Daniel Ellsberg Speaks Out on the Arrest of Julian Assange …

As Julian Assange awaits his fate, socked away in maximum security lockdown in Great Britain, his supporters and friendsmany of whom believe he is one of the most significant publishers of our timeare vigiling, writing,and speaking out in support of his work and calling for his immediate release.

I spoke to legendary Pentagon Papers whistleblower Daniel Ellsberg the morning after Assange was dragged out of the Ecuadorian Embassy in London, with the eyes of the world watching the scene unfold in real time.

Ellsberg says he is both outraged and deeply concerned about the impact this case might have on the free press. Without whistleblowers, Ellsberg tells me in the following interview, we would not have a democracy.

Q: You have been watching what has been going on with Julian Assange for some time. What do you make of what has just happened?

Daniel Ellsberg: It is not a good day for the American press, or for American democracy. Forty-eight years ago, I was the first journalistic source to be indicted. There have been perhaps a dozen since then, nine under President Obama. But Julian Assange is the first journalist to be indicted. If he is extradited to the U.S. and convicted, he will not be the last.

The First Amendment is a pillar of our democracy and this is an assault on it. If freedom of speech is violated to this extent, our republic is in danger. Unauthorized disclosures are the lifeblood of the republic.

Q: Some people say Assange was just a hacker. Others, including many major news organizations, felt that he was a legitimate source of information. What is the significance of WikiLeaks? Did it change history in a way similar to how the Pentagon Papers changed our knowledge of the Vietnam War?

Ellsberg: It would be absurd to say that Julian Assange was just a hacker. As a young man he was a hacker, and his philosophy is sometimes called hacker philosophy, referring to radical transparency, which goes beyond what I would agree with in some cases, in terms of not wanting to redact or curate any of the information at all. His theory is to lay it all out for the public and I think that can have some dangers for privacy in some cases. But that is not involved here.

In this case he was doing journalism of a kind which I think other outlets are jealous of and dont practice as much as they should. This information was actually first offered by Chelsea Manning to The New York Times and The Washington Post, but neither one showed any interest in it. That is how it came to Julian Assange and WikiLeaks.

The collateral murder video shows up-front murder being done [in an airstrike in Baghdad in July 2007]. You see unarmed people in civilian clothes being gunned down and then as they are crawling away, wounded, being pursued until they are dead. That was murder. Not all killing in war is murder, although a lot of it is in modern war. Other people were watching that video when [Manning] saw it. They were all shocked by it, [but] she was the one who decided that people should be told about this.

Without whistleblowers, our foreign policy would be almost entirely covert. We dont have as many whistleblowers as we need to have any kind of public sovereignty.

That took great moral courage on her part, for which she paid ultimately with seven and a half years in prison, ten and a half months in solitary confinement. She was recently imprisoned again for refusing to cooperate with a grand jury that clearly is pursuing Julian Assange, hoping to get information beyond what she testified to in her hearings and court trials. . . .

She objects to grand juries in general, as unconstitutional and undemocratic in their secret proceedings. That is the same attitude my co-defendant in the Pentagon Papers trial, Anthony Russo, took forty-eight years ago. He refused to testify secretly to a grand jury. In fact, he offered to testify if they would give him a transcript that would show him exactly what he said and hadnt said. They wouldnt accept that and he spent over a month in jail before they decided instead to indict him. Chelsea is taking the same position now and showing the kind of moral courage that she has shown all along.

Julian, meanwhile, is being charged with having gone beyond the limits of journalism by helping Manning to conceal her identity with a new username. He is also charged with having encouraged her to give him documents. That is criminalizing journalism. I cant count the number of times that I have been asked for documents by journalists or for more documents. She had already given hundreds of thousands of files to Assange and he wanted more. This is the practice of journalism.

Q: There wouldnt really be much journalism without documents. People used to depend on eyewitness accounts but what beats a document?

Ellsberg: I have been asked what I would do today in the digital era. I would still give them to The New York Times in the hopes that they would print the documents at length. Not many papers take the space to do that and that is why I chose The New York Times. But it was four months after I gave them to Neil Sheehan when they actually published them. During that time he didnt tell me that the Times was working on it. Nowadays I would not wait, I would give it to WikiLeaks or put it on the net myself.

Q: But Assange was focused on trying to protect his sources. This made it possible for more people to participate and that got on the nerves of the powers that be.

Ellsberg: None of his sources except Chelsea have been identified. Actually, Chelsea chose the wrong person to confide in, Adrian Lamo, who immediately informed on her. In terms of getting documents that are crucial, that is done every day. Very often the documents are not printed. The journalist just uses them to make sure that he or she has a valid story. A document is more likely to identify a source, as happened in the case of the Intercept, I am sorry to say.

Q: Finally, why is it important to protect whistleblowers? This is obviously meant to frighten off anyone with information.

Ellsberg: Without whistleblowers, our foreign policy would be almost entirely covert. We dont have as many whistleblowers as we need to have any kind of public sovereignty. Unfortunately, people are simply not willing to risk their job or their clearance or their freedom.

In the past, before me and before President Obama, there were very few prosecutions. Freedom of the press was always held to preclude holding journalists and editors accountable for informing the public. This could be a major change. With classified information, which is nearly everything in the foreign policy field, the writer cannot predict what will be embarrassing in the future, what will appear criminal, what will be considered poor judgment. So they classify everything and it stays classified.

Only a tiny percentage of classified information deserves any protection from the public. A great deal of it the public needs and deserves to have. Most leaks were actually authorized, even though they were against regulations, because they served the interest of some boss in the system. They are really given for the benefit of the agencys budget, or whatever. A small percentage are whistleblowing in the sense of revelation of wrongdoing or deception or criminality, information that the public should know, to avoid a war, for instance.

Q: What other information that the public has the right to see might still be bottled up?

Ellsberg: Eighteen years after it began, we still don't have the Pentagon Papers for Afghanistan. I am certain that they exist, within the CIA and the Pentagon and the White House, stacks of classified estimates that say stalemate is irrevocable in Afghanistan: We can stay there as long as we want but we will never serve American interests any more than now, which is essentially zero, unless it is to free the President of the charge that he has lost a war.

I think these estimates have been there from before the war but we have never seen them. How many people really want to get involved in a war with Russia and Assad in Syria? The estimates would reveal that, and we ought to have those.

It is now up to us to make sure that the First Amendment is preserved.

A war with North Korea or Iran would be catastrophic and I am sure there are many authoritative statements to that effect. But if John Bolton persuades Trump to get involved in such a war, it will happen. It will probably happen without much disclosure beforehand, but if people did risk their careers and their freedom, as Chelsea Manning and Ed Snowden have done, we would have a much better chance that a democratic public would prevent that war from taking place.

Without whistleblowers we would not have a democracy. And there have to be people to distribute work and publish it. Julian Assange has done that in a way in which other publishers have not been willing to. Journalists should close ranks here against this abuse of the President's authority, and against Britain and Ecuador for violating the norms of asylum and making practically every person who has achieved political asylum anywhere in the world less secure.

It is now up to us to make sure that the First Amendment is preserved.

Original post:
Daniel Ellsberg Speaks Out on the Arrest of Julian Assange ...

Bitcoin price | index, chart and news | WorldCoinIndex

About

Bitcoin is the worlds first virtual digital currency underpinned by a completely decentralized blockchain technology also known as the Distributed Ledger Technology (DLT). Bitcoin was first created in 2009 by an anonymous identity of Satoshi Nakamoto. Bitcoin allows for peer-to-peer transactions and is completely free of any third-party involvement like financial institutions or central banks. The Bitcoins blockchain network maintains a history of all the transactions made and facilitates instant funds transfer with minimal transaction fees required to cover the cost of network operation. The total supply of Bitcoin is fixed at 21 million coins and its smallest fractional unit is called as Satoshi. Each Satoshi is a hundred millionth of a Bitcoin which means 100,000,000 Santoshi = 1 BTC. Bitcoins are generated by a process known as mining which involves solving of complex mathematical algorithms. The miners involved in the mining process look after the Bitcoin network security and validate each transactions taking place on the network. Bitcoin can be exchanged with other digital currencies or fiat currencies. Bitcoin is used as a means of payment by over 100,000 vendors and merchants.

Bitcoin is the worlds first cryptocurrency which works on a completely decentralized network known as the blockchain. The blockchain network consists a link of blocks that are secured using cryptography and record all the transactions. Bitcoin was first presented to the world in 2009 by an anonymous identity known as Satoshi Nakamoto. As Bitcoin works on a decentralized network, it is completely free from the involvement of third-party financial institutions or central banks. The Bitcoin blockchain facilitates instant peer-to-peer transactions at minimum transactions fees required to maintain the network. The total number of Bitcoins is fixed at 21 million with its smallest unit being referred to as Satoshi. Each Satoshi represents a hundred millionth part of Bitcoin which means that 100,000,000 Santoshi = 1 BTC. Additional Bitcoins are generated by a process known as mining. Bitcoins are mined by professional miners solving complex computational equations. For each Bitcoin mined, the miners are rewarded with either more coins or transaction fees. The miners also validate all transactions on the Bitcoin network as well as look after the network security. Bitcoin can be exchanged with fiat currencies or other digital currencies. There are over 100,000 merchants and vendors accepting Bitcoin all over the world.

Follow this link:

Bitcoin price | index, chart and news | WorldCoinIndex

Bradley Manning court-martial starts: key points in the …

The court-martial of US Army Pfc. Bradley Manning for the largest leak of classified documents in US history will hinge on whether he aided the enemy and violated the 1917 Espionage Act charges that some legal analysts say the Obama administration could have trouble proving.

Manning, whose trial begins Monday, is accused of passing more than 700,000 government and military documents to the anti-secrecy website WikiLeaks. The polarizing figure, called a whistle-blowing hero by supporters and traitor by opponents, has been in detention since his arrest in Iraq in May 2010.

Manning faces more than 20 charges, including violating the Espionage Act and a military charge of aiding the enemy. If convicted, he could be sentenced to prison for life without parole.

In February during pretrial hearings, Manning admitted to 10 charges. He told military judge Army Col. Denise Lind he leaked the material to expose the American military's "blood lust" and disregard for human life in Iraq and Afghanistan. He said he did not believe the information would harm the United States and he wanted to start a debate on the role of the military and foreign policy.

The judge accepted his guilty plea to reduced charges for those charges, but prosecutors did not and moved forward with a court-martial.

Manning chose to have his court-martial heard by a judge instead of a jury. It is expected to run all summer. The case is the most high profile in a string of leak prosecutions by the Obama administration, which has come under criticism for its crackdown on leakers. The six prosecutions since Barack Obama took office is more than in all other presidencies combined.

The governments decision to proceed with the two most serious charges even after Manning admitted guilt took some legal analysts by surprise.

Elizabeth Goitein, co-director of the Brennan Center for Justices Liberty and National Security Program, told The Washington Post that Mannings leaks were reckless and a data dump. But he is not an enemy of the state and putting him behind bars for life is overreaching, she said.

First Amendment lawyer Floyd Abrams told The Wall Street Journal, His conduct in my view was neither lawful nor admirable, but the decision to persist in this prosecution seems unduly severe.

On the other side, prosecutors have said Manning must be held accountable: Private First Class Manning was a US analyst who we trained and trusted to use multiple intelligence systems ... and he used that training to defy our trust, said Maj. Ashden Fein, a prosecutor in the case, in one pretrial hearing.

Manning, he said, knowingly engaged in a six-month-long criminal enterprise of harvesting classified information to send to WikiLeaks, while knowing and understanding that enemies would have access to the information.

Some former prosecutors told The Washington Post it could be difficult to prove intent to harm the US.

A lot of times, you think something is damaging, said Baruch Weiss, a former federal prosecutor and an expert on the Espionage Act, and the reality proves to be otherwise.

But Ms. Goitein said that under a ruling by Lind, prosecutors will have to prove only that Manning had reason to believe that the documents disclosed could be used to harm the US or aid a foreign power. They need not prove that he intended to harm the US.

I suspect that the government can meet this burden on at least some of the counts, Goitein told the Post.

The material that WikiLeaks began publishing in 2010 documented complaints of Iraqi detainee abuses, contained a US tally of civilian deaths in Iraq, and described weak US support for the government of Tunisia a disclosure that Manning supporters said encouraged the popular uprising that ousted the Tunisian president in 2011 and helped trigger the Middle Eastern pro-democracy uprisings known as the Arab Spring.

In pretrial hearings, Manning also acknowledged sending WikiLeaks unclassified video of a 2007 US Apache helicopter attack that killed civilians, including a Reuters photographer. An internal military investigation concluded the troops reasonably mistook the camera equipment for weapons, while WikiLeaks dubbed the video "Collateral Murder."

The release of the cables and video embarrassed the US and its allies. The Obama administration has said it threatened valuable military and diplomatic sources and strained America's relations with other governments, but the specific amount of damage hasn't been publicly revealed and probably won't be during the trial.

Much of the evidence is classified, which means large portions of the trial are likely to be closed to reporters and the public. The judge tested alternatives to closing the courtroom, such as using code words and unclassified summaries, but she said it didn't work.

Get the Monitor Stories you care about delivered to your inbox.

About 20 Manning supporters demonstrated Monday morning in the rain outside the visitor gate at Fort Meade in Maryland, where the court-martial is taking place. They waved signs reading "free Bradley Manning" and "protect the truth," while chanting, "What do want? Free Bradley. When do we want it? Now."

Material from the Associated Press was used in this report.

See the original post:
Bradley Manning court-martial starts: key points in the ...

Intent To Harm At Center Of Bradley Manning’s Trial : NPR

Protesters march during a rally in support of Army Pfc. Bradley Manning outside Fort Meade, Md., on Saturday. Manning, who is scheduled to face a court-martial beginning Monday, is accused of sending hundreds of thousands of classified records to WikiLeaks while working as an intelligence analyst in Baghdad. Patrick Semansky/AP hide caption

Protesters march during a rally in support of Army Pfc. Bradley Manning outside Fort Meade, Md., on Saturday. Manning, who is scheduled to face a court-martial beginning Monday, is accused of sending hundreds of thousands of classified records to WikiLeaks while working as an intelligence analyst in Baghdad.

In the three years since his arrest, Bradley Manning, the slight Army private first class with close-cropped blond hair and thick military glasses, has become less of a character than a cause.

"Bradley Manning is a very polarizing figure. People either think that he is a hero or they think he's a traitor," says Elizabeth Goitein, who co-directs the liberty and national security program at the Brennan Center for Justice. "I actually think that he's somewhere in between."

Manning is accused of one of the biggest leaks of classified information in history. Prosecutors say he downloaded thousands of diplomatic cables and war field reports and sent them to the website WikiLeaks.

Goitein will follow Manning's trial, which begins Monday at a military base in Maryland, for what it says about the government's system for handling secret material.

"I think this case really does illustrate one of the harms of overclassification, which is that when people, day in and day out, who are working with classified information see that there are so many documents that are completely innocuous that are classified, they lose respect for the system," she says.

Manning's supporters say he deserves an award for blowing the whistle on war crimes, civilian casualties and torture. Instead, they say, he was abused by the U.S. military, which held him in solitary confinement for months in a brig in Virginia.

Defense lawyer David Coombs made rare public remarks at a rally last year.

"Brad's treatment at Quantico will forever be etched, I believe, in our nation's history as a disgraceful moment in time," he said.

Bradley Manning is a very polarizing figure. People either think that he is a hero or they think he's a traitor. I actually think that he's somewhere in between.

Elizabeth Goitein, Brennan Center for Justice

Manning has already agreed to plead guilty to 10 lesser criminal charges, but not the most serious offenses including violations of the Espionage Act and aiding the enemy, which carries a possible life sentence.

The government will need to prove Manning had reason to believe the leaks would hurt national security. But Manning is expected to argue that he had no intent to harm anyone.

The case is already one of the longest and most complex in military history, says Eugene Fidell, who teaches military law at Yale.

"The unanswered question is why this train has run so badly off the tracks," he says.

Fidell says the military justice system is supposed to prize speed and efficiency, but the drift in the Manning prosecution and other failings undermine public confidence.

"It's unfolding at a time that may be a tipping point for the military justice system generally," he says. "And what I'm talking about specifically is the widespread consternation and dismay about how the military justice system deals with an entirely unrelated type of criminality, which is sexual assault."

The judge in the Manning case has ruled that some witnesses will testify behind closed doors. The case already has a rap for excessive secrecy, since many court filings have been impossible to view for reporters and Manning's vocal supporters.

One of them is Michael Ratner of the Center for Constitutional Rights, who spoke about his frustration at that rally last year.

"It's hard to hear sometimes. You get no access to any of the court documents, none of the court orders, none of the motions filed nothing," he said. "And I'm a lawyer, and I sit in that courtroom and it seems like a completely secret proceeding to me."

The trial is expected to last 12 weeks.

Read more from the original source:
Intent To Harm At Center Of Bradley Manning's Trial : NPR

A timeline of Edward Snowden leaks – Business Insider

Handout/Getty Images

In June 2013, The Guardian reported the first leak based on top-secret documents that then 29-year-old Edward Snowden stole from the National Security Agency. At the time, Snowden worked as an intelligence contractor for Booz Allen Hamilton in Hawaii.

That leak would certainly not be the last. In the years since, journalists have released more than 7,000 top-secret documents that Snowden entrusted them with, which some believe is less than 1% of the entire archive.

Now, with the film "Snowden" premiering Friday, it's worth taking a look back at what secrets Snowden actually revealed. We've compiled every single leak that came out in the first year of the Snowden saga, though there were many more that came later.

Snowden downloaded up to 1.5 million files, according to national intelligence officials, before jetting from Hawaii to Hong Kong to meet with journalists Glenn Greenwald and Laura Poitras. After he handed off his treasure trove of documents, he flew from Hong Kong and later became stranded in Moscow. His future was far from certain, as the journalists he trusted started revealing his secrets.

Here is everything that Snowden's leaks revealed between 2013 and 2014:

With a top-secret court order, the NSA collected the telephone records from millions of Verizon customers. June 6, 2013

The Guardian The NSA accessed and collected data through back doors into US internet companies such as Google and Facebook with a program called Prism. June 7, 2013

An 18-page presidential memo shows Obama ordering intelligence officials to draw up a list of overseas targets for cyberattacks. June 7, 2013

Documents reveal the NSA's Boundless Informant program, which gives the agency near real-time ability to understand how much intelligence coverage there is on certain areas through use of a "heat map." June 8, 2013

The NSA was hacking computers in Hong Kong and mainland China, few of which were military systems. June 13, 2013

Britain's GCHQ (its intelligence agency) intercepted phone and internet communications of foreign politicians attending two G-20 meetings in London in 2009. June 16, 2013

Top-secret procedures show steps the NSA must take to target and collect data from "non-US persons" and how it must minimize data collected on US citizens. June 20, 2013

Britain's GCHQ taps fiber-optic cables to collect and store global email messages, Facebook posts, internet histories, and calls, and then shares the data with the NSA. June 21, 2013

The NSA has a program codenamed EvilOlive that collects and stores large quantities of Americans' internet metadata, which contains only certain information about online content. Email metadata, for example, reveals the sender and recipient addresses and time but not content or subject. June 27, 2013

Until 2011, the Obama administration permitted the NSA's continued collection of vast amounts of Americans' email and internet metadata under a Bush-era program called Stellar Wind. June 27, 2013

The US government bugged the offices of the European Union in New York, Washington, and Brussels. June 29, 2013

The US government spies on at least 38 foreign embassies and missions, using a variety of electronic surveillance methods. June 30, 2013

The NSA spies on millions of phone calls, emails, and text messages of ordinary German citizens. June 30, 2013

Using a program called Fairview, the NSA intercepts internet and phone-call data of Brazilian citizens. July 6, 2013

Monitoring stations set up in Australia and New Zealand help feed data back to NSA's XKeyscore program. July 6, 2013

The NSA conducts surveillance on citizens in a number of Latin American countries, including Venezuela, Colombia, Argentina, Panama, Ecuador, Peru, and others. The agency also sought information on oil, energy, and trade. July 9, 2013

The Washington Post publishes a new slide detailing NSA's "Upstream" program of collecting communications from tech companies through fiber-optic cables to then feed into its Prism database. July 10, 2013

Germany's Federal Intelligence Service, BND, helps contribute data to the NSA's XKeyscore program. July 20, 2013

The Guardian

NSA analysts, using the XKeyscore program, can search through enormous databases of emails, online chats, and browsing histories of targets. July 31, 2013

The US government paid Britain's GCHQ roughly $155 million over three years to gain access and influence over its spying programs. August 1, 2013

Seven of the world's leading telecommunications companies provide GCHQ with secret, unlimited access to their network of undersea cables. August 2, 2013

The NSA provided surveillance to US diplomats in order to give them the upper hand in negotiations at the UN Summit of the Americas. August 2, 2013

The NSA sifts through vast amounts of Americans' email and text communications going in and out of the country. August 8, 2013

Internal NSA document reveals an agency "loophole" that allows a secret backdoor for the agency to search its databases for US citizens' emails and phone calls without a warrant. August 9, 2013

NSA collection on Japan is reportedly maintained at the same priority as France and Germany. August 12, 2013

The NSA broke privacy rules thousands of times per year, according to an internal audit. August 15, 2013

NSA analysts revealed to have sometimes spied on love interests, with the practice common enough to have coined the term LOVEINT, or love intercepts. (It was unclear whether this report came from Snowden docs.) August 23, 2013

Britain runs a secret internet-monitoring station in the Middle East to intercept emails, phone calls, and web traffic, The Independent reports, citing Snowden documents. Snowden denies giving The Independent any documents, alleging the UK government leaked them in an attempt to discredit him. August 23, 2013

The top-secret US intelligence "black budget" is revealed for 2013, with 16 spy agencies having a budget of $52.6 billion. August 29, 2013

Martin Grandjean

Expanding upon data gleaned from the "black budget," the NSA is found to be paying hundreds of millions of dollars each year to US companies for access to their networks. August 29, 2013

The US carried out 231 offensive cyberattacks in 2011. August 30, 2013

The NSA hacked into Qatar-based media network Al Jazeera's internal communications system. August 31, 2013

The NSA spied on former Brazilian President Dilma Rousseff and Mexican President Enrique Pea Nieto (then a candidate). September 1, 2013

Using a "man in the middle" attack, NSA spied on Google, the French Ministry of Foreign Affairs, the Society for Worldwide Interbank Financial Telecommunications, and the Brazilian oil company Petrobras. September 2, 2013

A US intelligence "black budget" reveals Al Qaeda's effort to jam, hack, and/or shoot down US surveillance drones. September 3, 2013

A joint investigation by ProPublica, The New York Times, and The Guardian finds the NSA is winning its war against internet encryption with supercomputers, technical know-how, and court orders. September 5, 2013

The NSA has the ability to access user data for most major smartphones on the market, including Apple iPhones, BlackBerrys, and Google Android phones. September 7, 2013

The NSA shares raw intelligence data (with information about American citizens) to Israel with an information-sharing agreement. September 11, 2013

The NSA monitors banks and credit institutions for a comprehensive database that can track the global flow of money. September 16, 2013

Britain's GCHQ launched a cyberattack against Belgacom, a partly state-owned Belgian telecommunications company. September 20, 2013

The NSA spies on Indian diplomats and other officials in an effort to gain insight into the country's nuclear and space programs. September 23, 2013

The NSA's internal "wiki" website characterizes political and legal opposition to drone attacks as part of "propaganda campaigns" from America's "adversaries." September 25, 2013

Since 2010, the NSA has used metadata augmented with other data from public, commercial, and other sources to create sophisticated graphs that map Americans' social connections. September 28, 2013

The NSA stores a massive amount of internet metadata from internet users, regardless of whether they are being targeted, for up to one year in a database called Marina. September 30, 2013

The NSA and GCHQ worked together to compromise the anonymous web-browsing Tor network. October 4, 2013

Canada's signals intelligence agency, CSEC, spied on phone and computer networks of Brazil's Ministry of Mines and Energy and shared the information with the "Five Eyes" intelligence services of the US, Canada, Britain, Australia, and New Zealand. October 7, 2013

A reflection of Charlie Miller is pictured on his computer screen in his home-office in Wildwood, Missouri April 30, 2013. Miller is a security researcher at Twitter who previously worked for the National Security Agency (NSA). REUTERS/Sarah Conard

The NSA collected more than 250 million email contact lists from services such as Yahoo and Gmail. October 14, 2013

NSA surveillance was revealed to play a key role in targeting for overseas drone strikes. October 16, 2013

The NSA spied on French citizens, companies, and diplomats, and monitored communications at France's embassy in Washington and its UN office in New York. October 21, 2013

The NSA tapped the mobile phone of German Chancellor Angela Merkel. October 23, 2013

The NSA spied on Italian citizens, companies, and government officials. October 24, 2013

The NSA monitored the phone calls of 35 world leaders and encouraged other government agencies to share their "Rolodexes" of foreign politicians so it could monitor them. October 25, 2013

The NSA spied on Spanish leaders and citizens. October 25, 2013

The NSA stations surveillance teams at 80 locations around the world. October 27, 2013

A joint program between the NSA and Britain's GCHQ called Muscular infiltrates and copies data flowing out of Yahoo and Google's overseas data centers. One slide boasted of "SSL added and removed here!" with a smiley face. October 30, 2013

The NSA spied on the Vatican. (The Panorama website did not cite Snowden as the source.) October 30, 2013

Australia's intelligence service has surveillance teams stationed in Australian embassies around Asia and the Pacific. October 31, 2013

One document reveals tech companies play a key role in NSA intelligence reports and data collection. November 1, 2013

Britain's GCHQ and other European spy agencies work together to conduct mass surveillance. November 1, 2013

Strategic missions of the NSA are revealed, which include combatting terrorism and nuclear proliferation, as well as pursuing US diplomatic and economic advantage. November 2, 2013

Australia's Defense Signals Directorate and the NSA worked together to spy on Indonesia during a UN climate change conference in 2007. November 2, 2013

The NSA spied on OPEC. November 11, 2013

GCHQ monitored the booking systems of 350 high-end hotels with a program called Royal Concierge, which sniffed for booking confirmations sent to diplomatic email addresses that would be flagged for further surveillance. November 17, 2013

Australia's DSD spied on the cellphones of top Indonesian officials, including the president, first lady, and several cabinet ministers. November 18, 2013

The NSA spied on millions of cellphone calls in Norway in one 30-day period. November 19, 2013

The British government struck a secret deal with the NSA to share phone, internet, and email records of UK citizens. November 20, 2013

REUTERS/Jason Reed

A NSA strategy document reveals the agency's goal to acquire data from "anyone, anytime, anywhere" and expand its already broad legal powers. November 22, 2013

The NSA infected more than 50,000 computer networks worldwide with malware designed to steal sensitive information. November 23, 2013

The NSA gathers evidence of visits to pornographic websites as part of a plan to discredit Muslim jihadists. November 26, 2013

Working with Canadian intelligence, the NSA spied on foreign diplomats at the G-8 and G-20 summits in Toronto in 2010. November 28, 2013

The Netherlands' intelligence service gathers data on web-forum users and shares it with the NSA. November 30, 2013

A draft document reveals Australia offered to share information collected on ordinary Australian citizens with the NSA and other "Five Eyes" partners. December 1, 2013

The NSA siphons billions of foreign cellphone location records into its database. December 4, 2013

Widespread spying is revealed in Italy, with the NSA spying on ordinary Italians as well as diplomats and political leaders. December 5, 2013

Swedish intelligence was revealed to be spying on Russian leaders, then passing it on to the NSA. December 5, 2013

A document reveals the extent of the relationship between NSA and Canadian counterparts, which includes information-sharing and Canada allowing NSA analysts access to covert sites it sets up. December 9, 2013

Blizzard

Intelligence operatives with NSA and GCHQ infiltrate online video games such as "World of Warcraft" in an effort to catch and stop terrorist plots. December 9, 2013

Piggybacking on online "cookies" acquired by Google that advertisers use to track consumer preferences, the NSA is able to locate new targets for hacking. December 10, 2013

The NSA has the ability to decrypt the common A5/1 cellphone encryption cipher. December 13, 2013

The NSA secretly paid the computer security firm RSA $10 million to implement a "back door" into its encryption. December 20, 2013

A document reveals how Britain's GCHQ spied on Germany, Israel, the European Union, and several nongovernmental organizations. December 20, 2013

With a $79.7 million research program, the NSA is working on a quantum computer that would be able to crack most types of encryption. January 2, 2014

Using radio transmitters on tiny circuit boards or USB drives, the NSA can gain access to computers not connected to the internet. January 14, 2014

The NSA scoops "pretty much everything it can" in untargeted collection of foreign text messages for its Dishfire database. January 16, 2014

The NSA scoops up personal data mined from smartphone apps such as Angry Birds. January 27, 2014

A GCHQ program called Squeaky Dolphin monitors YouTube, Facebook, and Blogger for "broad real-time monitoring of online activity." January 27, 2014

The NSA spied on negotiators during the 2009 UN climate change conference in Copenhagen, Denmark. January 29, 2014

CSEC, Canada's national cryptologic agency, tested a pilot program with the NSA that captured metadata from users who had logged into free airport Wi-Fi. January 30, 2014

Britain's GCHQ waged war on hacker groups such as Anonymous and Lulzsec, mounting Distributed Denial-of-Service attacks and infiltrating their chat rooms. February 5, 2014

View original post here:
A timeline of Edward Snowden leaks - Business Insider

Joseph Gordon-Levitt says that playing Edward Snowden …

Joseph Gordon-Levitt has a dilemma. His career as an actor and founder of the online community HitRecord requires him to garner loads of attention, something he hates.

"I'm pretty allergic to the way that actors' personal lives are often turned into fodder for entertainment," he told Business Insider. "I don't like people focusing on my personal life, my family, et cetera. That just makes me uncomfortable."

One of the worst offenders of his privacy, he said, is social media. On Thursday, Gordon-Levitt shared his distaste for Instagram and Twitter at the TED conference in Vancouver, Canada. Later, he told his fear of these platforms began a few years back, when he was studying up on the National Security Agency.

Read more: Gordon-Levitt explains that odd Edward Snowden voice he does in his new biopic

In 2016, Gordon-Levitt starred in a biographical thriller about Edward Snowden, the American whistleblower who leaked classified information showing that the NSA had been spying on everyday citizens.

To prepare for the role, Gordon-Levitt said he had to learn "quite a bit" about the US government's policy of mass surveillance, which some have seen as violating the Constitution.

"The more I looked into it, I was like, 'Oh man, what Google and Facebook are doing makes what the NSA is doing look like nothing,'" he told us. "That was actually a lot of what what started me down this line of thinking [about social media]."

In his TED talk, the actor described being "addicted" to Instagram, so much so that he began to compare his following to that of other actors. "I see that their number [of followers] is higher than mine and I feel terrible about myself," he said in his talk.

It's a problem he's continuing to sort through and he believes most of us, including Snowden, face the same conundrum.

After the NSA's mass-surveillance program was revealed in 2013, people criticized Snowden's actions as self-serving. In a piece entitled "Edward Snowden Is No Hero," the writer Jeffrey Toobin said the leaking of classified information "speaks more to his ego than his conscience."

Gordon-Levitt described Snowden as a human being who's "not immune" to the basic desire for attention.

"I've spent some time with Ed and I really believe that he was acting in what he sincerely thought was the best interest of the country," the actor told us. "Now, does every soldier have some part of them that's seeking glory? Sure."

The actor is less willing to extend the same grace to tech companies, which have profited from collecting users' personal data.

"It's not the technology; it's the business model," he told Business Insider. "You don't have to monetize a worldwide social-media platform by spying on everybody, manipulating their perspective by only showing them one particular view of the world."

In fact, while Gordon-Levitt acknowledged in his TED talk that he's "a complete hypocrite" for getting hooked on social media, he also said that Twitter, Facebook, and Instagram are designed to prey on his insecurity.

"I've thought my whole life about why I am getting so much attention, and do I deserve that?" he said. "It seems that a lot of today's big social-media platforms have sort of taken advantage of this dynamic and used it to make a lot of money."

More here:
Joseph Gordon-Levitt says that playing Edward Snowden ...

Edward Snowden: Without Russian Asylum, I Would Be in …

In the summer of 2013, a 29-year-old NSA analyst leaked thousands of documents to journalists at The Guardian and The Washington Post, launching a series of investigative articles that would change the way the world sees American spies forever.

Six years later, the leaker, Edward Snowden, is living under the protection of Vladimir Putins government in Russia. That, Snowden said as he sat down with Motherboard for our latest episode of the CYBER podcast, was a bit unexpected.

Growing up in the intelligence community, Russia is just this terrifying placeits Mordor, Snowden said, explaining that while he wasnt surprised to end up overseas, he did not expect to end up where he is.

I expected life was going to be a lot harder, Snowden said, laughing a bit nervously. I expected to end up in Guantanamo.

And in some ways, he added, life has actually become quite normal.

Snowden said that hes frustrated that people talk about him as if hes in hiding, but hes just sitting in his apartment in Moscow. The former NSA analyst reflected that his original plan was to flee to Ecuador and seek asylum there. And if John Kerry, the then Secretary of State, had not cancelled his passport when he got to Russia, I would be in Guantanamo right now or dead, given that Ecuador gave Assange up.

Got a tip? You can contact this reporter securely on Signal at +1 917 257 1382, OTR chat at lorenzofb@jabber.ccc.de, or email lorenzofb@motherboard.tv

The leaker also reflected on his current role as a media figure, admitting that, at this point, what he does and says is not that relevant anymore.

I dont matter, Snowden said, arguing that at this point he has no control over what he leaked, and no real impact on what happens to those documents. What happens to me doesnt really matter.

Listen to CYBER, Motherboards new weekly podcast about hacking and cybersecurity.

Follow this link:
Edward Snowden: Without Russian Asylum, I Would Be in ...

Edward Snowden: Assanges Arrest and the Mueller Report Show …

When Edward Snowden was stranded in a Russian airport, before the government of Vladimir Putin granted him asylum, he turned to WikiLeaks and their lawyers for help. Since then, Snowden has inevitably been linked to WikiLeaks and its founder Julian Assange.

Naturally, when Snowden sat down with CYBER host Ben Makuch, we asked him what he thought about Assanges case. For Snowden, the story about Assanges arrest should focus more on Ecuadors motivations, and the fact that Assange is being held to a different standard than president Donald Trump. The former NSA analyst mentioned the fact that Ecuador got $4.2 billion in funds from the International Monetary Fund in early March as a sign the country was getting closer to the West, and in turn more inclined to give up Assange.

Journalists who have been covering the story havent really been looking at that, because Julian as an individual is such a tragically flawed figure, Snowden said.

Snowden also criticized people who changed their minds about Assange after the 2016 election.

A lot of Americans now hate Julian, he said. Even though the sort of people who are on the center to the left part of the spectrum had been singing his praises during the Bush administration, now theyre on the other side because of his unfortunate political choices in the 2016 elections.

Yet, Snowden defended Assanges journalism work in the lead up to the 2016 elections, arguing the leaked emails, which major media companies covered, showed that the Democratic Party tried to favor Hillary Clinton over Bernie Sanders. That, Snowden said, had profound public interest.

As Motherboard reported last week, the Department of Justice says that it isnt positive that Assange helped whistleblower Chelsea Manning crack a password hash in order to obtain cables related to the Iraq War, but that hes being charged with that crime anyway. Snowden juxtaposed his treatment with that of Trumps treatment in Robert Muellers report.

Mueller says it didnt actually result in obstruction because the people that Trump ordered to do this simply ignored him, Snowden said. The DOJs defense of not charging Trump is look he tried to commit a crime but he failed to actually do this. And at the same time theyre charging Julian Assange under precisely the opposite theory. Where they say Look, Julian may not have actually cracked a passwordwe dont have any evidence that he did, were not even going to try to prove that he did, were going to say that the agreement to try is enough.

Got a tip? You can contact this reporter securely on Signal at +1 917 257 1382, OTR chat at lorenzofb@jabber.ccc.de, or email lorenzofb@motherboard.tv

So this is a real question of a two-tiered system of justice. Where if youre the president and you try to commit a crime, you can skate, he added. Why is it that journalists are being held to a higher standard of behavior than the president of the United States?

Finally, Snowden attacked the Department of Justice for charging Assange with conspiracy to crack a password, a pretty low level infraction relative to the things Assange has been accused of in his life.

Listen to CYBER, Motherboards new weekly podcast about hacking and cybersecurity

Originally posted here:
Edward Snowden: Assanges Arrest and the Mueller Report Show ...

Edward Snowden Designs Phone Case That Shows When It Is Being …

Edward Snowden, the worlds most wanted geek, has helped develop plans for a smartphone case that could stop people becoming victims of digital surveillance.

In an online paper called Against The Law: Countering Lawful Abuses of Digital Surveillance, Snowden and Andrew Bunnie Huang outline plans to create a smartphone case that is able to display a notification and spark an alarm when the phones cellular, Wi-Fi, Bluetooth, or other radio connections are sending and receiving data. It will also feature a kill switch that can forcibly disconnectpower to the phone if a signal is seen to be transmitting information without the users permission or knowledge. The case also obscures the rear camera lens to prevent the recording of videos.

The design is said to be able to work for any type of smartphone, although their paper was based around an iPhone 6. They have also made the plans for the device an open source so anyone can create it.

Snowden and Bunnie concluded the paper by saying if their prototypes are a success they will look to the Freedom of the Press Foundation to potentially fund production of them.

The inside of the modified iPhone that Edward Snowden and Andrew Huang toyed around. Image credit:Edward Snowden and Andrew Huang

It is primarily intended toprotect journalists, particularly those reporting from war zones or corresponding under regimes with strict censorship.For the many people working and living in these high-risk situations, this could be life-saving.In 2012, Sunday Times war correspondent Marie Colvin and French photojournalist Remi Ochli were killed after Syrian government forces were allegedly able to trace their position from their phones.

Speaking to WIRED, Snowden said that he has not carried a smartphone for three years, saying "wireless devices are kind of like kryptonite to me. In 2013, he exposed the extent of the NSAs global surveillance programs. The former-NSA employee is still in temporary asylum in Moscow following the United States filing a criminal complaint against him under the Espionage Act. Although still under threat from the US government, Snowden now leads the Freedom of the Press Foundation, a non-profit organization that hopes to raise public awareness about surveillance operations of governments and corporations, as well as offering support for journalists exposing governments.

Read the original post:
Edward Snowden Designs Phone Case That Shows When It Is Being ...

After Edward Snowden Fled U.S., Asylum Seekers in Hong Kong …

HONG KONG When the 42-year-old Filipino woman opened the door of her tiny Hong Kong apartment three years ago, two lawyers stood outside with a man she had never seen before. They explained that he needed a place to hide, and they introduced him as Edward Snowden.

The first time I see him, I dont know who he is, the woman, Vanessa Mae Bondalian Rodel, recalled in an interview. I dont have any idea.

Ms. Rodel is one of at least four residents of Hong Kong who took in Mr. Snowden, the former National Security Agency contractor, when he fled the United States in June 2013. Only now have they decided to speak about the experience, revealing a new chapter in the odyssey that riveted the world after Mr. Snowden disclosed that the N.S.A. had been monitoring the calls, emails and web activity of millions of Americans and others.

At the time, governments and news outlets were scrambling to find the source of the leaks, which were published in The Guardian and The Washington Post. In an interview recorded in a hotel room, Mr. Snowden identified himself and revealed that he was in Hong Kong. Then he went into hiding. About two weeks later he turned up in Moscow.

It was never clear where Mr. Snowden was holed up during those critical days after leaving his room at the five-star Mira Hotel, when the United States was demanding his return. As it turns out, he was staying with Ms. Rodel and others like her men and women seeking political asylum in Hong Kong who live in cramped, substandard apartment blocks in some of the citys poorest districts.

They were all clients of one of Mr. Snowdens Hong Kong lawyers, Robert Tibbo, who arranged for him to stay with them.

Ms. Rodel said Mr. Snowden slept in her bedroom while she and her 1-year-old daughter moved into their apartments only other room. Not knowing what he would eat, she bought him an Egg McMuffin and an iced tea from McDonalds.

My first impression of his face was that he was scared, very worried, she recalled.

Ms. Rodel said her unexpected guest was using his computer all day, all night. She said that she did not have internet service but that Mr. Tibbo provided him with mobile access.

On Mr. Snowdens second day there, he asked Ms. Rodel whether she could buy him a copy of The South China Morning Post, the citys main English-language newspaper, she said. When she picked up the paper, she saw his picture on the front page.

Oh my God, unbelievable, she recalled saying to herself. The most wanted man in the world is in my house.

Jonathan Man, another of Mr. Snowdens lawyers in Hong Kong, said that he had initially considered hiding him in a warehouse but that he and Mr. Tibbo quickly dismissed the idea. Instead, after taking him to the United Nations office that handles refugee claims in Hong Kong and filing an application, they brought him to the apartment of a client seeking asylum.

It was clear that if Mr. Snowden was placed with a refugee family, this was the last place the government and the majority of Hong Kong society would expect him to be, Mr. Tibbo said. Nobody would look for him there. Even if they caught a glimpse of him, it was highly unlikely that they would recognize him.

There are about 11,000 registered asylum seekers living in Hong Kong, mostly from South and Southeast Asia. They generally cannot work legally and receive monthly stipends that rarely cover living costs.

Mr. Tibbo said he turned to these clients for help in part because he expected them to understand Mr. Snowdens plight. These were people who went through the same process when they were fleeing other countries, he said. They had to rely on other people for refuge, safety, comfort and support.

He noted that Mr. Snowden was not wanted by the Hong Kong police at the time and that he had advised his clients to cooperate with the police if they showed up. He said his clients had decided to come forward in the hope that the publicity would put pressure on the Hong Kong authorities to expedite their applications for refugee status and resettlement.

Ms. Rodel, who declined to say why she could not return to the Philippines, has been waiting nearly six years for a final decision on her application.

After a few days with Ms. Rodel and her daughter, Mr. Snowden spent a night with Ajith Pushpakumara, 44, who said he fled to Hong Kong after being chained to a wall and tortured for deserting the army in his native Sri Lanka.

Mr. Pushpakumara said he had listened to online radio broadcasts about Mr. Snowden and was surprised to suddenly find him in the dingy apartment that he shared with several men. He realized Mr. Snowden was in the same situation he was, hiding in a small room. I was worried about him, he said.

Supun Thilina Kellapatha, his wife and their toddler also sheltered Mr. Snowden, putting him up for about three days in their 250-square-foot apartment.

Mr. Kellapatha, 32, who said he sought protection in Hong Kong after being tortured in Sri Lanka, described their guest as a tired man who was unfailingly polite.

He said, You are a good man, when he arrived at the apartment, Mr. Kellapatha recalled. But I feel he is better than me, because he respected me.

Mr. Kellapatha and his wife, Nadeeka Dilrukshi Nonis, said they were not worried about hosting Mr. Snowden. I dont think I take the risk, he said. He is the one who take the big risk.

When Mr. Snowden left, he left the couple $200 under a pillow, which they said they used to buy necessities for their daughter. Sometimes I tell Supun, maybe he forgot us, Ms. Nonis said. I want to tell him: Edward, how are you? We will never forget you.

After fleeing Hong Kong, Mr. Snowden was granted asylum in Russia. He has been unable to leave that country because he is wanted on espionage charges in the United States, but he routinely speaks to the press and at international conferences on government surveillance and civil liberties via video conference. A feature film about his life is set to open later this month.

Original post:
After Edward Snowden Fled U.S., Asylum Seekers in Hong Kong ...