Inside Julian Assange’s Alleged Plot to Steal The Fifth …

The time: January 2011. The location: Ellingham Hall, an elegant mansion northeast of London. The scene: Julian Assange sits in front of a fire, entertaining a visitor from America. The conversation is light at first, but as it turns serious, they stop talking and start passing messages jotted on pages torn from a notepad, tossing each in the fire after reading.

Assange is worried about something. Its not his court battle to avoid extradition to Sweden. Its not WikiLeaks continuing rollout of 250,000 State Department diplomatic cables. Its not even the fate of his source, Bradley Manning (now Chelsea), locked in a Marine brig in Virginia under oppressive conditions. At this moment, Assanges preoccupation is a tell-all book being penned by his former second-in-command, Daniel Domscheit-Berg, titled WikiLeaks: My Time with Julian Assange at the World's Most Dangerous Website one of the two books that form the basis of the new movie The Fifth Estate.

The visitor was David House, a Boston computer scientist, a friend of Mannings and a co-founder of the Private Manning Support Network. On this, his first visit with Assange, he was hoping to open a channel of communication between WikiLeaks and Manning supporters, and to try to secure a significant role for himself inside the secret-spilling organization.

Instead, he found Assange was mostly interested in talking about Domscheit-Bergs betrayal of WikiLeaks.

He had started to talk more and more about Daniel during those few days, telling anecdotes, and it was clear that it was bothering him, House says. In front of the fireplace, Assange finally got to his point, House says. Assange wanted House to protect the future of WikiLeaks by obtaining access to a corpus of lies, or something like that, House says.

In a follow-up conversation later, Assange got more explicit, House says.

He wanted me, and in fact told me, to get to Berlin ... and obtain access to Daniel Domscheit-Bergs apartment and to get access to the manuscript of the book that was being published, and to take this manuscript with me back to the London so he could see it before it came out, says House, publicly discussing his experience for the first time.

What followed, by Houses account, was one of the more bizarre sideshows in the WikiLeaks drama: a feigned attempt by House to steal the manuscript and satisfy Assange of his loyalty.

Assanges preoccupation with his public portrayal is not in doubt. In the week leading up to yesterdays U.S. opening of The Fifth Estate, the WikiLeaks Twitter feed became a steady stream of negative reviews of the film. In September, Assange even posted a leaked copy of the screenplay, with pages of scathing commentary. A similar campaign accompanied last springs unauthorized documentary on WikiLeaks, We Steal Secrets. But the allegation that Assange solicited a burglary is something new.

You know, Julian referred to me once as his adversary, so it might make sense in his little world of games to do something like that, Domscheit-Berg says. Its a new low.

Reached by phone Friday, WikiLeaks representative Kristinn Hrafnsson said he would ask Assange about the allegation, but by press time WikiLeaks had no response. (Update: WikiLeaks denies the plot).

The allegations might seem preposterous, except that they come from one of the most important supporters of WikiLeaks biggest source: Manning.

David House met Manning casually in January 2010 at a party at Boston Universitys hacker space. After Manning was arrested four months later as the WikiLeaks leaker, House began visiting Manning in jail and publicly campaigning for the Army privates release; he co-founded the Private Manning Support Network, which ultimately raised $1.4 million for Mannings defense, spoke at rallies around the country, made numerous media appearances, and was first to alert the press to Mannings harsh confinement conditions at Quantico.

He did really great media, especially while Manning was being subjected to the torture-like conditions at Quantico, says Jeff Patterson of the Private Manning Support Network. Having someone in front of the TV camera saying, I personally saw this man and what they were doing to him was invaluable.

Houses connections to Manning made him a target himself, and in November 2010, U.S. Customs officials detained him at the airport as he returned from a vacation to Mexico, seizing his computer, cell phone and digital camera (With the ACLUs help, House later sued the government and won a settlement last May that forced the U.S. to delete the files it had taken from his computer.)

After the airport incident, House began privately pressing WikiLeaks for a face-to-face meeting with Assange, arguing that WikiLeaks and Manning supporters should coordinate their efforts. Houses insistence on a personal meeting made at least one WikiLeaks activist wary, according to internal chat logs previously leaked to WIRED, and Assange was advised against the meeting.

My personal opinion is somethings fishy about this. All of a sudden when you are being hunted he wants to meet with you? wrote WikiLeaks activist Sigurdur Thordarson, who, ironically, would later become an FBI informant. What do you think?

I think he's legit, Assange replied. Too weird not to be.

House finally made it to Ellingham Hall in early January 2011 while on a fundraising trip to Europe for Mannings defense. He arrived from Berlin, where hed attended the annual Chaos Communications Congress, a hacker gathering. House hoped to ingratiate himself with Assange and shape WikiLeaks from the inside. At the time I really believed that they were fighting for human rights, he says. I wanted a seat at the table.

Assange, though, had his own objective, House says. He was dismayed by Assanges proposal, but he agreed to try and steal Domscheit-Bergs manuscript, and together he and Assange picked out a flight from London to Berlin.

House says he had no intention of going through with the caper, but he wanted to make it look to Assange as though hed made a serious effort. That meant hed have to visit Domscheit-Berg and act suspicious. Its important to go through the motions in a case like this.

He made it to Berlin the same day and began looking for the German hacktivist. Hed met Domscheit-Berg briefly at the Chaos Communications Conference, but he hadnt exchanged contact information. On this trip he took a train and then walked to the Berlin hacker space called the C-Base and asked around. A hacker gave him directions to the Chaos Computer Club, where he finally met up with someone who knew Domscheit-Berg personally. That person took House to Domscheit-Bergs apartment.

I went in and had a lovely dinner with him and his wife, says House, who says he's writing a book about his experiences. And the apartment was quite nice.

Without initially sharing Houses story, I asked Domscheit-Berg if hed ever met David House. He volunteered that House unexpectedly dropped by the apartment he shared with his wife, Anke, in January 2011.

Someone from Berlin just dumped him at our apartment without asking me about it in the first place which resulted in a little awkward visit of half an hour or an hour, he says. We had tea, and he was asking me a lot of questions about things that are way beyond what I speak about, and some strange stuff about my apartment and living situation, if I had a dog or pets, and stuff like that.

Slightly suspicious questions, certainly, but on the other hand also way too obvious to be taken as an attempt at anything, he says. It certainly was one of the more bizarre encounters.

After I told Domscheit-Berg about Houses claims, he elaborated. While Domscheit-Berg was in the bathroom, House took the opportunity to start showing himself around. He got up and started walking around as if he wanted to see the apartment, he says. Anke went after him and stopped him in the living room. Which is where I found them.

House never was alone, he adds. And on top of that, the manuscript for the book never was in this apartment in the first place.

House says he needed to be able to describe the apartment to Assange upon his return to Ellingham Hall. That meeting did not go well.

Hey man, I tried, but I couldnt get it, House allegedly told Assange. It wasnt going to happen.

Assange simmered with rage, House says. He got pretty red in the face and started to talk pretty quickly and then left the room, House says. He came back later and started yelling about the book.

Despite Houses utter failure as a thief, Assange agreed to pay him for press strategy advice and other work for WikiLeaks, House says. He made House sign a non-disclosure agreement (an agreement he has obviously now violated), then handed over $5,000 in cash and gave House an encrypted cell phone so they could stay in touch. House had the phone nearby when he later pleaded the fifth in front of the governments WikiLeaks grand jury in Alexandria, Virginia.

House continued his advocacy for Manning as well, but his visibility lessened when, in March 2011, Manning abruptly took House off the jail visitors list. In November 2012, Manning spoke of House during court testimony, complaining that House had been making media appearances over Mannings objections.

I just wanted somebody to talk to, you know, a friend, Manning said, not somebody to take advantage of that, or use it as a soap box.

House severed his relationship with the Support Network after the rebuke and later unloaded a two-day diatribe on Twitter, airing a list of grievances about Assange and the activist community. House took it a little more personally than he needed to, Patterson says. He was dropped at the same time that I was dropped, but I kept working for the Support Network.

House says he continued to visit Assange and perform various work for WikiLeaks until October 2011, but was never again asked to commit a burglary.

Continued here:
Inside Julian Assange's Alleged Plot to Steal The Fifth ...

Is Julian Assange Jesus Christ returned? | Yahoo Answers

The Global Financial Crises started approximately 3 1/2 years ago, during that time we've had Oil spills that look like red like blood. RED Toxic waste resoirvers spilling down river, flooding communities and emptying elsewhere, earthquakes all over the world causing devestation. Now, exactly 3 1/2 years into the GFC, who shows up on the spotlight, spouting truth and revelations about our currupt world. Someone who is gaining mass amounts of supportors from all over the globe almost overnight? Julian Assange.

http://www.facebook.com/wikileaks http://twitter.com/wikileaks

Rejected by Jews (Psalm 118:22) - Wikileak's cables not being covered by Israeli, Arab, Russian media. Presented with gifts (Psalm 72:10) - Presented with leaked information by various sources. Preached good news (Isaiah 61:1) - Reference to Wikileaks Cleansed the Temple (Malachi 3:1) - You could say J.A. and Wikileaks mission statement is to fight curruption globaly. Brought light to Zabulon & Nephthalm, Galilee of the Gentiles (Isaiah 9:1-2) -Sheds light on issues to the entire world via the internet and news. Accused by false witnesses (Psalm 35:11) - Interpol has issued a warrant for Assange's arrest for a mysterious charge of "Rape" & "Molestation" Silent to accusations (Isaiah 53:7) - Assange has remained silent to the accusations.

Now lets look at the 8-fold description of Chirst by John in Revelations.

11 Then I saw

One Like a Son of Man

12 I turned around to see the voice that was speaking to me. And when I turned I saw seven golden lampstands, 13 and among the lampstands was someone "like a son of man," dressed in a robe reaching down to his feet and with a golden sash around his chest. 14 His head and hair were white like wool, as white as snow, and his eyes were like blazing fire. 15 His feet were like bronze glowing in a furnace, and his voice was like the sound of rushing waters. 16 In his right hand he held seven stars, and out of his mouth came a sharp double-edged sword. His face was like the sun shining in all its brilliance.

Julian Assange has uniquely white hair for his age, wooly even, especially if you like at his pictures when he had longer hair. Even when he dyed it, he still kept a white zig-zag like lightning.

The robe possibly a reference to modern clothing. J.A. has had many pictures taken of him with many different outfits.

His Voice like rushing waters. J.A. has a unique, slightltly croggy sounding voice, I can honestly describe it as rushing water before anything else.

Out of his mouth came a sharp double-edge sword.

Julian Assange: "We all only live once. So we are obligated to make good use of the time that we have and to do something that is meaningful and satisfying. This is something that I find meaningful and satisfying. That is my temperament. I enjoy creating systems on a grand scale, and I enjoy helping people who are vulnerable. And I enjoy crushing bastards. So it is enjoyable work." He thrives on intellectual battle.

In reference to the eyes, face. Possibly an image of Julian using a computer. The "glow" of the computer screen on his face and eyes. He is well known as an internet "Hacktivist". The seven stars in his right hand is a mystery to me. Possibly the use of a computer mouse. Any answers to the descriptions I am unsure on are welcome, let me know what you think.

Sorry if this is poorly written I am in a hurry to get to work and this is my first post on YA.

Read more:
Is Julian Assange Jesus Christ returned? | Yahoo Answers

Why Edward Snowden Likes Zcash Despite the Controversial …

Unlike many fans of cryptocurrency, Edward Snowden has no problem with the Zcash founders reward. The former CIA employee-turned whistle-blower Tweeted his support for the anonymity-focused digital asset earlier today.

For Snowden, the founders reward incentivises and funds the team behind the privacy coin to address issues with the project, such as that identified and patched by them recently. However, other cryptocurrency community members pointed out that teams working on coins that lack the controversial founders reward were just as adept at patching issues in their own code bases.

Controversial US government secrets discloser Edward Snowden is a fan of the privacy-focused cryptocurrencyZcash. The former CIA employee does not even mind the much-debated founders reward included in every Zcash block mined. For many in the digital currency community, this founders reward is contrary to the spirit of cryptocurrency and decentralisation generally.

However, Snowden claims that such a reward is important to attract the best minds to work on the Zcash project. For him, such a consistent payment of the developers allows them to discover issues and patch them before they can be exploited by opportunistic parties.

One such vulnerability was discovered 11 months ago by Zcash developers. In a report posted to the Zcash blogtoday, the flaw in the code is described along with the method used to patch it.

The counterfeiting vulnerability, as the team refer to it as, was first discovered on March 1, 2018. The decision was made to keep the discovery secret to avoid the risk of attackers exploiting the flaw in the code. It has since been rectified without Zcash users needing to do anything to protect their funds.

According to the blog post:

The flaw allows an attacker to create counterfeit shielded value in any system that depends on parameters which are generated as described by the paper.

Zcash developers are confident that no such attacks were made on the network owing to the sophistication of the knowledge required to identify the flaw in the first place, along with the lack of a footprint highlighting that the vulnerability had been exploited.

For Snowden, the Zcash founders reward, which is 20% of each block reward earned by the networks miners, financed the addressing of the vulnerability:

In the above Tweet, Snowden compares Zcash to different cryptocurrency projects that do not offer such a founders reward. He states that other coins have only discovered bugs in the code after they were exploited, costing the projects users money.

However, as members of the crypto community highlighted, other projects have been just as adept at identifying vulnerabilities in the code without such a founders reward. Both Monero and Bitcoin were mentioned as examples of coins that do not rely on a centralised group of developers being paid out of a single purse for their work but were still driven to patch flaws in code as quickly as humanly possible. In fact, a recent Bitcoin flaw took just days to rectify following its discovery (admittedly by a Bitcoin Cash developer).

Interestingly, the post on the Zcash blog highlights how the vulnerability has existed in the code for years now. Going off Snowdens logic, perhaps it would have been identified and patched even quicker if the controversial founders reward was even higher than 20%.

Related Reading: eToro Adds ZCash

Read the original post:
Why Edward Snowden Likes Zcash Despite the Controversial ...

Opinion | Edward Snowden: The World Says No to Surveillance …

Never have I been so grateful to have been so wrong.

Two years on, the difference is profound. In a single month, the N.S.A.s invasive call-tracking program was declared unlawful by the courts and disowned by Congress. After a White House-appointed oversight board investigation found that this program had not stopped a single terrorist attack, even the president who once defended its propriety and criticized its disclosure has now ordered it terminated.

This is the power of an informed public.

Ending the mass surveillance of private phone calls under the Patriot Act is a historic victory for the rights of every citizen, but it is only the latest product of a change in global awareness. Since 2013, institutions across Europe have ruled similar laws and operations illegal and imposed new restrictions on future activities. The United Nations declared mass surveillance an unambiguous violation of human rights. In Latin America, the efforts of citizens in Brazil led to the Marco Civil, an Internet Bill of Rights. Recognizing the critical role of informed citizens in correcting the excesses of government, the Council of Europe called for new laws to protect whistle-blowers.

Beyond the frontiers of law, progress has come even more quickly. Technologists have worked tirelessly to re-engineer the security of the devices that surround us, along with the language of the Internet itself. Secret flaws in critical infrastructure that had been exploited by governments to facilitate mass surveillance have been detected and corrected. Basic technical safeguards such as encryption once considered esoteric and unnecessary are now enabled by default in the products of pioneering companies like Apple, ensuring that even if your phone is stolen, your private life remains private. Such structural technological changes can ensure access to basic privacies beyond borders, insulating ordinary citizens from the arbitrary passage of anti-privacy laws, such as those now descending upon Russia.

Though we have come a long way, the right to privacy the foundation of the freedoms enshrined in the United States Bill of Rights remains under threat. Some of the worlds most popular online services have been enlisted as partners in the N.S.A.s mass surveillance programs, and technology companies are being pressured by governments around the world to work against their customers rather than for them. Billions of cellphone location records are still being intercepted without regard for the guilt or innocence of those affected. We have learned that our government intentionally weakens the fundamental security of the Internet with back doors that transform private lives into open books. Metadata revealing the personal associations and interests of ordinary Internet users is still being intercepted and monitored on a scale unprecedented in history: As you read this online, the United States government makes a note.

Spymasters in Australia, Canada and France have exploited recent tragedies to seek intrusive new powers despite evidence such programs would not have prevented attacks. Prime Minister David Cameron of Britain recently mused, Do we want to allow a means of communication between people which we cannot read? He soon found his answer, proclaiming that for too long, we have been a passively tolerant society, saying to our citizens: As long as you obey the law, we will leave you alone.

At the turning of the millennium, few imagined that citizens of developed democracies would soon be required to defend the concept of an open society against their own leaders.

Link:
Opinion | Edward Snowden: The World Says No to Surveillance ...

Edward Snowdens former boss speaks out GeekWire

Edward Snowden. (Photo: Praxis Films)

The cybersecurity expert who hired Edward Snowden for his last jobis layingout his lessons learned but admits it would have been hard to stop the man whospilled some of the National Security Agencys most closely held secrets.

Knowing what I knew at the time, l would have hired him again, Steven Bay,a former cyberintelligence analyst for Booz Allen Hamilton, said today in Seattle at the IEEE Computer Societys Rock Stars of Cybersecurity conference.

Knowing what I know now, obviously, I wouldnt, he added.

Bay said todays talk marked the first time he discussed his side of the Snowden story in a public forum.

After the story broke, Baylost his NSA access and had to switchto a different position at Booz Allen Hamilton, which was Snowdens employer for thosecrucial few monthsin the spring of 2013. Baysaid he couldnttalk openly about the case until he left Booz Allen this June. Now hes the chief information security officer for NuVasive, a medical devices company in San Diego.

Snowdens timeline is well-known by now: After years of working atthe CIA, and as a Dell contractor for the NSA, he applied for another NSA contract job in Hawaii with Booz Allen. Bay said heand his offices technical directorinterviewed Snowden at a Wendys restaurant near the agencys facilities in Kunia.

He was a highly technical person, Bay recalled. He was very passionate about internet anonymization, as hes come out and talked about. He claimed to have run two Tor nodes out of his home and he also claimed to have known a zero day vulnerability within Tor.

Snowden knew his stuff so thoroughly that Bay said thetechnical directortook over the interview and basically nerded out for an hour.

Snowden got the job, and started working as an intelligence analyst at the NSAs facility in Hawaii at the beginning of April in 2013.

Bay said two red flags came up in the weeks that followed. First, Snowden began asking about a highly classified mass-surveillance program thats now known to the public as PRISM. Bay had access to the PRISM data, but Snowden didnt.

Bay didnt give Snowden access to PRISM, but he did provide him with somedatathat in retrospect he shouldnt have. I shared a little bit too much information, Bay acknowledged today. He said thats what caused him to lose NSA access after the Snowden story broke.

The second red flag popped up when Snowden started coming in late to work, only a few weeks after starting the job. When Bay asked about it, Snowden told him he was suffering from epilepsy.

In response, Bay played the role of a supportive manager. Then, in mid-May, Snowden told him the epilepsy was getting worse and that hed have to go in for tests on the following Monday and Tuesday. If the results werent good, he might have to be out even longer.

Bay said he suggested that Snowden apply for short-term disability, but Snowden told himhe didnt want to bother with the paperwork. Which made no sense to me but to each his own. If he wanted to take leave without pay, take leave without pay, Bay said.

In reality, Snowden wasnt suffering from epilepsy. Unbeknownst to Bay, Snowden took off forHong Kong on that Monday, May 20, carrying gigabytes worth of NSA data with him.

Bay said he received an email from Snowden the next day, telling him the test results were bad and that hed have to take more time offwork. In a reply email, Bay reminded Snowdento check in with human resources about filing for disability.

Wednesday night, the next night, he emails me back, and says, OK, sounds good, Ill get in touch with HR. And that was the last I ever heard from him, Bay said.

Bay tried to check in with Snowden several times afterward, to no avail. At the end of the month, Bay called his boss in Georgia, asking what to do about Snowdens time sheet. In response, the supervisor alertedNSAs security teamto Snowdens medical leave and his missing status.

Thank goodness he did this, Bay said. It really protected us at Booz Allen, and myself as well.

That was on a Friday. The followingMonday, NSA officials told Bay they were on the case. All that week, he and NSA agents went searching for Snowden.

In my mind, I was worried that he was dead, Bay said. I was worried that he had an epileptic seizure of some sort, or a blackout while driving on the island, and he drove off a cliff and killed himself. Thats what I was concerned about. The thought that Ed could be doing any of this didnt even cross my mind.

Bay said The Guardian published its first story based on NSA leakson the Thursday of that week in June. It was the talk of the agency, hesaid. A couple of days later, one of his best friends at work wondered out loud whether Snowden might beinvolved.

I thought, No way! Theres not a chance that Ed would do that. And I made the comment that that would be my worst nightmare, Bay said.

The next daySunday, June 9 Bay turned off his phone for a church meeting. When he turned it back on, he faced a torrent of texts. The first textwas from his friend, reading: Sorry, man, it looks like your worst nightmare came true.

Thats how Bay found out Snowden was the leaker. Three years afterward, Bay still gets emotional when he remembers the moment.

I found an empty room at the church, and I broke down, Bay said. Every negative thought one could have, I had. There were thoughts of Im going to lose my job, Im going to be blamed, Im going to get fired, Im going to go to jail, Im going to be the scapegoat. And I started thinking about what this is going to do to NSA, what about all of our undercover agents, what if that sort of information gets out? Are peoplegoing to die over this?

Bay spent most of the rest of the day in meetings with executivesat Booz Allen and agents from the FBI. Surprisingly, the FBI was totally cool, he recalled. I was expecting to be in a dark room with a hot light on me. It was nice to hear, despite all these negative emotions that I felt earlier in the day,thatnobody blamed us.

The days after that were devoted to damage control. Eventually, it came out that Snowden had been planning his moves for several years. The fact that he was skilled in information technology and gained access to classified information made him the ultimate insider threat, Bay said.

I was visiting with the director of NSA Hawaii, and he made the comment that, well, Booz Allen got caught holdingthe hot potato when the attack went out. Thats pretty accurate, he said.

It turns out, as [Snowden] admitted a few weeks later, he targeted our contract directly, Bay said. Somehow he figured out that our contract, and whatwe did on that contract, were the types of gateshe needed to get access to.

Today, Snowden is seen as a hero by millions of people opposed to government intrusions and invasions of privacy. AnOliver Stone movie opening this week, titled Snowden, casts the whistleblower in a sympathetic light. But as you can imagine, Bay is not afan.

The fact that Snowden hasbeen given asylum by the Russian government, under the leadership of President Vladimir Putin, leadsBay to saythat Snowden is probably colluding with that countrys security services.

I do believe that Ed has given up the goods to Putin, Bay said.

Snowden strongly denies making any such deal with Russian intelligence, or handing over any secrets to the Russians. Everything I had is in the hands of journalists, Snowden told the BBC last year.

It may take decades for history to render its judgment in the case of Edward Snowden vs. the NSA butin the meantime,Bay had these pointers to improve cybersecurity:

Go here to see the original:
Edward Snowdens former boss speaks out GeekWire

Pamela Anderson Offers Advice for Trump Based on Her …

With no acting projects on the horizon, apart from a cameo in the big screen Baywatch, it appearsPamela Andersonnow fancies herself a political poet.

The actress and model, who often championsanimals asa PETA spokesperson, has now turned her attention to the White House with a new poem she has penned, titled, I Like How You Resist Me.

The lengthy read, posted to her website, touches on everything from the Trump administration and the state of the free world, to espionage and her special relationship with WikiLeaks founder Julian Assange. In discussing President Trumps relationship to Theresa May, Anderson has suggested that France, the U.S. and the U.K. have a threesome.

Also Read: Pamela Anderson Addresses Julian Assange Dating Rumors -- Really

Anderson and Assangehave been rumored as an item since February. Anderson saidpreviously that the two had joined forces to do something important. Assange had previously saidof Anderson: Shes an attractive person with an attractive personality. Shes no idiot at all! Psychologically, shes very savvy.

In the poem, Anderson cries for No more war!, no walls! (around countries or embassies), and urges us all to not forget how to make love

I will stay relentlessly engaged, she promised, adding, Like it or not.

Read the full poem below:

I may have some advice for Trump and May on special relationships-

based on my own special relationship with Julian Assange

Regarding Free Speech and Democracy.

France can join in as a threesome.

A fast approaching UK election,

heated up US threats,

and the French makes this the opportune time to discuss politics romantically.

It is a romantic struggle

Things that the USA and UK bring to the relationship are Bad secrecy laws. Keeping Julian illegally detained. Hating transparency and Bombing countries.

It is dysfunctional and unequal, this relationship to date.

I wish to help them to improve it,

and make it work.

And, bring sexy back.

Just as a dysfunctional lover-

The USA has been spying on UK(reading emails and listening to calls).

All this, that the USA does is as a freakish lover or stalker would.

My recommendations are;

Keep things separate as in a good relationship:

The UK should have an independent foreign policy not based on a special relationship-

so,

the UK and USA relationship would be based on a fundamental reconfiguration of domestic politics, and their relationship with the rest of the world.

They then should disarm and withdraw their troops from Afghanistan and other overseas military engagements, and pursue a peaceful and cooperative diplomatic relationship with other countries.

Create a bilateral extradition treaty between them, it should at least appear as if it is between two equal westphalian state entities, rather than between a lord and vassal (or dominant and submissive partner).

It is completely disproportionate and has asymmetrical evidentiary standards.

If disarming and withdrawing from Afghanistan seems too out there.

Another dynamic approach is to

encourage other countries to reduce their quantise of arms: If you will, I will.

Or:

Agree with other countries to stop arming and destabilising the Middle East.

War is a racket.

Subordinating safety and human rights to the profit motives of arms exporters is not strong, or sexy.

Other relationship issues to work on jointly:

Openness and honesty are a must in any relationship.

So, need to get rid of approaching everything with secrecy and cover up.

Stop abusing espionage and secrecy laws.

Cant stop?

Then get rid of them -

and replace them with laws

that cant be abused.

Stop shouting and punishing people who offer them help (as if a couple would turn against a relationship counsellor?) Julian is trying to help.

And, if their relationship is improved, they can expand it. Diplomatic relations with other countries should be in the spirit of mutual respect

Not haughty superiority.

Such as we saw in the threats to invade the embassy in violation of the Vienna convention. Or the refusal to comply with the UN ruling. A healthy relationship is reciprocal and has a single standard for behaviour.

Not a double standard,

where Britain gets to call out other countries for defying UN findings- but blow them off when they are against the UK.

I cant help but think romantically.

That is where my compass lays. In love and compassion.

To apply common sense relationship advice might be the key.

We must not forget how to make love

But, war.

No more war!

And no walls! (around countries or embassies).

I will stay relentlessly engaged.

Like it or not

Over the years, Republicans particularly Donald Trump supporters have done a 180 (or a full 360) in their remarks about WikiLeaks and its founder, Julian Assange. When he leaked on Hillary Clintons campaign in 2016, some Republicans said he was doing America a great service. But now the Trump administration is poised to attempt to convict Assange and WikiLeaks for their leaking activities. Here are fivetimes Trump and his supporters have flipped on the matter.

In 2010, former Alaska Gov. Sarah Palin said this about Assange: He is an anti-American operative with blood on his hands. His past posting of classified documents revealed the identity of more than 100 Afghan sources to the Taliban. Why was he not pursued with the same urgency we pursue al-Qaeda and Taliban leaders?

In 2016, though, Palin changed her tune. She posted an apology to Assange on Facebook. I apologize for condemning Assange when he published my infamous (and proven noncontroversial, relatively boring) emails years ago, she wrote.

Way back when, Fox News host Sean Hannity said what Assange was doing was waging his war on America and called for his arrest. He also said WikiLeaks stealing and publishing classified documents put lives at risk, as Media Matters reported.

When Assange started leaking emails from the Clinton campaign, though, Hannity became very friendly. He even brought the WikiLeaks founder onto his show for an interview, saying America owes you a debt of gratitude.

Back in 2010, former Speaker of the House Newt Gingrich said Assange was a terrorist. Information warfare is warfare. Julian Assange is engaged in warfare. Information terrorism, which leads to people getting killed is terrorism. And Julian Assange is engaged in terrorism.

Once WikiLeaks turned its attention to Clinton, though, Huckabee was ready to discuss Hillary Clintons criminal enterprise, as he called it, on Hannity. He didnt, however, have anything to say about where the leaks came from or whether the leakers should be brought up on treason charges.

Trump had strong words for Wikileaks in 2010. As CNN reported, in an interview with radio host Brian Kilmeade, Trump said of Wikileaks, I think it's disgraceful, I think there should be like death penalty or something.

During the campaign, though, Trumps support for WikiLeaks was hard to miss. He tweeted over and over again about things WikiLeaks documents about the Clinton campaign, and said at one campaign rally in October, WikiLeaks has provided things that are unbelievable.

While Trump repeatedly tweeted about documents released by WikiLeaks aimed at damaging Clinton, he also tweeted it was the dishonest media that claimed he was in agreement with WikiLeaks.

Republicans were fans of WikiLeaks during the election, but now the U.S. is looking to charge members of the organization

Over the years, Republicans particularly Donald Trump supporters have done a 180 (or a full 360) in their remarks about WikiLeaks and its founder, Julian Assange. When he leaked on Hillary Clintons campaign in 2016, some Republicans said he was doing America a great service. But now the Trump administration is poised to attempt to convict Assange and WikiLeaks for their leaking activities. Here are fivetimes Trump and his supporters have flipped on the matter.

Go here to see the original:
Pamela Anderson Offers Advice for Trump Based on Her ...

JSON Object Signing and Encryption (JOSE)

HS256 HMAC using SHA-256 alg Required [IESG] [RFC7518, Section 3.2] n/a HS384 HMAC using SHA-384 alg Optional [IESG] [RFC7518, Section 3.2] n/a HS512 HMAC using SHA-512 alg Optional [IESG] [RFC7518, Section 3.2] n/a RS256 RSASSA-PKCS1-v1_5 using SHA-256 alg Recommended [IESG] [RFC7518, Section 3.3] n/a RS384 RSASSA-PKCS1-v1_5 using SHA-384 alg Optional [IESG] [RFC7518, Section 3.3] n/a RS512 RSASSA-PKCS1-v1_5 using SHA-512 alg Optional [IESG] [RFC7518, Section 3.3] n/a ES256 ECDSA using P-256 and SHA-256 alg Recommended+ [IESG] [RFC7518, Section 3.4] n/a ES384 ECDSA using P-384 and SHA-384 alg Optional [IESG] [RFC7518, Section 3.4] n/a ES512 ECDSA using P-521 and SHA-512 alg Optional [IESG] [RFC7518, Section 3.4] n/a PS256 RSASSA-PSS using SHA-256 and MGF1 with SHA-256 alg Optional [IESG] [RFC7518, Section 3.5] n/a PS384 RSASSA-PSS using SHA-384 and MGF1 with SHA-384 alg Optional [IESG] [RFC7518, Section 3.5] n/a PS512 RSASSA-PSS using SHA-512 and MGF1 with SHA-512 alg Optional [IESG] [RFC7518, Section 3.5] n/a none No digital signature or MAC performed alg Optional [IESG] [RFC7518, Section 3.6] n/a RSA1_5 RSAES-PKCS1-v1_5 alg Recommended- [IESG] [RFC7518, Section 4.2] n/a RSA-OAEP RSAES OAEP using default parameters alg Recommended+ [IESG] [RFC7518, Section 4.3] n/a RSA-OAEP-256 RSAES OAEP using SHA-256 and MGF1 with SHA-256 alg Optional [IESG] [RFC7518, Section 4.3] n/a A128KW AES Key Wrap using 128-bit key alg Recommended [IESG] [RFC7518, Section 4.4] n/a A192KW AES Key Wrap using 192-bit key alg Optional [IESG] [RFC7518, Section 4.4] n/a A256KW AES Key Wrap using 256-bit key alg Recommended [IESG] [RFC7518, Section 4.4] n/a dir Direct use of a shared symmetric key alg Recommended [IESG] [RFC7518, Section 4.5] n/a ECDH-ES ECDH-ES using Concat KDF alg Recommended+ [IESG] [RFC7518, Section 4.6] n/a ECDH-ES+A128KW ECDH-ES using Concat KDF and "A128KW" wrapping alg Recommended [IESG] [RFC7518, Section 4.6] n/a ECDH-ES+A192KW ECDH-ES using Concat KDF and "A192KW" wrapping alg Optional [IESG] [RFC7518, Section 4.6] n/a ECDH-ES+A256KW ECDH-ES using Concat KDF and "A256KW" wrapping alg Recommended [IESG] [RFC7518, Section 4.6] n/a A128GCMKW Key wrapping with AES GCM using 128-bit key alg Optional [IESG] [RFC7518, Section 4.7] n/a A192GCMKW Key wrapping with AES GCM using 192-bit key alg Optional [IESG] [RFC7518, Section 4.7] n/a A256GCMKW Key wrapping with AES GCM using 256-bit key alg Optional [IESG] [RFC7518, Section 4.7] n/a PBES2-HS256+A128KW PBES2 with HMAC SHA-256 and "A128KW" wrapping alg Optional [IESG] [RFC7518, Section 4.8] n/a PBES2-HS384+A192KW PBES2 with HMAC SHA-384 and "A192KW" wrapping alg Optional [IESG] [RFC7518, Section 4.8] n/a PBES2-HS512+A256KW PBES2 with HMAC SHA-512 and "A256KW" wrapping alg Optional [IESG] [RFC7518, Section 4.8] n/a A128CBC-HS256 AES_128_CBC_HMAC_SHA_256 authenticated encryption algorithm enc Required [IESG] [RFC7518, Section 5.2.3] n/a A192CBC-HS384 AES_192_CBC_HMAC_SHA_384 authenticated encryption algorithm enc Optional [IESG] [RFC7518, Section 5.2.4] n/a A256CBC-HS512 AES_256_CBC_HMAC_SHA_512 authenticated encryption algorithm enc Required [IESG] [RFC7518, Section 5.2.5] n/a A128GCM AES GCM using 128-bit key enc Recommended [IESG] [RFC7518, Section 5.3] n/a A192GCM AES GCM using 192-bit key enc Optional [IESG] [RFC7518, Section 5.3] n/a A256GCM AES GCM using 256-bit key enc Recommended [IESG] [RFC7518, Section 5.3] n/a EdDSA EdDSA signature algorithms alg Optional [IESG] [RFC8037, Section 3.1] [RFC8032] RS1 RSASSA-PKCS1-v1_5 with SHA-1 JWK Prohibited [W3C_Web_Cryptography_Working_Group] [https://www.w3.org/TR/WebCryptoAPI] [draft-irtf-cfrg-webcrypto-algorithms] RSA-OAEP-384 RSA-OAEP using SHA-384 and MGF1 with SHA-384 alg Optional [W3C_Web_Cryptography_Working_Group] [https://www.w3.org/TR/WebCryptoAPI] n/a RSA-OAEP-512 RSA-OAEP using SHA-512 and MGF1 with SHA-512 alg Optional [W3C_Web_Cryptography_Working_Group] [https://www.w3.org/TR/WebCryptoAPI] n/a A128CBC AES CBC using 128 bit key JWK Prohibited [W3C_Web_Cryptography_Working_Group] [https://www.w3.org/TR/WebCryptoAPI] [draft-irtf-cfrg-webcrypto-algorithms] A192CBC AES CBC using 192 bit key JWK Prohibited [W3C_Web_Cryptography_Working_Group] [https://www.w3.org/TR/WebCryptoAPI] [draft-irtf-cfrg-webcrypto-algorithms] A256CBC AES CBC using 256 bit key JWK Prohibited [W3C_Web_Cryptography_Working_Group] [https://www.w3.org/TR/WebCryptoAPI] [draft-irtf-cfrg-webcrypto-algorithms] A128CTR AES CTR using 128 bit key JWK Prohibited [W3C_Web_Cryptography_Working_Group] [https://www.w3.org/TR/WebCryptoAPI] [draft-irtf-cfrg-webcrypto-algorithms] A192CTR AES CTR using 192 bit key JWK Prohibited [W3C_Web_Cryptography_Working_Group] [https://www.w3.org/TR/WebCryptoAPI] [draft-irtf-cfrg-webcrypto-algorithms] A256CTR AES CTR using 256 bit key JWK Prohibited [W3C_Web_Cryptography_Working_Group] [https://www.w3.org/TR/WebCryptoAPI] [draft-irtf-cfrg-webcrypto-algorithms] HS1 HMAC using SHA-1 JWK Prohibited [W3C_Web_Cryptography_Working_Group] [https://www.w3.org/TR/WebCryptoAPI] [draft-irtf-cfrg-webcrypto-algorithms]

Excerpt from:
JSON Object Signing and Encryption (JOSE)

Slow assassination: Julian Assanges mothers emotional …

Published time: 4 Nov, 2018 16:18 Edited time: 8 Nov, 2018 16:37

The mother of WikiLeaks editor Julian Assange fears her son is in immediate and critical danger after spending nearly six years in limbo inside the Ecuadorian Embassy in London, where his health has sharply deteriorated.

As fears for Assanges health have grown, his mother Christine spoke at the Assange-supporting #Unity4J online vigil event about how her son is undergoing a slow and cruel assassination in an online vigil dubbed #ReconnectJulian on Saturday.

The modern-day cage for political prisoners is no longer the Tower of London, it is the Ecuadorian Embassy, she said, adding that her son has been detained for nearly eight years without charge, cut off from all contact and tortured in the heart of London.

For the past six years the UK government has refused his request to access to basic health needs, fresh air, exercise, sunshine for Vitamin D, and access to proper medical and dental care. As a result, his health has seriously deteriorated, she added.

LISTEN TO FULL AUDIO ADDRESS OF CHRISTINE ASSANGE:

Mandatory Credit: Unity4j.Com

Assange was granted refuge inside the Ecuadorian Embassy in London back in 2012 while fighting extradition to Sweden regarding a sexual assault case. The UN human rights panel has called Assanges embassy ordeal an arbitrary detention by the UK and Sweden.

READ MORE:Ecuador pledged to not kick out Assange, but threat of US prosecution still serious lawyer to RT

The Australian native believes the Swedish probe, which has since been discontinued due to what Stockholm called Assanges unavailability for questioning, was only a pretext to extradite him to the US over troves of confidential documents released by WikiLeaks. Assange is unable to leave the confines of the embassy, as there is still an outstanding warrant for his arrest after he skipped bail to avoid extradition to Sweden.

While the US government has not confirmed whether it would pursue charges against Assange, the countrys Attorney General Jeff Sessions has previously labeled the WikiLeaks founders arrest as a priority.

UPDATE: Christine Assange has since responded to the publication, tweeting the following:

If you like this story, share it with a friend!

See the rest here:
Slow assassination: Julian Assanges mothers emotional ...

WikiLeaks – Pope’s Orders – theworldtomorrow.wikileaks.org

Documents released by WikiLeaks today shed light on a power struggle within the highest offices of the Catholic Church. Amongst the documents is a private letter written by Pope Francis. The existence of this letter, addressed to the papal envoy Cardinal Raymond Burke, has been the source of much speculation in the media [1]. It is now published for the first time in full and with the Popes signature.

This letter concerns the Sovereign Military Order of Malta, also known as the Order of Malta or the Knights of Malta, originally founded in Jerusalem during the Crusades in 1099. As the name indicates, it has been widely recognised as a sovereign entity in itself despite theoretically being subject to papal authority as a Catholic institution.

This ambiguous status cuts to the heart of the dispute as it reached a fever pitch after Pope Francis forced the abdication of Matthew Festing as Prince and Grand Master of the Order in January 2017. A month earlier Festing had dismissed the Orders Grand Chancellor Albrecht Freiherr von Boeselager.

The reason for the dismissal is said to be that Boeselager, who served as health minister for the Order, was held personally responsible for having approved funds for an aid mission in Africa that distributed condoms, amongst other things. This directly contravenes Church teachings on contraception and Festing was adamant that Boeselager be held responsible.

Boeselager, however, appealed to Pope Francis, who in turn deeply undermined the Orders independence and sovereignty by appointing a papal commission to investigate the matter and report back to the Holy See. Boeselager was subsequently reinstated at the same time as Festing was ousted. The papal letter, published by WikiLeaks today, shows the Pope was aware of and involved in the dispute since at least November 2016 when he met with Cardinal Burke.

The Popes dramatic moves in January 2017 effectively abolished the sovereignty of the Order and have been described by its harshest critics as the annexation of one country (the Order) by another (the Holy See) [2]. Members of the Order even went so far as to challenge papal authority on the matter and refused to co-operate with the Vaticans investigation [3]. This is seen by many observers as part of a larger power struggle between conservative and liberal elements within the Church, represented by Festing and Boeselager respectively (for example, [4]).

Adding yet more intrigue to the tale are rumours that some high-ranking members of the Order have also attended Masonic lodges or other organisations deemed suspect by the Church [5]. Some of this seems to be confirmed by the Popes letter, which is dated 1 December 2016 (over a month before Boeselager was reinstated and Festing dismissed).

In the letter Pope Francis states: In particular, members of the Order must avoid secular and frivoulous (sic) behaviour, such as membership to associations, movements and organisations which are contrary to the Catholic faith and/or of a relativist nature. He goes on to state that any members of such organisations need to be removed from the Order.

Regarding the condom scandal at the heart of this matter, the Pope states: I would be very disappointed if as you told me some of the high Officers were aware of practices such as the distribution of any type of contraceptive and have not yet intervened to end such things. He further states that: I have no doubts that by following the principle of Paul and speaking the truth in love (Ephesians 4:15), the matter can be discussed with the Officers and the necessary rectification obtained.

The letter also confirms that Cardinal Burke had an audience with the Pope on 10 November 2016 to discuss the mounting crisis. This was before Boeselager was even removed by Festing.The text of the letter makes clear that the Pope was already committed to asserting his authority over the Order at this early stage. He writes: Your Eminence, together with the leaders of the Order, will have to make ever more clear the close connection which unites the Sovereign Military Order of Malta to the Roman Pontiff, both from a structural and operational point-of-view. Along with the Popes letter to Cardinal Burke, WikiLeaks has published several other documents relating to the dispute. These include internal communications and memos, some of which have been quoted in the media.

[1] https://catholicherald.co.uk/commentandblogs/2017/01/25/the-vatican-has-destroyed-the-order-of-maltas-sovereignty-what-if-italy-does-the-same-to-the-vatican/

[2] https://www.economist.com/the-economist-explains/2017/02/07/why-the-pope-has-taken-control-of-the-knights-of-malta

[3] https://www.theguardian.com/world/2017/jan/11/knights-of-malta-condom-scandal-stretches-from-myanmar-to-the-vatican

[4] http://www.italy24.ilsole24ore.com/art/panorama/2017-01-30/pope-francis-imposes-pacification-on-the-order-of-malta-100122.php

[5] https://catholiccitizens.org/news/69506/pope-ordered-card-burke-clean-freemasons-knights-malta

Read more from the original source:
WikiLeaks - Pope's Orders - theworldtomorrow.wikileaks.org

Chelsea Manning to Be Released Early as Obama Commutes …

Speaker Paul D. Ryan called it outrageous. President Obama now leaves in place a dangerous precedent that those who compromise our national security wont be held accountable for their crimes, he said in a statement.

But in a joint statement, Nancy Hollander and Vince Ward two lawyers who have been representing Ms. Manning in appealing her conviction and sentence, and who filed the commutation application praised the decision.

Ms. Manning is the longest-serving whistle-blower in the history of the United States, they said. Her 35-year sentence for disclosing information that served the public interest and never caused harm to the United States was always excessive, and were delighted that justice is being served in the form of this commutation.

In recent days, the White House had signaled that Mr. Obama was seriously considering granting Ms. Mannings commutation application, in contrast to a pardon application submitted on behalf of the other large-scale leaker of the era, Edward J. Snowden, the former intelligence contractor who disclosed archives of top-secret surveillance files and is living as a fugitive in Russia.

Asked about the two clemency applications on Friday, the White House spokesman, Josh Earnest, discussed the pretty stark difference between Ms. Mannings case for mercy and Mr. Snowdens. While their offenses were similar, he said, there were some important differences.

Chelsea Manning is somebody who went through the military criminal justice process, was exposed to due process, was found guilty, was sentenced for her crimes, and she acknowledged wrongdoing, he said. Mr. Snowden fled into the arms of an adversary and has sought refuge in a country that most recently made a concerted effort to undermine confidence in our democracy.

Mr. Earnest also noted that while the documents Ms. Manning provided to WikiLeaks were damaging to national security, the ones Mr. Snowden disclosed were far more serious and far more dangerous. (None of the documents Ms. Manning disclosed were classified above the merely secret level.)

Ms. Manning was still known as Bradley Manning when she deployed with her unit to Iraq in late 2009. There, she worked as a low-level intelligence analyst helping her unit assess insurgent activity in the area it was patrolling, a role that gave her access to a classified computer network.

See the rest here:
Chelsea Manning to Be Released Early as Obama Commutes ...