Whataboutism: The Cold War tactic, thawed by Putin, is brandished by Donald Trump – Chicago Tribune

What about Antifa? What about free speech? What about the guy who shot Steve Scalise? What about the mosque in Minnesota that got bombed? What about North Korea? What about murders in Chicago? What about Ivanka at the G-20? What about Vince Foster? If white pride is bad, then what about gay pride? What about the stock market? What about those 33,000 deleted emails? What about Hitler? What about the Crusades? What about the asteroid that may one day kill us all? What about Benghazi?

What about what about what about.

We've gotten very good at what-abouting.

The president has led the way.

His campaign may or may not have conspired with Moscow, but President DonaldTrump has routinely employed a durable old Soviet propaganda tactic. Tuesday's bonkers news conference in New York was Trump's latest act of "whataboutism," the practice of short-circuiting an argument by asserting moral equivalency between two things that aren't necessarily comparable. In this case, the president wondered whether the removal of a statue of Confederate leader Robert E. Lee in Charlottesville where white supremacists clashed this weekend with counterprotesters would lead to the teardown of others.

Robert E. Lee? What about George Washington?

"George Washington was a slave owner," Trump said to journalists in the lobby of his corporate headquarters. "Are we going to take down statues to George Washington? How about Thomas Jefferson?"

Using the literal "what about" construction, Trump then went on to blame "both sides" for the violence in Charlottesville.

"What about the 'alt-left' that came charging at the, as you say, the 'alt-right'?" the president said. "Do they have any semblance of guilt?"

For a nanosecond, especially to an uncritical listener, this stab at logic might seem interesting, even thought-provoking, and that's why it's a useful political tool. Whataboutism appears to broaden context, to offer a counterpoint, when really it's diverting blame, muddying the waters and confusing the hell out of rational listeners.

"Not only does it help to deflect your original argument but it also throws you off balance," says Alexey Kovalev, an independent Russian journalist, on the phone from Moscow. "You're expecting to be in a civilized argument that doesn't use cheap tricks like that. You are playing chess and your opponent while making a lousy move he just punches you on the nose."

Ashley Parker and David Nakamura

Vladimir Putin has made a national sport of what-abouting. In 2014, when a journalist challenged him on his annexation of Crimea, Putin brought up the U.S. annexation of Texas. The American invasion of Iraq is constantly what-abouted on state television, to excuse all kinds of Russian behavior.

In Edward Snowden, "Russia has found the ultimate whataboutism mascot," the Atlantic's Olga Khazan wrote in 2013. "By granting him asylum, Russia casts itself, even if momentarily, as a defender of human rights, and the U.S. as the oppressor."

The term was first coined as "whataboutery" and "the whatabouts," in stories about the Irish Republican Army in the 1970s, according to linguist Ben Zimmer. But the practice goes back to the chilly depths of the Cold War.

"An old joke 50 years ago was that if you went to a Stalinist and criticized the Soviet slave-labor camps, the Stalinist would say, 'Well what about the lynchings in the American South?'" philosopher Noam Chomsky once said.

In 1970, as the Soviet Union made headlines for imprisoning dissidents, Ukrainian artist Viktor Koretsky created a propaganda lithograph titled "American Politics at home and abroad." It depicted U.S. police beating a black man and a U.S. soldier standing over a dead body, presumably in Vietnam.

In May 1985 the State Department funded a conference at the Madison Hotel on the fallacy of "moral equivalence," a philosophical cousin of whataboutism. The goal was to tamp down comparisons of the 1983 U.S. invasion of Grenada with the 1979 Soviet invasion of Afghanistan, among other instances. The actions may be comparable, the State Department implied, but the intentions were not.

"If it is no longer possible to distinguish between freedom and despotism," said Jeane Kirkpatrick, Ronald Reagan's ambassador to the United Nations, then "the erosion of the foundation of a distinctively Western, democratic civilization is already far advanced and the situation serious indeed."

Flash forward 30 years. President Trump's Twitter feed has been a whataboutism showcase, with Hillary Clinton as the usual target.

April 3: "Did Hillary Clinton ever apologize for receiving the answers to the debate? Just asking!"

June 26: "The real story is that President Obama did NOTHING after being informed in August about Russian meddling."

July 22: "... What about all of the Clinton ties to Russia ..."

Googling of "Whataboutism" began to climb sharply in November of last year; this week, with Charlottesville, it reached an all-time high. "You look at both sides," Trump said Tuesday, after saying "what about" three times. "I think there is blame on both sides ... and nobody wants to say that."

Some people saw this as brave truth-telling, and as exposing double standards in the media.

"Trump-haters on both sides of the aisle simply cry 'whataboutism,' as if it were a magic spell to ward off rational thought," wrote Joel B. Pollak on the right-wing site Breitbart, in an article headlined "The attack on 'whataboutism' is a defense of hypocrisy."

Trump's most flagrant what-about, though, was used not in defense of himself, but in defense of Russia.

"Putin's a killer," Bill O'Reilly said to Trump in a February interview.

"There are a lot of killers," Trump whatabouted. "We've got a lot of killers. What do you think our country's so innocent?"

"That's exactly the kind of argument that Russian propagandists have used for years to justify some of Putin's most brutal policies," wrote Michael McFaul, former ambassador to Russia during the Obama administration.

Read this article:
Whataboutism: The Cold War tactic, thawed by Putin, is brandished by Donald Trump - Chicago Tribune

Encryption Technology Could Protect the Privacy of Your DNA – Gizmodo

Your DNA is some of the most intimate information out thereencoded in it is information about your health, your personality, your family history. Its not hard to imagine how such sensitive details could be damaging should they fall into the wrong hands. And yet, the privacy practices of the people and programs handling that information isnt exactly up to snuff.

Researchers at Stanford, though, say they may have a fix for the lagging privacy protocols putting anyone whos ever done a DNA test at risk of indecent exposure. In a study published Friday in Science, researchers say that they have developed a genome cloaking technique that makes it possible to study the human genome for the presence of disease-associated genes without revealing genetic information not directly associated with the information being sought.

The hope, they wrote, is to lessen the concerns of genomic privacy violations and genetic discrimination that taint DNA testing.

Applying the principals of cryptography to human biology, researchers were able to correctly identify gene mutations in groups of patients responsible for causing four different rare diseases, as well as the likely cause of a genetic disease in a baby by comparing his DNA to his parents. They could also determine which out of hundreds of patients shared gene mutations. In doing all this, though, they also managed to keep 97 percent or more of the participants unique genetic information completely hidden from anyone other than the owners of the DNA.

To do this, they had each participant encrypt their genome using a simple algorithm on their computer or smart phone. The encrypted information was then uploaded into the cloud, and the researchers used a secure, multi-party computation to analyze it, revealing only the genetic information important to the investigation. They were able to do so within a matter of minutes.

In 2008, Congress passed the Genetic Information and Nondiscrimination Act, but both loopholes in the law and multipleCongressional actions threaten to erode protections that already exist, making people wary of the consequences of genetic testing. The protections of GINA, for example, do not apply to life insurance, long-term care, or disability insurance, meaning those companies are free to ask for genetic information and reject people deemed too risky. Some scientists have said that fears of genetic discrimination could impact the health of patients, if they refuse testing that could help doctors treat them, and could stymy medical research if patients wary of testing opt not to participate in studies.

Ultimately, we will have to strike a balance: A way to share the secrets of our biology with doctors and scientists, while also protecting our privacy.

Visit link:
Encryption Technology Could Protect the Privacy of Your DNA - Gizmodo

Buying encryption? Five good questions to ask before you do – We Live Security (blog)

General Data Protection Regulation (GDPR) together with the growing number of data breaches are the most pressing reasons why small and medium businesses are implementing data protection technologies including encryption.

However,with limited time and themarket flooded by various products, it can be a difficult task for companies owners and decision-makers to find the right fit for their needs.

If you are faced with the decision yourself, avoid pitfalls in selecting an encryption product by asking the following questions:

This might seem like a pointless question with an obvious answer; systems are more liable to theft when away from the office. But making this distinction and keeping it in mind is the right place to start and when you have settled on a solution, be sure to test its effectiveness at managing problem scenarios for your remote users.

All major endpoint encryption products offer the means to manage remote systems, but look carefully at the requirements. Most need either an open incoming connection to a demilitarized zone (DMZ) on your server, or a VPN connection. All involve a higher level of IT skills that can add additional costs and, in orderto function, may require the user to initiate the connection; not much use with a rogue employee or stolen laptop.

A well-designed product will give you the remote management necessary without creating additional security problems, requiring specialist knowledge, or adding expense to the project.

Being able quickly tovary security policy, encryption keys, features and operation of endpoint encryption remotely, means that your default policy can be strong and tight. Exceptions can be made only when and where they are needed, and reverted just as easily. If you cant do this youll be forced to leave a key under the doormat, just in case tearing holes in your policy before deployment is complete.

The answer might be crucial if a company computer with full-disk encryption gets stolen while in sleep mode or with the operating system booted up. Its even worse if those systems come with the pre-boot password affixed on a label or tucked in the laptop bag. If a remote lock or wipe function is not available, then the system is either unprotected or secured only by the OS password, with the encryption being bypassed in either case.

Similarly, it is important to know whether the solution has been designed to accommodate the typical use cases that would otherwise unravel a well designed security policy.

With an array of writeable devices that people use for their everyday work, it is almost impossible for the admins to whitelist each and every one of them, and decide whether its permissible to read from, write to, or not access the device at all.

It is much easier to set a file-level policy distinguishing between files that need encryption and those that dont and keep these protected every time they move from workstation or corporate network to any portable device.

In other words, if you connect your own USB stick, it wont force you to encrypt your private data; anything coming from the company system, however, will be encrypted without the keys being held on your device.It is a simple idea, but one which makes any device safe, without the need for whitelisting.

In the end you need to figure out if the solution you want to use is easy to deploy. If the setup of the solution takes hours or even days and needs additional tools for its operation, it might cause new headaches for company sysadmins and create new security risks. Aim for an easy-to-deploy solution that doesnt require advanced IT expertise and preservesboth finances and yourhuman resources. If the user experience mirrors that easy deployment, then IT staff wont be further taxed by user lockouts, lost data and other frustrations.

All validated, commercial encryption products have been more than strong enough for many years, yet a significant proportion of the recorded data breaches involving lost or stolen laptops and USB drives happened to organizations who had bought and deployed encryption products.

Reading the case notes for these incidents reveals that being able to fit the solution toyour environment, working practices and making encryption easy for everyday users as the real challenges.

Author Ondrej Kubovi, ESET

Read the original:
Buying encryption? Five good questions to ask before you do - We Live Security (blog)

How to use Firefox Send for secure file sharing – TechRepublic

Image: Jack Wallen

Sharing files has become standard operating procedure. We do it every day, with files of varying size and importance. Many times we resort to the likes of Dropbox or Googleboth services are relatively easy to use. However, Mozilla thinks there's an even easier way to share those larger files (up to 1GB) and have created Send.

At the moment, Send is still labeled as a "web experiment." I've tested this experiment and, from my experience, this is one of the easiest means of sharing larger files to come across my path. In fact, it's so easy to use, this could be the file sharing service your company might want to consider. It's not perfect, but at this point in the game, I'm happy there is an option to securely share files that anyone can use.

How does it work? Simple:

That's it. You can do this for files up to 1GB in size.

Figure A

Sending a file is but a click or two away.

Let's deconstruct Send a bit.

Send uses AES-128 to encrypt and authenticate data. Even before the file is uploaded to the Send servers, it is encrypted and authenticated. Send also makes use of the Web cryptography API; an agnostic API that performs basic cryptographic operations (such as hashing, signature generation and verification, encryption, and decryptionall from within a web interface). Thanks to the Web cryptography API, there is no need for users to deal with encryption or decryption keys; thereby making Send quite simple to use.

The one major caveat to the security of Send is that anyone who has the download link can download the file. That means, should someone intercept the email with the link, they could have at your file. There three saving graces to this are:

Figure B

Manually deleting the file is an option.

A word of warning about the Delete file button. Once you move away from the upload page, that page will no longer be available. That means, if you plan on making use of that Delete file button, you need to keep that page open until you know there's no need to manually delete the file.

SEE: Essential reading for IT leaders: 10 books on cybersecurity (free PDF) (TechRepublic) SEE: Cyber Security Volume IV: End Point Protection (TechRepublic Academy)

I've tested Send in Chrome, Firefox, Epiphany, Vivaldi, and Microsoft Edge, as well as the mobile versions of Firefox and Chrome. Each of those browsers used Send without issue. The only browser I did not test was Safari. Upon initial release, Send did not support the MacOS browser. It would be a safe bet that support will soon be coming for Apple's browser.

Because Send is a part of Test Pilot, Mozilla will be gathering statistics to see if the service is something they want to continue offering. In other words, the more people that kick the tires of Send, the better the chance it will remain.

If you're looking for an easy way to safely share a one-time download link to a file, you'd be hard-pressed to find an easier solution than Send.

View original post here:
How to use Firefox Send for secure file sharing - TechRepublic

3 Questions About A Pro-Russia Congressman’s Meeting With Julian Assange – NPR

Rep. Dana Rohrabacher, R-Calif., plans to "divulge more of what he found directly to President Trump," he said in a statement. Bill Clark/Getty Images hide caption

Rep. Dana Rohrabacher, R-Calif., plans to "divulge more of what he found directly to President Trump," he said in a statement.

A member of Congress who's one of the staunchest defenders of Russia in American politics met with WikiLeaks founder Julian Assange in London on Wednesday.

Rep. Dana Rohrabacher, R-Calif., spent around three hours with Assange talking at the Ecuadorean Embassy there, where Assange sought refuge in 2012 in the face of sexual assault charges in Sweden.

In their tte--tte, Assange denied that Russia was involved in the hacking or disclosure of emails stolen from the Democratic National Committee during the 2016 U.S. presidential campaign and published online by WikiLeaks, Rohrabacher's office said. U.S. intelligence agencies say Russia was behind the cybertheft and used WikiLeaks to distribute the pilfered data. Moscow denies the allegations.

The congressman and WikiLeaks founder also discussed "possibilities" that would allow Assange to leave the embassy where international diplomatic protections have kept him from being arrested, Rohrabacher spokesman Ken Grubbs told NPR.

Rohrabacher plans to "divulge more of what he found directly to President Trump," he said in a statement.

The White House did not immediately respond to a request for comment.

Rohrabacher represents California's 48th Congressional District a sunny stretch of coast in Orange County. He has had a long and colorful career in politics, stretching back to his days as a speechwriter and aide to President Ronald Reagan.

With Rohrabacher wading into the Russia-WikiLeaks-Trump swamp, here are three questions raised by his meeting with Assange:

1. What are Rohrabacher's connections with Russia?

Rohrabacher has long harbored a fondness for Russia views that put him at odds with the Republican mainstream and have earned him the tagline "Putin's Favorite Congressman."

Rohrabacher says his affinity for Moscow dates back, oddly enough, to a weeklong trip he made in 1988 to visit the Afghan mujahedin fighting the Soviet Union. Since then, he realized his fight was against Communists, not Russians per se, he told the Los Angeles Times this year.

After the Soviet empire collapsed and Russia moved toward democracy in the 1990s, Rohrabacher cheered Moscow in its halting transition from communism to free market capitalism. He also got to know Russian officials, including a then-little known deputy mayor of St. Petersburg by the name of Vladimir Putin.

Rohrabacher claims to have lost a drunken arm wrestling match to Putin in the early '90s at a bar in downtown Washington after a game of touch football.

How does the California congressman view the man who rose to the Russian presidency?

"He's a tough guy, and he's supposed to be a tough guy," Rohrabacher told NPR member station KPCC in 2013. "That's what the Russian people want. But that's not a reason we shouldn't try to work with him."

Rohrabacher's positions on Russia largely correspond with Trump's, but they have won him few other friends in Washington, particularly in light of Moscow's interference in last year's presidential election.

Even his own Republican leadership has taken swipes at him. Last year, House Majority Leader Kevin McCarthy was caught on tape saying: "There's two people I think Putin pays: Rohrabacher and Trump." McCarthy later said his comments were "a bad attempt at a joke."

2. Isn't it unusual for a member of Congress to have such close ties to a foreign government?

Yes the FBI reportedly warned Rohrabacher in 2012 that Russian intelligence services were trying to recruit him as an "agent of influence" to help steer U.S. policy in Moscow's favor, according to the New York Times.

Rohrabacher said he was aware of the dangers when meeting with Russian officials, and there is no evidence the congressman ever entered into an agreement with Moscow.

But that doesn't mean Rohrabacher has shied away from contacts with Russia.

In July, an American financier accused Rohrabacher of using information he obtained from the Russian government to try to change a U.S. anti-corruption, pro-human rights law called the Magnitsky Act.

The Kremlin strongly opposes the law, which is named after an attorney who died in Russian custody after uncovering evidence of corruption by government officials. After Congress passed it in 2012, Putin retaliated by suspending American adoptions of Russian children.

The Magnitsky Act entered the public spotlight this summer thanks to Donald Trump Jr.'s emails about his meeting with a Russian delegation during last year's presidential campaign. Trump Jr. originally said the discussion was about "adoptions," which, to Russians, means the Magnitsky Act. According to the emails, Trump Jr. agreed to take the meeting because the Russian government wanted to offer compromising material about Hillary Clinton.

3. What did Rohrabacher and Assange discuss?

The meeting, which was first reported by the Daily Caller, was arranged by journalist and Internet provocateur Charles Johnson.

Rohrabacher and Assange discussed the status of WikiLeaks and Assange, whose disclosures over the years have drawn the enmity of the U.S. government, particularly the intelligence community.

In April, CIA Director Mike Pompeo went so far as to call WikiLeaks a "non-state hostile intelligence service often abetted by state actors like Russia." As for Assange, Pompeo called him a "narcissist who has created nothing of value. He relies on the dirty work of others to make himself famous. He is a fraud a coward hiding behind a screen."

During the 2016 campaign, WikiLeaks released emails hacked from the Democratic National Committee and Clinton campaign chairman John Podesta. American spy agencies say the group received those materials from Russia.

In his meeting with Rohrabacher, Assange "emphatically stated that the Russians were not involved in the hacking or disclosure" of the emails, Rohrabacher's office said.

Rohrabacher spokesman Ken Grubb said the congressman and Assange also talked about possibilities that would allow him to leave the embassy, as well as what Assange knows about the DNC leaks. Grubb said no proposal is currently on the table.

Read this article:
3 Questions About A Pro-Russia Congressman's Meeting With Julian Assange - NPR

US e-sports platform to launch $100 million cryptocurrency sale in September – Reuters

NEW YORK (Reuters) - Unikrn, a U.S. sports betting digital platform backed by some of the biggest names in media, entertainment and sports, will launch the sale of $100 million in cryptocurrency next month, the company's co-founder and chief executive officer, Rahul Sood, told Reuters in an interview earlier this week.

The sale is part of a trend in which creators of digital currencies in the blockchain space sell tokens to the public to fund their projects. Some start-ups call this mode of financing an initial coin offering (ICO); others refer to it as a "token sale."

Cryptocurrency is a digital currency in which encryption techniques help keep transactions secure. Blockchain is a digital ledger of transactions underpinning the original online currency bitcoin.

Sood explained that Unikrn embraced cryptocurrency as a way to bypass banking institutions.

"The problem when you're dealing with banks is that none of these guys are easy to work with," Sood said. "You're dealing with 20 different currencies, you're dealing across borders. There's no other reason to go this route other than to circumvent banking."

The new coin will be called UnikoinGold, which will be a cryptocurrency version of the company's existing coin UniKoin. The current UniKoin, which allows users to bet on e-sports in regulated markets and win prizes in markets where Unikrn is not licensed to operate, will be phased out once UniKoingold is launched.

Unikrn is capping its token sale at $100 million because "if we don't, it's going to go crazy," Sood said.

Sood said there will be a pre-sale of the token in the next few weeks and a crowdsale in September. There will be no discount for early investors or company founders and employees.

Sood founded Voodoo, which manufactures high-end computers for video games, when he was in high school. He eventually sold his company to Hewlett Packard after 16 years and eventually joined Microsoft and ran the company's venture fund for start-ups.

Seattle-based Unikrn, which was launched nearly three years ago, is backed by well-known investors including Mark Cuban, owner of the Dallas Mavericks professional basketball team; U.S. actor Ashton Kutcher's venture firm Sound Ventures; Elisabeth Murdoch's venture fund Freeland Ventures, as well as Shari Redstone's Advancit Capital. TabCorp, the largest betting company in Australia is also an investor.

The company raised $10 million from early investors, Sood said.

Elisabeth Murdoch is the daughter of media mogul Rupert Murdoch, while Shari Redstone is the daughter of Sumner Redstone whose family is a majority owner of several media groups including CBS Corp., Viacom, and MTV Networks.

Reporting by Gertrude Chavez-Dreyfuss; Editing by Bernadette Baum

Read this article:
US e-sports platform to launch $100 million cryptocurrency sale in September - Reuters

AMD Releases Cryptocurrency Mining Driver, May Raise Vega Prices – ExtremeTech

This site may earn affiliate commissions from the links on this page. Terms of use.

On the heels of its Vega launch last week, AMD has released a new driver for its GPUs that focuses on cryptocurrency mining. The new driver is supposed to make Vega faster when mining, though AMD also notes that the driver is provided as a beta level support driver which should be considered as is and will not be supported with further updates, upgrades or bug fixes.

AMD and Nvidia have taken different approaches to cryptocurrency during this latest cycle. Earlier this year, AMD reported that cryptocurrency might have driven a short-term spike in sales, but that the company did not include it in their future forecasts. AMD has said that it continues to monitor the cryptocurrency business, but that it has no plans for a major pivot. The driver being labeled as a beta as-is product certainly supports this analysis.

Nvidia, on the other hand, has a different take. Jen-Hsun Huang has told investors that Cryptocurrency and blockchain are here to stay. Over time, it will become quite large. It is very clear that new currencies will come to market. Its clear the GPU is fantastic at cryptography. The GPU is really quite well positioned.

This disparate take on mining may reflect certain realities both companies have faced. Back in 2011 2014, when Bitcoin and Litecoin mining were still being done on GPUs, AMD was the only company that really benefitedand at the same time, it didnt benefit much at all. GPU sales to gamers fell like a rock. By the time the cryptocurrency mining craze had pased, Nvidia had the GTX 980 and 970 ready to go. The window of opportunity for Hawaii had passed. Some of you may also recall that AMDs GPU prices simply blew through the roof, with an R9 280X, which should have been a $300 card based on AMDs MSRPs, actually selling for $489.

Nvidia, on the other hand, was locked out of this market altogether. During the same time frame, Kepler and even Maxwell were not a match for AMDs cryptocurrency performance. Now, with Ethereum and Pascal, Nvidias performance is much stronger. Thats likely part of the reason why the two companies see things differently. AMD got burned by this market once already, and Nvidia may feel that its stronger relationships with board partners or greater manufacturing capacity via contracts with TSMC will keep them in a leadership position in graphics.

ExtremeTech recommends that anyone interested in cryptocurrency mining approach the topic the same way you should approach gambling. If you want to take a shot and try to make some profit, feel freebut dont risk any funds you cant afford to lose. Cryptocurrency prices are famously volatile and you may not be able to count on sustained, long-term profits.

Theres a report from Overclock3D that we havent been able to confirm or debunk, claiming that AMDs GPU pricing of 449.99 in the UK ($499 in the US) was only for the launch. Overclockers UKs Gibbo writes:

Now the good and bad news, the good news is AMD are rebating early launch sales to allow us to hit 449.99 on the stand alone black card which has no games. This is a launch only price which AMD at present are saying will be withdrawn in the near future, when if it happens is unknown, but remember do not be shocked if the price jumps nearly 100 in a few days.

We have requested confirmation or explanation of this from AMD, but the company was not able to provide us with a response by the time this story went to press. We will update it when we have more information on the future of Vegas price. It also isnt clear that these price increases, if true, are a global shift or merely reflect UK pricing. And finally, theres the chance the the information given was simply incorrect. A $128.76 price increase on Vega would make it far too expensive to recommend, given its power consumption and performanceunless, of course, the GTX 1080 is kicked up into the stratosphere long-term as well.

See the original post:
AMD Releases Cryptocurrency Mining Driver, May Raise Vega Prices - ExtremeTech

Could Cryptocurrencies Replace Cash? – Investopedia


Investopedia
Could Cryptocurrencies Replace Cash?
Investopedia
At the beginning of the cryptocurrency boom, Bitcoin seemed to be the unquestioned leader. Up until early this year, Bitcoin accounted for the vast majority of the industry's market capitalization; then, in a span of just weeks, Ethereum, Ripple, and ...
Zen Protocol is the next step for cryptocurrency smart-contractsTNW
Will the Bitcoin Fork Continue to Boost the Cryptocurrency's Value?TheStreet.com
US Law Labels Cryptocurrency Illicit Finance TrendThe Merkle
The Market Mogul -Business Insider -Bitcoin News (press release)
all 109 news articles »

Originally posted here:
Could Cryptocurrencies Replace Cash? - Investopedia

WikiLeaks – Vault 7: Projects

Today, June 15th 2017, WikiLeaks publishes documents from the CherryBlossom project of the CIA that was developed and implemented with the help of the US nonprofit Stanford Research Institute (SRI International).

CherryBlossom provides a means of monitoring the Internet activity of and performing software exploits on Targets of interest. In particular, CherryBlossom is focused on compromising wireless networking devices, such as wireless routers and access points (APs), to achieve these goals. Such Wi-Fi devices are commonly used as part of the Internet infrastructure in private homes, public spaces (bars, hotels or airports), small and medium sized companies as well as enterprise offices. Therefore these devices are the ideal spot for "Man-In-The-Middle" attacks, as they can easily monitor, control and manipulate the Internet traffic of connected users. By altering the data stream between the user and Internet services, the infected device can inject malicious content into the stream to exploit vulnerabilities in applications or the operating system on the computer of the targeted user.

The wireless device itself is compromized by implanting a customized CherryBlossom firmware on it; some devices allow upgrading their firmware over a wireless link, so no physical access to the device is necessary for a successful infection. Once the new firmware on the device is flashed, the router or access point will become a so-called FlyTrap. A FlyTrap will beacon over the Internet to a Command & Control server referred to as the CherryTree. The beaconed information contains device status and security information that the CherryTree logs to a database. In response to this information, the CherryTree sends a Mission with operator-defined tasking. An operator can use CherryWeb, a browser-based user interface to view Flytrap status and security info, plan Mission tasking, view Mission-related data, and perform system administration tasks.

Missions may include tasking on Targets to monitor, actions/exploits to perform on a Target, and instructions on when and how to send the next beacon. Tasks for a Flytrap include (among others) the scan for email addresses, chat usernames, MAC addresses and VoIP numbers in passing network traffic to trigger additional actions, the copying of the full network traffic of a Target, the redirection of a Targets browser (e.g., to Windex for browser exploitation) or the proxying of a Targets network connections. FlyTrap can also setup VPN tunnels to a CherryBlossom-owned VPN server to give an operator access to clients on the Flytraps WLAN/LAN for further exploitation. When the Flytrap detects a Target, it will send an Alert to the CherryTree and commence any actions/exploits against the Target. The CherryTree logs Alerts to a database, and, potentially distributes Alert information to interested parties (via Catapult).

The rest is here:
WikiLeaks - Vault 7: Projects

WikiLeaks Turned Down Leaks on Russian Government During US Presidential Campaign – Foreign Policy

In the summer of 2016, as WikiLeaks was publishing documents from Democratic operatives allegedly obtained by Kremlin-directed hackers, Julian Assange turned down a large cache of documents related to the Russian government, according to chat messages and a source who provided the records.

WikiLeaks declined to publish a wide-ranging trove of documents at least 68 gigabytes of data that came from inside the Russian Interior Ministry, according to partial chat logs reviewed by Foreign Policy.

The logs, which were provided to FP, only included WikiLeakss side of the conversation.

As far as we recall these are already public, WikiLeaks wrote at the time.

WikiLeaks rejects all submissions that it cannot verify. WikiLeaks rejects submissions that have already been published elsewhere or which are likely to be considered insignificant. WikiLeaks has never rejected a submission due to its country of origin, the organization wrote in a Twitter direct message when contacted by FP about the Russian cache.

(The account is widely believed to be operated solely by Assange, the groups founder, but in a Twitter message to FP, the organization said it is maintained by staff.)

In 2014, the BBC and other news outletsreported on the cache, which revealed details about Russian military and intelligence involvement in Ukraine. However, the information from that hack was less than half the data that later became available in 2016, when Assange turned it down.

We had several leaks sent to Wikileaks, including the Russian hack. It would have exposed Russian activities and shown WikiLeaks was not controlled by Russian security services, the source who provided the messages wrote to FP. Many Wikileaks staff and volunteers or their families suffered at the hands of Russian corruption and cruelty, we were sure Wikileaks would release it. Assange gave excuse after excuse.

The Russian cache was eventually quietly published online elsewhere, to almost no attention or scrutiny.

In the months leading up to the 2016 U.S. presidential election, WikiLeaks published tens of thousands of potentially damaging emails about Democratic candidate Hillary Clinton and her campaign, information the U.S. intelligence community believes was hacked as part of a Kremlin-directed campaign. Assanges role in publishing the leaks sparked allegations that he was advancing a Russian-backed agenda.

Back in 2010, Assange vowed to publish documents on any institution that resisted oversight.

WikiLeaks in its early years published a broad scope of information, including emails belonging to Sarah Palin and Scientologists, phone records of Peruvian politicians, and inside information from surveillance companies. We dont have targets, Assange said at the time.

But by 2016, WikiLeaks had switched course, focusing almost exclusively on Clinton and her campaign.

Approached later that year by the same source about data from an American security company, WikiLeaks again turned down the leak. Is there an election angle? Were not doing anything until after the election unless its [sic] fast or election related, WikiLeaks wrote. We dont have the resources.

Anything not connected to the election would be diversionary, WikiLeaks wrote.

WikiLeaks schedules publications to maximize readership and reader engagement, WikiLeaks wrote in a Twitter message to FP. During distracting media events such as the Olympics or a high profile election, unrelated publications are sometimes delayed until the distraction passes but never are rejected for this reason.

WikiLeakss relationship with Russia started out as adversarial. In October 2010, Assange and WikiLeaks teased a massive dump of documents that would expose wrongdoing in the Kremlin, teaming up with a Russian news site for the rollout. We have [compromising materials] about Russia, about your government and businessmen, Assange told a Russian newspaper.

We will publish these materials soon, he promised.

Russians are going to find out a lot of interesting facts about their country, WikiLeaks spokesman Kristinn Hrafnsson said at the time.

In November 2010, WikiLeaks began to release documents from its cache provided by Chelsea Manning, which included cables from U.S. diplomats around the world, including Russia.

WikiLeaks partnered with the Russian newspaper Novaya Gazeta, but only a handful of stories were published out of almost a quarter of a million files from the U.S. Embassy in Moscow. Novoya Gazeta paid for exclusive access to the documents, according to John Helmer, a foreign correspondent in Moscow writing for Business Insider.

WikiLeaks says there was no financial aspect to the publishing partnership with Novaya Gazeta, which did not respond to a request for comment. We do not have insight into the publication decisions of [Novaya Gazeta], WikiLeaks told FP.

Meanwhile, Assanges position on Russia was evolving. Assange in 2012 had his own show on the Kremlin-funded news network RT, and that same year, he produced episodes for the network where he interviewed opposition thinkers like Noam Chomsky and so-called cypherpunks.

Questions about Assanges links to Russia were raised last year, when the Daily Dot reported that WikiLeaks failed to publish documents that revealed a 2 billion euro transaction between the Syrian regime and a government-owned Russian bank in 2012. Details about the documents appear in leaked court records obtained by the Daily Dot, which were placed under seal by a Manhattan federal court.

A WikiLeaks spokesperson told the Daily Dotthat no emails were removed from what the organization published. The spokesperson also suggested the Daily Dot was pushing the Hillary Clinton campaigns neo-McCarthyist conspiracy theories about critical media.

Assange believes that U.S. officials hoping to damage his reputation leaked the court records, according to the messages provided to FP.

Theres a passing claim that the 500 pages comes from the US governments investigation into Wikileaks, one message from WikiLeaks reads. If true, the US government appears to be leaking data on the Wikileaks investigation, which fabricated or angled to help HRC. Huge story that everyone missed.

WikiLeaks again told FP that the story is false but did not elaborate.

When Novaya Gazeta reported in April 2016 on the 11.5 million documents known as the Panama Papers, which exposed how powerful figures worldwide hide their money overseas, Assange publicly criticized the work. He suggested that reporters had cherry-picked the documents to publish for optimal Putin bashing, North Korea bashing, sanctions bashing, etc. while giving Western figures a pass.

In fact, news outlets involved in publishing leaks reported on a number of Western figures, including then-British Prime Minister David Cameron.

For me it was a surprise that Mr. Assange was repeating the same excuse that our officials, even back in Soviet days, used to say that its all some conspiracy from abroad, Roman Shleynov, a Russian investigative reporter, said in an interview with the New York Times.

WikiLeaks says Assange didnt specifically challenge Novaya Gazeta or the other news outlets that worked on the Panama Papers, despite Assanges public statements to the contrary.

There should be more leaks from Russia, Daniel Domscheit-Berg, a former German spokesman for WikiLeaks, said in an interview with France 24 in March. He suggested that since WikiLeakss readers were mostly English-speaking, there wasnt enough demand.

By June 2016, Assange had threatened to dump files on Clinton that would be damaging to her campaign prospects. A month later, on July 22, WikiLeaks published tens of thousands of emails out of the Democratic National Committee preceding the massive dumps in October of emails belonging to Clinton campaign chairman John Podesta.

In late August 2016, when WikiLeakss Clinton disclosures were in full swing, Assange said he had information on Trump but that it wasnt worth publishing. (In a message to FP, WikiLeaks now says the organization received no original documents on the campaign that did not turn out to be already public.)

The problem with the Trump campaign, Assange said at the time, is its actually hard for us to publish much more controversial material than what comes out of Donald Trumps mouth every second day.

Photo credit: JUSTIN TALLIS/Getty Images

Twitter Facebook Google + Reddit

More here:
WikiLeaks Turned Down Leaks on Russian Government During US Presidential Campaign - Foreign Policy