of the caste system, Kovind said that thetrue basis of discrimination is economic in nature rather than caste-based, as the haves discriminate against the have nots and use the caste system to perpetuate differencesbetween economic groups.

Comparing the caste system to the trade guilds in feudal Europe (in that certain groupsperformed specific jobs), he added that under the caste system, persons acquire their trade at birth, while the guilds allowed job mobility. Caste factors are now used to protect jobs and livelihoods more than anything else, the document quoted Kovind as saying.

Kovinds arguments clearly mirror what the Sangh parivar has been saying for many years now. One may recall that Mohan Bhagwat, RSS sarsanghchalak, in 2010 had stirred a political controversy when he had advocated that economic background, and not caste, should be the basis of reservation system.

Interestingly, while Raj concurred with Thorats viewpoints that the private sector will continue to discriminate against Dalits and advanced the idea of an equal opportunity law in the private sector like in the US, Kovind put forward an apologetic reason to the poloff, contending that since the Hindu religion condones caste, it will take longer for the GOI to end caste discrimination in India than it will take to eradicate racial discrimination in the US.

He also predicted that caste-based discrimination will exist for at least 50-100 years in India.

Kovind, in fact, came across as much softer in front of Sangh Priya Gautam, then a Dalit BJP MP from UP. While Gautam said that an equal opportunity law in private sector would be an important tool to ensure equality, Kovind desisted from demanding such a legislation, staying true to his pliant, soft image.However, when it came to his party allegiance, Kovind was quite vehement about projecting BJP as the only party that will help Dalits.

Differing with Thorat and Raj who felt there is a greater need for Dalits to build political platforms and organisations, Kovind asserted, BJP is determined to help dalits and shed the image that it is only an upper caste party.

The document further notes, (Kovind) argued that only a nationalist party like the BJP will succeed in fighting discrimination against dalits, as India cannot become a world power until dalits and low-caste persons are brought up to the level of the rest of society.

Both the BJP and its ideological parent, the RSS, have projected the decision to nominate Kovind for the countrys top constitutional post as a big step forward by the saffron forces towards a more socially inclusive strategy.However, given Kovinds views on social justice and empowerment, choosing a loyal, conformist leader like himwas much more of a natural choice for the Sangh parivar than any radical shift in its traditional position on the caste system.

At the present political juncture, where opposition from Dalit forces against the saffron forces is on a rise, the BJPs decision to represent Kovind for the post of president looks largely ceremonial, much like the post itself.

Excerpt from:
From WikiLeaks, a Glimpse Into Ram Nath Kovind's Views on Discrimination Against Dalits - The Wire

The Nihilism of Julian Assange – The New York Review of Books

Risk

a documentary film directed by Laura Poitras

About forty minutes into Risk, Laura Poitrass messy documentary portrait of Julian Assange, the filmmaker addresses the viewer from off-camera. This is not the film I thought I was making, she says. I thought I could ignore the contradictions. I thought they were not part of the story. I was so wrong. They are becoming the story.

By the time she makes this confession, Poitras has been filming Assange, on and off, for six years. He has gone from a bit player on the international stage to one of its dramatic leads. His gleeful interference in the 2016 American presidential electionfirst with the release of e-mails poached from the Democratic National Committee, timed to coincide with, undermine, and possibly derail Hillary Clintons nomination at the Democratic Convention, and then with the publication of the private e-mail correspondence of Clintons adviser John Podesta, which was leaked, drip by drip, in the days leading up to the election to maximize the damage it might inflict on Clintonelevated Assanges profile and his influence.

And then this spring, it emerged that Nigel Farage, the Trump adviser and former head of the nationalist and anti-immigrant UK Independence Party (UKIP) who is now a person of interest in the FBI investigation of the Trump campaigns ties to Russia, was meeting with Assange. To those who once saw him as a crusader for truth and accountability, Assange suddenly looked more like a Svengali and a willing tool of Vladimir Putin, and certainly a man with no particular affection for liberal democracy. Yet those tendencies were present all along.

In 2010, when Poitras began work on her film, Assanges four-year-old website, WikiLeaks, had just become the conduit for hundreds of thousands of classified American documents revealing how we prosecuted the wars in Iraq and Afghanistan, including a graphic video of American soldiers in an Apache helicopter mowing down a group of unarmed Iraqis, as well as for some 250,000 State Department diplomatic cables. All had been uploaded to the WikiLeaks site by an army private named Bradleynow ChelseaManning.

The genius of the WikiLeaks platform was that documents could be leaked anonymously, with all identifiers removed; WikiLeaks itself didnt know who its sources were unless leakers chose to reveal themselves. This would prevent anyone at WikiLeaks from inadvertently, or under pressure, disclosing a sources identity. Assanges goal was to hold powerstate power, corporate power, and powerful individualsaccountable by offering a secure and easy way to expose their secrets. He called this radical transparency. Mannings bad luck was to tell a friend about the hack, and the friend then went to the FBI. For a long time, though, Assange pretended not to know who provided the documents, even when there was evidence that he and Manning had been e-mailing before the leaks.

Though the contradictions were not immediately obvious to Poitras as she trained her lens on Assange, they were becoming so to others in his orbit. WikiLeakss young spokesperson in those early days, James Ball, has recounted how Assange tried to force him to sign a nondisclosure statement that would result in a 12 million penalty if it were breached. [I was] woken very early by Assange, sitting on my bed, prodding me in the face with a stuffed giraffe, immediately once again pressuring me to sign, Ball wrote. Assange continued to pester him like this for two hours. Assanges impulse towards free speech, according to Andrew OHagan, the erstwhile ghostwriter of Assanges failed autobiography, is only permissible if it adheres to his message. His pursuit of governments and corporations was a ghostly reverse of his own fears for himself. That was the big secret with him: he wanted to cover up everything about himself except his fame.

Meanwhile, some of the company he was keeping while Poitras was filming also might have given her pause. His association with Farage had already begun in 2011 when Farage was head of UKIP. Assanges own WikiLeaks Party of Australia was aligned with the white nationalist Australia First Party, itself headed by an avowed neo-Nazi, until political pressure forced it to claim that association to be an administrative error.

Most egregious, perhaps, was Assanges collaboration with Israel Shamir, an unapologetic anti-Semite and Putin ally to whom Assange handed over all State Department diplomatic cables from the Manning leak relating to Belarus (as well as to Russia, Eastern Europe, and Israel). Shamir then shared these documents with members of the regime of Belarusian President Alexander Lukashenko, who appeared to use them to imprison and torture members of the opposition. This prompted the human rights group Index on Censorship to ask WikiLeaks to explain its relationship to Shamir, and to look into reports that Shamirs access to the WikiLeaks US diplomatic cables [aided in] the prosecution of civil society activists within Belarus. WikiLeaks called these claims rumors and responded that it would not be investigating them. Most people with principled stances dont survive for long, Assange tells Poitras at the beginning of the film. Its not clear if hes talking about himself or others.

Then there is the matter of redaction. After the Manning cache came in, WikiLeaks partnered with a number of legacy newspapers, including The New York Times and The Guardian, to bring the material out into the world. While initially going along with those publications policies of removing identifying information that could put innocent people in harms way and excluding material that could not be verified, Assange soon balked. According to the Guardian journalists David Leigh and Luke Harding in WikiLeaks: Inside Julian Assanges War on Secrecy, their 2011 postmortem of their contentious collaboration with Assange on the so-called Afghan war logsthe portion of the Manning leaks concerning the conflict in Afghanistanthe WikiLeaks founder was unmoved by entreaties to scrub the files of anything that could point to Afghan villagers who might have had any contact with American troops. He considered such editorial intervention to contaminate the evidence.

Well theyre informants. So, if they get killed, theyve got it coming to them. They deserve it, Leigh and Harding report Assange saying to a group of international journalists. And while Assange has denied making these comments, WikiLeaks released troves of material in which the names of Afghan civilians had not been redacted, an action that led Amnesty International, the Open Society Institute, the Campaign for Innocent Victims in Conflict, and the Afghanistan Independent Human Rights Commissionto issue a joint rebuke. The group Reporters Without Borders also criticized WikiLeaks for its incredible irresponsibility in not removing the names. This was in 2010, not long after Poitras approached Assange about making a film.

Lack of redactionor of any real effort to separate disclosures of public importance from those that might simply put private citizens at riskcontinued to be a flashpoint for WikiLeaks, its supporters, and its critics. In July 2016, presumably when Poitras was still working on Risk, WikiLeaks dumped nearly 300,000 e-mails it claimed were from Turkeys ruling AKP party. Those files, it turned out, were not from AKP heavyweights but, rather, from ordinary people writing to the party, often with their personal information included.

Worse, WikiLeaks also posted links to a set of huge voter databases, including one with the names, addresses, and other contact information for nearly every woman in Turkey. It also apparently published the files of psychiatric patients, gay men, and rape victims in Saudi Arabia. Soon after that, WikiLeaks began leaking bundles of hacked Democratic National Committee e-mails, also full of personal information, including cell phone and credit card numbers, leading Wired magazine to declare that WikiLeaks Has Officially Lost the Moral High Ground.

Poitras doesnt say, but perhaps this is when she, too, began to take account of the contradictions that eventually turned her film away from hagiography toward something more nuanced. Though she intermittently interjects herself into the filmto relate a dream shes had about Assange; to say that he is brave; to say that she thinks he doesnt like her; to say that she doesnt trust himthis is primarily a film of scenes, episodic and nearly picaresque save for the unappealing vanity of its hero. (There is very little in the film about the work of WikiLeaks itself.)

Here is Julian, holed up in a supporters estate in the English countryside while under house arrest, getting his hair cut by a gaggle of supporters while watching a video of Japanese women in bikinis dancing. Here is Julian in a car with that other famous leaker, Daniel Ellsberg. Here is Julian instructing Sarah Harrison, his WikiLeaks colleague, to call Secretary Clinton at the State Department and tell her she needs to talk to Julian Assange. Here is Julian walking in the woods with one of his lawyers, certain that a bird in a nearby tree is actually a man with a camera. Here is Julian being interviewed, for no apparent reason, by the singer Lady Gaga:

Lady Gaga: Whats your favorite food?

Assange: Lets not pretend Im a normal person. I am obsessed with political struggle. Im not a normal person.

Lady Gaga: Tell me how you feel?

Assange: Why does it matter how I feel? Who gives a damn? I dont care how I feel.

Lady Gaga: Do you ever feel like just fucking crying?

Assange: No.

And here is Julian, in conversation with Harrison, who is also his girlfriend:

Assange: My profile didnt take off till the sex case. [It was] very high in media circles and intelligence circles, but it didnt really take off, as if I was a globally recognized household name, it wasnt till the sex case. So I was joking to one of our people, sex scandal every six months.

Harrison: That was me you were joking to. And I died a little bit inside.

Assange: Come on. Its a platform.

The sex case to which Assange is referring is the one that began in the summer of 2010 on a trip to Sweden. While there, Assange had sex with two young supporters a few days apart, both of whom said that what started out as consensual ended up as assault. Eventually, after numerous back-and-forths, the Swedish court issued an international arrest warrant for Assange, who was living in England, to compel him to return to Sweden for questioning. Assange refused, declaring that this was a honey pot trap orchestrated by the CIA to extradite him to the United States for publishing the Manning leaks.

After a short stay in a British jail, subsequent house arrest, and many appeals, Assange was ordered by the UK Supreme Court, in May 2012, to be returned to Sweden to answer the rape and assault charges. Assange, however, claiming that there was a secret warrant for his arrest in the United States (though the extradition treaty between Sweden and the US prohibits extradition for a political offense), had made other arrangements: he had applied for, and was granted, political asylum in Ecuador. Because the British government refused safe passage there, Assange took refuge in the Ecuadorian embassy in London.

Poitras was with Assange in an undisclosed location in London as the British high court in Parliament Square was issuing its final ruling. The camera was rolling and no one was speakingit was all sealed lips and pantomimeas Assange dyed his hair red and dressed in bikers leather in order to make a mad dash on a motorcycle across town to the embassy. (Theres a sorrowful moment when his mother, who, inexplicably, is in the room, too, writes I love you, honey, on a piece of notebook paper and hands it and a pen to her son and he waves her off.)

This past January, five years into Assanges self-imposed exile, he promised to finally leave the embassy and turn himself over to the Americans if President Obama were to grant clemency to Chelsea Manning, who had been sentenced to thirty-five years in prison for giving documents to WikiLeaks. Obama did; Assange didnt. In May, the same month Manning left prison, Sweden dropped all charges against Assange. He remains in the embassy.

The sex case, as Assange called it, figures prominently in Risk. It serves to reveal his casual and sometimes noxious misogyny, and it is a foil for him to conflate the personal with the political, using the political to get out of answering to the personal, and the personal to claim that hes the victim here. Who is after you, Mr. Assange? Lady Gaga asks. Formally there are more than twelve United States intelligence organizations, Assange tells her, reeling off a list of acronyms. So basically a whole fucking bunch of people in America, she says, and then he mentions that the Australians, the British, and the Swedes are also pursuing him.

Whether this is true or not has long been a matter of dispute. The Swedes definitely wanted him to return to their country, and the British were eager for him to abide by the Swedish warrant, and he made no friends in the Obama administration. Following the Manning leaks in 2010, the attorney general, Eric Holder, made it clear that the Department of Justice, along with the Department of Defense, was investigating whether Assange could be charged under the 1917 Espionage Act, though no warrant was ever issued publicly. Hillary Clinton, then the secretary of state, said that WikiLeakss release of the diplomatic cables was an attack on the international community [and] we are taking aggressive steps to hold responsible those who stole this information. Still, Assanges self-exile in the embassy, which the United Nations condemned as an arbitrary detention, was predicated on his belief that the Americans were lying in wait, ready at any moment to haul him to the US, where his actions might land him in prison for a very long time, or even lead to his execution.

All this was well before Assange was accused of using WikiLeaks as a front for Russian agents working to undermine American democracy during the 2016 presidential election. And it was before candidate Trump declared his love for the website and then watched as Assange released a huge arsenal of CIA hacking tools into the public domain less than two months into Trumps presidency. This, in turn, prompted the new CIA director, Mike Pompeo, who appeared to have no problem with WikiLeaks when it was sharing information detrimental to the Democrats, to declare WikiLeaks a hostile intelligence service, and the new attorney general, Jeff Sessions, to prepare a warrant for Assanges arrest. If the Justice Department wasnt going after Assange before, it appears to be ready to do so now.

Despite Assanges vocal disdain for his former collaborators at The New York Times and The Guardian, his association with those journalists and their newspapers is probably what so far has kept him from being indicted and prosecuted in the United States. As Glenn Greenwald told the journalist Amy Goodman recently, Eric Holders Justice Department could not come up with a rationale to prosecute WikiLeaks that would not also implicate the news organizations with which it had worked; to do so, Greenwald said, would have been too much of a threat to press freedom, even for the Obama administration. The same cannot be said with confidence about the Trump White House, which perceives the Times, and national news organizations more generally, as adversaries. Yet if the Sessions Justice Department goes after Assange, it likely will be on the grounds that WikiLeaks is not real journalism.

This charge has dogged WikiLeaks from the start. For one thing, it doesnt employ reporters or have subscribers. For another, it publishes irregularly and, because it does not actively chase secrets but aggregates those that others supply, often has long gaps when it publishes nothing at all. Perhaps most confusing to some observers, WikiLeakss rudimentary website doesnt look anything like a New York Times or a Washington Post, even in those papers more recent digital incarnations.

Nonetheless, there is no doubt that WikiLeaks publishes the information it receives much like those traditional news outlets. When it burst on the scene in 2010, it was embraced as a new kind of journalism, one capable not only of speaking truth to power, but of outsmarting power and its institutional gatekeepers. And the fact is, there is no consensus on what constitutes real journalism. As Adam Penenberg points out, The best we have comes from laws and proposed legislation which protect reporters from being forced to divulge confidential sources in court. In crafting those shield laws, legislators have had to grapple with the nebulousness of the profession.

The danger of carving off WikiLeaks from the rest of journalism, as the attorney general may attempt to do, is that ultimately it leaves all publications vulnerable to prosecution. Once an exception is made, a rule will be too, and the rule in this case will be that the government can determine what constitutes real journalism and what does not, and which publications, films, writers, editors, and filmmakers are protected under the First Amendment, and which are not.

This is where censorship begins. No matter what one thinks of Julian Assange personally, or of WikiLeakss reckless publication practices, like it or not, they have become the litmus test of our commitment to free speech. If the government successfully prosecutes WikiLeaks for publishing classified information, why not, then, the failed New York Times, as the president likes to call it, or any news organization or journalist? Its a slippery slope leading to a sheer cliff. That is the real risk being presented here, though Poitras doesnt directly address it.

Near the end of Risk, after Poitras has shown Assange a rough cut of the film, he tells her that he views it as a severe threat to my freedom and I must act accordingly. He doesnt say what he will do, but when the film was released this spring, Poitras was loudly criticized by Assanges supporters for changing it from the heros journey she debuted last year at Cannes to something more critical, complicated, and at best ambivalent about the man. Yet ambivalence is the most honest thing about the film. It is the emotion Assange often stirs up in those who support the WikiLeaks mission but are disturbed by its chief missionary.

This ambivalence, too, is what makes Risk such a different film from Citizen Four (2014), Poitrass intense, resolute, Oscar-winning documentary about Edward Snowden. While Snowden and Assange are often twinned in the press and in the public imagination, these films demonstrate how false that equivalence is. Snowden leaked classified NSA documents that he said showed rampant unconstitutional intrusions by the government into the private lives of innocent citizens, doing so through a careful process of vetting and selective publication by a circle of hand-picked journalists. He identified himself as the leaker and said he wanted to provoke a public debate about government spying and the right of privacy. Assange, by contrast, appears to have no interest in anyones privacy but his own and his sources. Private communications, personal information, intimate conversations are all fair game to him. He calls this nihilism freedom, and in so doing elevates it to a principle that gives him license to act without regard to consequences.

The mission Assange originally set out to accomplish, thoughproviding a safe way for whistleblowers to hold power accountablehas, in the past few years, eclipsed WikiLeaks itself. Almost every major newspaper, magazine, and website now has a way for leakers to upload secret information, most through an anonymous, online, open-source drop box called Secure Drop. Based on coding work done by the free speech advocate Aaron Swartz before his death and championed by the Freedom of the Press Foundationon whose board both Laura Poitras and Edward Snowden sit, and which is a conduit for donations to WikiLeaks among other organizationsSecure Drop gives leakers the option of choosing where to upload their material. The New York Times, The Washington Post, The New Yorker, Forbes, and The Intercept, to name just a few, all have a way for people to pass secrets along to journalists.

It is not yet known why a National Security Agency contractor named Reality Leigh Winner didnt use a digital drop box when she leaked a classified NSA document to The Intercept in May outlining how Russian cyber spies hacked into American election software. Unlike Edward Snowden, who carefully covered his tracks before leaking his NSA cache to Glenn Greenwald (before Greenwald started The Intercept) and Laura Poitras (who filmed Snowdens statement of purpose, in which he identified himself as the leaker), Winner used a printer at work to copy the document, which she then mailed to The Intercept. What she and those at The Intercept who dealt with the document did not know, apparently, is that this government printer, like many printers, embeds all documents with small dots that reveal the serial number of the machine and the time the document was printed. After The Intercept contacted the NSA to verify the document, the FBI needed only a few days to find Winner and arrest her.

We will soon get to witness what the Trump administration does to those who leak classified information, and to those who publish it. WikiLeaks, apparently, will be providing the government with an assist. It is offering a $10,000 reward for the public exposure of the reporter whose ignorance or carelessness led the FBI to Reality Winners door. Such are the vagaries of radical transparency.

Read the original:
The Nihilism of Julian Assange - The New York Review of Books

WikiLeaks: CIA Spying on Home Wi-Fi Routers – Newsmax

Home Wi-Fi routers made by Linksys, DLink, Belkin and other top tech firms have been used by the CIA to monitor the flow of internet traffic, documents revealed by WikiLeaks show.

The infected routers spy on the internet-connected devices' activities without the user knowing, turning them into "covert listening points," the Daily Mail reports.

A 175-page CIA user manual for setting up the spying activity dubbed "Cherry Blossom," reads in part:

"The Cherry Blossom (CB) system provides a means of monitoring the internet activity of and performing software exploits on targets of interest. In particular, CB is focused on compromising wireless networking devices, such as wireless (802.11) routers and access points (APs), to achieve these goals.''

It also explains how a maneuver called "tomato'' can steal the routers' passwords if a default feature known as a universal plug and play is left on.

The manual, according to the Daily Mail, is about 10-years-old.

2017 Newsmax. All rights reserved.

Visit link:
WikiLeaks: CIA Spying on Home Wi-Fi Routers - Newsmax

Julian Assange and WikiLeaks Accused of Censorship by ‘Risk’ Documentarian Laura Poitras – IndieWire

More than a month after Risk was released in theaters, the documentarys story continues to evolve. The latest development is especially dramatic: Laura Poitras and the films other two producers have published an op-ed in Newsweek accusing Julian Assange and WikiLeaks of censorship.

READ MORE:Risk Takes On Julian Assange: The Dramatic Story Behind Laura Poitras Oscar Follow-Up

Poitras, Brenda Coughlin and Yoni Golijovwrite that Assange and WikiLeaks the subject of their film have sent cease-and-desist letters to Neon, the distributor of Risk, demanding that they stop the films release. They find that hypocritical to say the least: In WikiLeaks efforts to prevent the distribution of Risk, they are using the very tactics often used against them legal threats, false security claims, underhanded personal attacks, misdirection and with the same intentions: to suppress information and silence speech, they write.

READ MORE:Risk: Laura Poitras Yanks Screenings For Last-Minute Edits Following New Julian Assange Developments

All the participants in Risk agreed for years to be in the film, they continue. We have no obligation to seek WikiLeaks or Assanges authorization to release the film. In fact, our rights under the First Amendment are protected precisely because we are engaging in independent journalism.

The scope of Risk shifted and evolved as new developments came to light. Read the full op-ed here.

Stay on top of the latest breaking film and TV news! Sign up for our Festivals newsletter here.

More:
Julian Assange and WikiLeaks Accused of Censorship by 'Risk' Documentarian Laura Poitras - IndieWire