WikiLeaks, and the Past and Present of American Foreign …

On April 5, 2008, a small coterie of Republican senators and diplomats John Barrasso, Saxby Chambliss, Mitch McConnell, and James Risch, among othersheld a quiet meeting with then Egyptian President Hosni Mubarak at the Heliopolis Palace in Cairo.

The setting was regal. Designed in the early twentieth century by a Belgian architect, the one-time luxury hotel had been remade as Mubarak's home and workplace in the 1980s. Blending Arabic, European, and Persian architectural styles, the complex embodied purposefully Egypt's place at the crossroads of the pan-Islamic and pan-European worlds.

The conversation slid naturally to current events as the group settled down to talk.

After a brief back-and-forth about Israel, Mubarak turned to Iraq. "My dear friends," he began, "democracy in Iraq equals killing. The nature of those people is completely different. They are tough and bloody, and they need a very tough leader. They will not be submissive to a democratic leader."

Stability required an authoritarian fist.

"As I told Secretary of Defense Gates last year," Mubarak continued, "the only solution [to America's desire to leave Iraq] is to strengthen the military and security forces, arm and train them, wait for the emergence of some generals, don't oppose them, then stay in your camps in the desert and don't interfere. The military will control Iraq like the ayatollahs control Iran."

Twenty-eight years in power, and Mubarak's worldview amounted to a simple adage: never "mix democracy and tribalism."

The transcript drips with irony when read from the present.

It was sent to the Department of State by U.S. Ambassador Margaret Scobey on April 8, 2008. It allegedly comes to us via Private First Class Bradley Manning, who sits now in a U.S. military prison, awaiting trial for passing along 251,287 such cablesonly 2,000 of which are available online currentlyto the media organization known as WikiLeaks.

Manning's fate and the imbroglio surrounding Julian Assange, the controversial figure who shared the cables with the world, has faded somewhat from the headlines in recent months. Yet the WikiLeaks communiqus reveal much about America's role in today's world.

In the words of author Timothy Garton Ash, the documents are a "historian's dream" and a "diplomat's nightmare"a spigot of information from the contact points of American power, where powerbrokers and diplomats go daily through the motions of statecraft.

Leaks, Yesterday and Today

In the United States, politicians have hyperventilated over the WikiLeaks story since it broke in 2010.

Despite the fact that most foreign leaders quickly dismissed the material as blas, American leaders have framed Assange and Manning as unambiguous enemies of the international community.

Internal dissentvoiced notably by (now former) State Department spokesman P.J. Crowley, who criticized the U.S. government's imprisonment of Manninghas been cast as inexcusable and irresponsible.

But the American ship-of-state has long been a leaky boat.

George Washington reprimanded Alexander Hamilton for passing material to the British during the 1794 Jay Treaty negotiations, and James Madison castigated his secretary of state for giving administration secrets to members of the opposing Federalist Party.

There has been no shortage of leak-related precedents since then.

In 1848, as the United States' war with Mexico drew to a close, Senate investigators placed a journalist under house arrest for the first time because he refused to disclose how he obtained details about the not-yet-complete peace treaty.

At the height of the First World War, lawmakers considered making it illegal to leak state information to the public, but changed their minds because of first amendment concerns, opting instead for legislation that criminalized the act of relaying defense secrets to the enemy during wartime.

The most notorious leak in U.S. history came in the early 1970s, when Daniel Ellsberga Princeton-educated analyst who worked for Secretary of Defense Robert McNamara during the 1960sdelivered a 7,000-page Pentagon report to The New York Times, and later The Washington Post.

Unprecedented in scope, the collection of top-secret materials revealed that Lyndon Johnson's White House had lied systematically to the public about the rationale behind America's involvement in Vietnam.

Richard Nixon tried to use an injunction to stop the material's publication in 1971, setting another historical precedent in the process, but failed at the Supreme Court.

The ethics of leaking have never been straightforward. Nixon's own contradictions were on full display as he and his advisors formulated their response to Ellsberg:

Nixon: "Let's get the son of a bitch into jail." Henry Kissinger: "We've got to get him." Nixon: "We've got to get him ... Don't worry about his trial. Just get everything out. Try him in the press ... Everything ... that there is on the investigation, get it out, leak it out."

Such conviction, of course, facilitated Nixon's undoing, but the implications were clear and the sentiment was probably felt widely among American elites: leaking was bad when it violated the interests of power.

Or, as columnist David Corn said once, there are leaks "that serve the truth, and those that serve the leaker."

The second Bush administration blurred this line frequently.

White House staff members gave the identity of CIA agent Valerie Plame to columnist Robert Novak after her husband, Ambassador Joseph Wilson, criticized the rationale for the 2003 Iraq invasion.

Bush himself passed along (selectively chosen) top-secret documents to reporter Bob Woodward for the 2002 book, Bush at War.

Wheat from the Chaff

Each of these leaks tells a different historical story.

The Plame affair underscored the politicization of information in our fractured age, when partisans compete with cynical glee to mold Washington's weekly narrative.

Ellsberg's papers exposed the contradictions of an earlier epoch, highlighting the tenuous underpinnings of the global Cold War, particularly in Southeast Asia.

Controversies from the nineteenth and early twentieth centuriessharpened often by war and codified through lawoffer windows into the rise of the modern state, and highlight how the U.S. government came to police its inner correspondence.

And the experiences of the founding fathers hint at an era now long past, when leaders navigated questions of secrecy with little consideration of bureaucratic power.

So given this long leaky history, what makes the WikiLeaks material so interesting?

Size mattersthere is a lot of information in the 251,287 cablesbut the documents differ from previous leaks.

For one, they draw on different source material.

Unlike Ellsberg, Manning did not have access to top-secret reports. Most of the information he downloaded from his desk at a military base in Iraq never reached the Oval Office. It is likely that few of his cables even made their way to the seventh floor of the U.S. State Department, where America's top statesmen manage the daily business of U.S. foreign relations.

Moreover, the documents do not lend themselves to a Plame or Ellsberg-like controversy.

There are embarrassing tidbits here and theregossipy assessments of foreign leadersand heart-wrenching details from the battlefields in Afghanistan and Iraq. But Washington's foreign officers come across mostly as professionals.

As commentator Fareed Zakaria opined, "Washington's secret diplomacy is actually remarkably consistent with its public diplomacy" this time around, unlike during the Vietnam War, U.S. diplomats are undeniably "sharp, well informed, and lucid."

What emerges from the WikiLeaks material is a story that features not the great men and women of Washington but the mid-level officials who work in U.S. outposts around the world.

These are the individuals who conduct American diplomacy on the ground. Their correspondence is dominated by neither turf battles nor policy debates, but rather a continual effort to collect accurate information, analyze trends, and advance U.S. interests in the world.

Looking through the eyes of such individuals reveals much about U.S. foreign relations, especially in the American hinterlandthat zone of exchange at the outskirts of Washington's political influence.

The WikiLeaks documents showcase the common priorities of the officials who enact American policy in this region, and they tell scholars something about the challenges of U.S. foreign affairs in the early twenty-first century.

Things have changed certainly since the end of the Cold War, but they haven't changed as much as one might suspect.

Small States, Big Allies

Washington's global influence today is deeply contested. To a degree that might surprise both boosters and detractors of America's foreign policy, negotiation is the motif of the WikiLeaks documents.

Whether dealing with special friends or political afterthoughts, U.S. diplomats rarely dictate the terms of international exchange. They are caught instead in a continual two-way conversation that often obfuscates the asymmetrical nature of Washington's military and economic resources.

The examples are almost endless.

Take Yemen: residing at the outskirts of the Arab world with a harsh climate and a small population, there is little reason the country should possess any leverage over the U.S. policymaking establishment. Unlike Saudi Arabia, it possesses few oil reserves or regional cloutonly the strategic port city of Aden, which provides access to the waters between the Red Sea and the Indian Ocean.

Read the original post:
WikiLeaks, and the Past and Present of American Foreign ...

Contact – wikileaks.org

2. Act normal

If you are a high-risk source, avoid saying anything or doing anything after submitting which might promote suspicion. In particular, you should try to stick to your normal routine and behaviour.

If you are a high-risk source and the computer you prepared your submission on, or uploaded it from, could subsequently be audited in an investigation, we recommend that you format and dispose of the computer hard drive and any other storage media you used.

In particular, hard drives retain data after formatting which may be visible to a digital forensics team and flash media (USB sticks, memory cards and SSD drives) retain data even after a secure erasure. If you used flash media to store sensitive data, it is important to destroy the media.

If you do this and are a high-risk source you should make sure there are no traces of the clean-up, since such traces themselves may draw suspicion.

If a legal action is brought against you as a result of your submission, there are organisations that may help you. The Courage Foundation is an international organisation dedicated to the protection of journalistic sources. You can find more details at https://www.couragefound.org.

Continue reading here:
Contact - wikileaks.org

WikiLeaks shows CIA hijacked Russian mafia malware – TRUNEWS

On Friday WikiLeaks released part 4 of their Vault 7 series detailing Russian mafia malware believed to have been weaponized by the CIA

(WASHINGTON, DC) WikiLeaks has released the fourth part of their Vault 7 CIA series.

The package set free to the world today is pointedly named Grasshopper, and details alleged CIA hacking techniques involving malicious software WikiLeaks claims was taken from suspected Russian organized crime.

The latest release consists of 27 documents WikiLeaks claims come from the CIAs Grasshopper framework, a platform for building malware for use on Microsoft Windows operating systems.

In a statementfrom WikiLeaks, Grasshopper was described as providing the CIA with the ability to build a customized implant which will behave differently, depending on the security capabilities of a computer.

According to WikiLeaks, Grasshopper performs a pre-installation survey of the target device, assuring that the payload will only [be] installed if the target has the right configuration."

This allows CIA operators to detect if a target device is running a specific version of Microsoft Windows or if an antivirus is running, according to the statement.

Grasshopper allows tools to be installed and run on a machine without detection using PSP avoidance, allowing it to avoid Personal Security Products such as 'MS Security Essentials', 'Rising', 'Symantec Endpoint' or 'Kaspersky IS'.

One of the so-called persistence mechanisms, which allows malware to avoid detection and remain on a computer system indefinitely, is known as Stolen Goods.

In the WikiLeaks release, it is creditedto Umbrage, a group within the CIAs Remote Development Branch (RDB) which was linked in the Year Zero release to collecting stolen malware and using it to hide its own hacking fingerprints.

The components of the Stolen Goods mechanism were taken from a malware known as Carperb, a suspected Russian organized crime rootkit," alleges WikiLeaks.

Stolen Goods targets the boot sequence of a Windows machine, loading a driver onto the system that allows it to continue executing code when the boot process is finished.

WikiLeaks confirmed that the CIA did not merely copy and paste the suspected Russian malware but appropriated "[the] persistence method, and parts of the installer, which were then modified to suit the CIAs purposes.

The latest release came with an emblem containing a grasshopper and the words: Look before you leap, a possible reference to how the latest leaked tools would allow the CIA to prepare a machine for future hacking, without raising suspicion.

The rootkits can be installed and used as a 'man on the inside' who can allow more malicious software through undetected in future, if the CIA felt it necessary. If suspicions were raised on initial installation, they would know not to proceed with a more extensive operation.

Also detailed in the release are Buffalo and Bamboo, modules that hide malware inside DLLs, a collection of shared libraries, on a Windows system.

The two modules operate in slightly different ways: Buffalo runs immediately on installation whereas Bamboo requires a reboot to function properly.

The goal of todays release is to help users seeking to defend their systems against any existing compromised security systems, Wikileaks stated.

Also detailed in the release is ScheduledTask, a component of Grasshopper that allows it to utilize Windows Task Scheduler to schedule executables.

The component would allow the executables to automatically run at startup or logon, before killing it at the end of its duration. Included in ScheduledTask are commands that allow the executables names and description to be hidden.

The release is the fourth in a series called Vault 7 which WikiLeaks claims contains documents taken from within the CIA. Releases so far include Zero Days which detailed the CIAs hacking of Samsung smart TVs and Marble, which allowed the CIA to disguise their hacks and attribute them to someone else, including Russia.

RT copy, TRUNEWS contribution

Donate Today!

We believe Christians need and deserve their own global news network to keep the worldwide Church informed, and to offer Christians a positive alternative to the anti-Christian bigotry of the mainstream news media

Originally posted here:
WikiLeaks shows CIA hijacked Russian mafia malware - TRUNEWS

CIA operations may be disrupted by new Wikileaks’ data release – BBC – BBC News


BBC News
CIA operations may be disrupted by new Wikileaks' data release - BBC
BBC News
Current spying campaigns run by the CIA could be disrupted, say experts, after more data on the agency's hacking techniques was released by Wikileaks.
WikiLeaks exposes more alleged CIA cyber tools -- FCWFCW.com
Wikileaks' Most "Technically Damaging" Leak Reveals CIA Source ...Fossbytes

all 7 news articles »

Read more:
CIA operations may be disrupted by new Wikileaks' data release - BBC - BBC News

New York Times reporter talks WikiLeaks, national security at UNM – UNM Daily Lobo

New York Times national security reporter Scott Shane visited UNM to give insight from his illustrious career as a journalist.

In his career Shane has covered the Russian hacking during the 2016 election, the recent Vault 7 CIA leak and other incidents, and also served as Moscow correspondent for the Baltimore Sun. He is the author of Objective Troy: A Terrorist, A President, and the Rise of the Drone, which describes Anwar al-Awlakis participation in al-Qaida and his death by a drone strike ordered by former President Barack Obama.

A reporter for 37 years, Shane spoke at UNMs National Security Studies Programs eighth annual symposium on Monday. He then gave a presentation about Anwar al-Awlaki at the SUB and later, gave a Q&A on WikiLeaks on Tuesday.

He began the Q&A by taking the audience back to 2010, when the New York Times was given over 25,000 diplomatic cables to sort through and report on after they were leaked by Chelsea Manning.

Although federal agencies asked the Times to return the documents, the stories were still published, with harmful information such as full names removed as needed.

Shane used this introduction to paint WikiLeaks as an organization with a gyrating philosophy between rebellion and operating as a true news organization.

For decades, one document was released at a time to news organizations, revealing some sort of wrongdoing on a micro scale, Shane said. Eventually, WikiLeaks established the model of the mega leak. Shane emphasized the impact of technology that allows individuals to save information electronically, rather than relying on only a photocopier or the like.

The Q&A went on to discuss questions ranging from the relationship between the press and the current presidential administration, incorrect information found in other news outlets, the security of the Times information and other topics.

Communications and Journalism adviser Dr. Richard Schaefer, who met Shane last year, said he felt the WikiLeaks Q&A went well and that Shanes entire visit to UNM was beneficial to faculty and students.

"(Shanes) work is a really good form of journalism thats ethical, Schaefer said, calling him a great storyteller who is able to research, interpret and report on a series of documents accurately and in an engaging way.

Schaefer said he wouldnt be surprised if Shane returns to UNM and hopes to see more inspiring guest speakers provided by the New Mexico News Port and Investigative Reporters and Editors.

Because it appears to have become easier to share confidential and classified information, it is likely that this sharing will continue to happen, Shane said during an interview with the Daily Lobo.

Its going to be a permanent feature of journalism and present a lot of challenges that I dont think have been fully grappled with, he said, such as prizing secrecy and immediately feeling the information should be published.

In a thoughtless way, we kind of become tools for whoever gives us those documents, and that makes us vulnerable to political manipulation of all kinds, Shane said.

Shane did not pursue journalism during college, and said he feels younger generations may be better able to gauge how they will follow a career in the world of journalism, especially when considering technological advances.

I consider myself a curious person, he said. Things strike me, and I wonder about them, or people strike me, and Id like to learn more about them. The great thing about being a journalist is it gives you the excuse to do that. Its a license that society gives you to look into things, and its a great privilege to have.

With that in mind, Shane gave his best wishes to aspiring journalists.

I didnt think a guy like him could actually come to UNM, said Maya Holt, a senior C&J major.

Holt said she attended the event as part of one of her courses, and although the Q&A helped her solidify the information she already knew about WikiLeaks, it also moved her a bit too.

Its people like him that make me proud to be a journalism major because of the things he does, Holt said, calling his in-depth investigations admirable (and) what I want to imagine a journalist to be.

Holt said she hopes more guest speakers will visit campus to inspire more students.

Elizabeth Sanchez is a reporter for the Daily Lobo. She can be reached at news@dailylobo.com or on Twitter @Beth_A_Sanchez.

See the original post here:
New York Times reporter talks WikiLeaks, national security at UNM - UNM Daily Lobo

WikiLeaks’ CIA Document Dump: What You Need to Know – RollingStone.com

Earlier this week, WikiLeaks published a startling news release announcing what could be the largest-ever dump of CIA documents 8,761 pages, a collection which the website calls "Vault 7." WikiLeaks, the "stateless news organization" led by Julian Assange, claims the leak is the first of a series called "Year Zero" that they plan to release regarding secret information on digital tools and techniques used by the agency. The documents, which are mostly pages of highly technical code, appear to reveal the intelligence agency's hacking capabilities, including how they exploited security flaws in popular smart electronics like iPhones and Samsung TVs to spy on individuals.

There is no evidence the hacking tools were used against Americans, and the CIA has refused to confirm the authenticity of the documents. On Wednesday, the CIA issued a statement declining to comment on the "purported intelligence documents" and said the agency was "legally prohibited from conducting electronic surveillance targeting individuals here at home... and CIA does not do so." That same day, the FBI began preparing to interview people with connections to such government documents and files. Intelligence officers and cyber-security experts are weighing in with varying opinions on whether the leak came from inside the CIA or from foreign hackers outside the agency.

Since the dump, there have been several developments, from Assange announcing he would work with electronics and software companies to help patch the security flaws, to experts questioning just what the document dump reveals. In an effort to make sense of the cluster, here's a guide to how the latest leak of secret information affects the government, tech companies and private citizens.

What did the release reveal? The WikiLeaks dump is now being analyzed by cybersecurity experts, who are focusing on what are known as "zero-day" vulnerabilities. These are unknown holes in software that hackers (or government agencies) can use to infect a device with malware or spyware, or gain access to personal information. Since the dump, the CIA has faced criticism from groups such as the ACLU for not turning the security flaws over to the companies so they could be fixed, instead leaving American citizens open for potential cyber attacks.

The alleged CIA documents, which are dated from 2013 to 2016, describe the agency's abilities to use the software flaws to hack into and control devices like the iPhone, Android and Samsung TVs, along with Skype, Wi-Fi networks and antivirus programs. They note, for instance, that agency's malware can infiltrate iPhone and Android mobile devices like the one known to handle the President's Twitter account. "If the CIA can hack these phones then so can everyone else," read one WikiLeaks press release, suggesting that Trump's personal accounts might have already been compromised.

According to the dump, the CIA has the ability to hack into devices remotely and activate cameras and microphones so they can keep tabs on a person's location and private messages. One of the most disturbing aspect of the documents comes in an explanation of how the CIA cooperated with United Kingdom intelligence services to develop techniques to hack into Samsung Smart TVs with a program called "Weeping Angel" that enabled them to record their surroundings while the television appeared to be off.

Does this mean the CIA is spying on me? The short answer is no. Nathan White of the digital rights nonprofit advocacy group Access Now in Washington, DC, says he is not surprised to learn the CIA developed tools and techniques for spying on tech devices, but there is no evidence the agency spies on the American population. "The CIA can hack into phones, TVs, and maybe even cars," he says, "but there is no reason to believe that this means that all of these things have been hacked." While it might be disconcerting that the nation's spy agency has these Orwellian abilities, they're supposed to only use them on foreign targets.

Then again, per Obama-era guidelines, they were supposed to disclose vulnerabilities they found to the tech companies so the security holes could be fixed, and they did not. Cybersecurity expert Stuart Madnick, head of the the Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity at MIT, says the CIA is conflicted: "How dangerous is it to you if the vulnerabilities persist, or how valuable are the vulnerabilities if the CIA can use them? We need to decide as a nation.

Who leaked the CIA documents? WikiLeaks says they published the CIA documents "as soon as its verification and analysis were ready." The website, of course, is not outing their source, but write that the "source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons."

James Lewis, an expert on cybersecurity at the Center for Strategic and International Studies in Washington, DC, says that he believes the source is probably an agency contractor. "The insider story has some odd bits: this sort of information is supposed to be compartmentalized, meaning that one person shouldn't have access to all of it," he says. "The agency has extensive new safeguard to detect such a leak after the Snowden incident." He says it's also possible the Russians stole the documents and gave them to WikiLeaks, as part of an ongoing struggle between the two powers, in which, as The Guardian describes, "WikiLeaks is widely seen as sitting firmly in Moscows corner."

How does this compare to Edward J. Snowden's leaks in 2013? WikiLeaks says the number of Vault 7 pages "eclipses" the first three years of the Snowden NSA leaks, but there are considerable differences here. Snowden exposed the NSA was spying on American citizens and uncovered surveillance on a global scale. WikiLeaks does not outright accuse the CIA of hacking its own, but rather keeps the focus on the agency's hacking tools. Also, WikiLeaks alleges the CIA didn't report identified zero-day vulnerabilities, while Snowden proved the NSA talked about actually making them.

Overall, there is no clear similarity between this dump and Snowden's. "The NSA leaks were shocking because they revealed mass surveillance that impacted all of us," White says. "We're not seeing that here at least not yet.

What's going to happen next? At a press conference on Thursday, Assange announced that WikiLeaks will give the affected tech companies access to CIA hacking tools for their defense measures, as the documents in the dump only described portions of agency tools, not full programs needed to run a cyber attack. Microsoft and Cisco Systems said they "have not yet been contacted," but would welcome "submissions of any vulnerabilities through normal reporting channels."

The offer comes two months after the American intelligence reported a link between WikiLeaks and the Russians in regards to the Democratic National Committee hack during the 2016 presidential election. It is a growing belief among U.S. officials and lawmakers that Assange is a pawn of Russian President Vladimir Putin in hacking the American government. Russia and the US will continue these battles over whodunnit. But for now, the Kremlin are telling us the CIA information dump is cause enough to turn their phones off.

Sign up for our newsletter to receive breaking news directly in your inbox.

Originally posted here:
WikiLeaks' CIA Document Dump: What You Need to Know - RollingStone.com

Wikileaks Jumps The Shark – The Daily Banter


The Daily Banter
Wikileaks Jumps The Shark
The Daily Banter
Since well before the election, there was a nagging suspicion that the darlings of the anti-Hillary hard left, Julian Assange and Wikileaks, were not all that progressive. It started to feel like they were working very hard to tilt the election towards ...
WikiLeaks aids doubters of Russian election hackingThe Hill
WikiLeaks' CIA dump makes the Russian hacking story even murkier if that's possibleSalon
GOP senator claims he was targeted by hackers after blasting WikiLeaks' Julian Assange as 'an enemy'New York Daily News
Mediaite -Washington Times -Kenai Peninsula Online
all 69 news articles »

Read more:
Wikileaks Jumps The Shark - The Daily Banter

Heritage Action chief: Don’t embrace WikiLeaks for partisan reasons – Washington Examiner

WikiLeaks is a foe and can't be embraced for partisan reasons, the head of an influential conservative group stated Sunday in the wake of the group's disclosure of CIA hacking methods.

"WikiLeaks is an enemy of the United States," said Heritage Action for America CEO Michael Needham, speaking on "Fox News Sunday."

"Both sides need to recognize it cannot be embraced for partisan domestic politics," Needham said of the group.

Some on the right, including President Trump, applauded WikiLeaks for its publication of emails from Hillary Clinton's top campaign adviser. In the past, Needham noted, people on the left backed WikiLeaks when it released damaging disclosures about the Bush administration.

"We have a big problem in this country if there's somebody inside the CIA leaking this kind of information," Needham said. "It's something that we all as Americans need to be deeply concerned about."

Last week, WikiLeaks released stolen documents with information about the CIA's cyber spying methods.

That, said commentator Juan Williams, is far different from past WikiLeaks publications, which shed light on legally dubious domestic spying.

"What was revealed this week was about CIA methods, sources, tactics overseas," Williams noted.

Also from the Washington Examiner

This last election didn't show many gains for women, but more women are running than ever before.

03/13/17 1:01 AM

Read more here:
Heritage Action chief: Don't embrace WikiLeaks for partisan reasons - Washington Examiner

WikiLeaks: What are we to think? – Columbia Daily Tribune

I always have had mixed feelings about unauthorized disclosure of U.S. government surveillance activities. National security officials can make a good case for secrecy as they pursue those who would do us harm, but all of us have reason to feel somewhat uncomfortable at the prospect of Big Brother snooping into our private lives as well.

With each new electronic gadget, the stakes get higher. What are we to think? One thing for sure: We should assume everything we submit to cyberspace is public.

Not that our every interaction via smartphone, tablet, brainy new television and the like will be misused, but the primary restraint stems from the mere volume of human communication and the fact most of it is uninteresting to others. This is sort of security by default, not because of any intentional defense against hacking. Which means for the time being, at least information of interest to others can and will be discovered.

WikiLeaks keeps proving the art of hacking is running ahead of the art of encryption. Certainly the ability of government agencies to know what average citizens are doing with electronic devices is greater than anything we can do in electronic defense. Our only real defense is attitudinal. We should assume we are living in electronic fishbowls and act accordingly.

All of which makes a case for the Luddite life.

Against todays societal norm, I have avoided the use of smartphones altogether, not mainly because of fears of unauthorized snooping but because of a combination of inertia and disdain for the way smartphones take over users lives. I do have an old-fashioned cellphone but rarely turn it on. Our family bill consistently shows my monthly use at less than 10 minutes.

People whose phones are constantly in use volunteer astonishing amounts of information to the internet for easy surveillance. Any government that assumes some of the information on the internet might come from terrorists and other enemies of the state is bound to tap in continually. To tell the bad guys from the good guys, the good guys will receive at least summary attention.

Revelations by WikiLeaks remind us of the brave, disturbing new world of the internet. By our eager embrace of the new technology, we invite its abuses as well as its attributes.

So, Im not ready to blame anybody, including WikiLeaks, when new evidence of hacking shows up.

Defense officials blame insiders who leak information, but this is nothing new. Now its done more efficiently electronically, but the acts are no more heinous than similar thefts by yesterdays spies using yesterdays technology. Every combatant will snoop to find the bad snoops. The new technology guarantees ordinary citizens will be examined in the process.

Managers of the CIA and other intelligence agencies bemoan todays massive cyber leaks as threats to the ability of their agencies to perform their protective duties. We want them to continue the race against hacking, but we also want them to successfully hack enemy files, an activity that will always imply they could be looking at information provided by all of us.

The only words that dont offend a single human being are words delivered without a purpose.

See more here:
WikiLeaks: What are we to think? - Columbia Daily Tribune

Google, Microsoft Still Waiting On Wikileaks To Deliver CIA Hacking Tools – Forbes


Forbes
Google, Microsoft Still Waiting On Wikileaks To Deliver CIA Hacking Tools
Forbes
It's been two days since Julian Assange promised Wikileaks would hand over more information on Central Intelligence Agency (CIA) hacker tools to tech giants. That pledge followed a leak of nearly 9,000 documents that Wikileaks claimed belonged to CIA ...
The Worst and Best Parts of WikiLeaks' CIA LeakFortune
'Vault 7' document dump by WikiLeaks contains no 'smoking gun' showing CIA masquerading as other state actorsMarketWatch
WikiLeaks CIA cache: Fool me onceEngadget
TechNewsWorld -Salon -WIKILEAKS -WikiLeaks
all 4,135 news articles »

View post:
Google, Microsoft Still Waiting On Wikileaks To Deliver CIA Hacking Tools - Forbes