Donald Jr. turns to WikiLeaks founder Julian Assange as an expert in the Trumps’ war on CNN – Daily Kos

Julian Assange

Somehow, Donald Trump Jr. and Julian Assange are united in outrage at CNN over the video Donald Trump tweeted of himself beating a figure with the CNN logo in place of a head. (I know. I cant believe I just typed that, either.)

The back story is as twisted as youd expect. After Trump the father tweeted aGIF of himself in his days as an occasional WWE character tackling and beating a wrestler with the CNN logo edited onto his face, CNNfound the Reddit userwho initially created the image, got an apology from him, and said they wouldnt publish his name due to his remorse, but that CNN reserves the right to publish his identity should any of that change. The same Reddit user, by the way, previously posted pictures of CNN staff with Stars of David next to their heads and the text Something strange about CNN...cant quite put my finger on it.So its not like hes just apologizing for the Trump wrestling thing.

To Trumpland, its a total outrage that if the same guy returns to making violent and/or anti-Semitic memes about CNN, the network will release his identity. Hashtag CNNBlackmail.WikiLeaks founder Julian Assange dove right in with the claim that thiswas a crime. Which Uday Trump quickly cited:

Not that this should be a surprise, given that the Trumps havea history of pointing to Assange's expert opinion. But Uday wasnt done.

A Trump, spreading misinformation? Surely not!

As a reminder in all of this, were talking about a network that went out and specifically hired Trump-supporting commentators during the Republican primaries, then hired Trumps former campaign manager while he was still collecting money from the Trump campaign. But Trump demands 100% fealtyand hes looking to make an example of one of the biggest, blandest news outlets he can to frighten the rest of the media into line while telling his supporters to believe that anything they dont want to hear is fake news.

View original post here:
Donald Jr. turns to WikiLeaks founder Julian Assange as an expert in the Trumps' war on CNN - Daily Kos

Pam Sandwich! Baywatch Beauty Anderson Juggling Multiple Men – Radar Online

Over-the-hill sexpot Pamela Anderson is bedding a bevy of brand-new boy toys and keeping treasonous squeeze Julian Assange on a string!

The former Baywatch bombshell, 50,has been caught canoodling with a couple of French pastries soccer star Adil Rami, 31, and playboy Romain Chavent!

Pam cant decide which guy she likes best, so shes dating them all! spilled a pal to RadarOnline.com.

The unlucky-in-love former pinup has been linked to WikiLeaks founder Assange, 46, since late last year. Hes been on virtual lockdown in Londons Ecuadorian embassy since 2012 after skipping out on sexual assault charges in Sweden.

PHOTOS: Short Hair Dont Care! Did Pamela Anderson Get The Chop?

But Anderson cant stop gushingabout the silver-haired hacker.

Hes a good person who cares about the world, Anderson has said. He is funny, sensitive, romantic, surprisingly resourceful.

Even so, Andersons been quick to sample hunky French side dishes!

And why not? said her pal. Pam doesnt want to be tied down Shes sampling a variety, and loving every minute of it.

PHOTOS: Pamela Andersons Gut BUSTS Out Of Her Dress Beer Belly Or Baby Bump?

The mom of two ooh-la-la-ed with Rami in glitzy St. Tropez, stepping out with the sports stud on June 22 and 23.

Pam adores Adil! Hes such a gentleman with her, looping her arm through his, opening doors for her, said the pal.

Her ex Tommy Lee never treated her this special and neither did Rick Salomon during their two marriages. Pam says she feels like a princess when shes with Adil. He knows how to please her!

But barely two weeks before their seaside romp, Anderson steamed up the scene at Hollywood hot spot Avenue with 41-year-old Chavent!

PHOTOS: Pamela Anderson Through the Years

Pam feels very protected when shes with Romain. She loves that hes so strong and handsome, her pal revealed.

Despite her public hookups, Pams bizarre relationship with slippery hacker Julian still continues to sizzle.

The Internet outlaws WikiLeaks website has published stacks of classified information that has compromised American security interests.

But on June 17, Anderson gushed in a social media post about why she thinks exiled Julian is so sexy.

PHOTOS: Pamela Anderson Reveals Rape, Molestation and Gang Rape During Charity Foundation Speech

Surely the sexiest qualities in a man are bravery and courage, Anderson swooned. Sexiness in a man is showing strength. Having convictions and having the courage to stand by them.

She concluded: I love you.

We pay for juicy info! Do you have a story for RadarOnline.com? Email us at tips@radaronline.com, or call us at 800-344-9598 any time, day or night.

See the rest here:
Pam Sandwich! Baywatch Beauty Anderson Juggling Multiple Men - Radar Online

Cryptocurrency Has Its Potato Salad Moment With the Useless Ethereum Token – Observer

Its been almost three years since Zack Brown raised $55,000 on Kickstarter for a potato salad. His goal was $10. He wanted to raise the money in order to pay for making the midwestern cookout staple for the first time.

I made that Kickstarter project to get a laugh out of seven people, so the money and attention were a shock, Brown wrote the Observer in an email. The original intent of the joke was more like, This is funny because its not what Kickstarter is for.' But it didnt take long for him to see that hed created a satire of the site on the site itself.

My first two thoughts were This is ridiculous and How can I get in on this?

But when Brown raised far more money than he ever thought he would, the Columbus, Ohio, resident opted to actually do something with the cash and make a cookbook devoted to the staple of Midwestern picnics,The Peace, Love and Potato Salad Cookbook.It came out two years after the campaign ended, which isnt bad considering the fact that he didnt launch the campaign to make a book and hed never made a potato salad before.

The Useless Ethereum Token logo. Thats a cityscape (no its not). Twitter

Today, theres a new, even more ephemeral way to raise money: by creating a new cryptocurrency. Called an initial coin offering or ICO, entrepreneurs have been creating new digital currencies (like Bitcoin) in order to support various projects. Fortunately, just as it starts to crack mainstream attention, ICOs have gotten their own answer to the potato salad campaign. Its called the Useless Ethereum Token(UET), and its creator will absolutely sell you cryptocurrency good for absolutely nothing.

It went on sale yesterday and runs through July 11.

The UET ICOtransparentlyoffers investors no value, so there will be no expectation of gains, its creator, who only goes by UET CEO, writes on its website. Rememberthis is acompletely honestICO, which means I dont want anyone to mistakenlyexpectthe value of the tokens to go up, either. Theyre called Useless Ethereum Tokens for a reason.

We can think of one other cryptocurrency that came out and promised buyers nothing but the digital asset itself: bitcoin. In the end, every new currency of any kind is a satire on the very strange idea of money.

We wrote about a decentralized company, The DAO, which was working well until a security flaw made it collapse horribly. We wrote about the first Bitcoin felons ICO-poweredsecond act after prison, which fizzled (according to a profile in Fortune, hes glad). Recently, we covered the Basic Attention Token designed by a major web pioneer to change the economy for eyeballs online. It sold out almost instantly. Soon, messaging unicornKik is going to have a crowdsale to foster a new venture capital-independent ecosystem of developers.

Its such a buzzy world thatThe New York Times ran a deep dive recently begging the question: how many millions will get raised in this space for the Securities and Exchange Commission starts putting up red flags? UET CEO sees it much the same way.

I saw that people were investing in ICO after ICO, with each having its own slew of problems (both technical and in principle) and still making absurd amounts of money, UET CEO wrote the Observer in an email. My first two thoughts were This is ridiculous and How can I get in on this? I didnt have a product but I realized that people didnt really care about the product. They cared about spending a little bit of money, watching a chart and then withdrawing a little bit more money. So why not have an ICO without a product, and do so completely transparently just to see what happened?

The satire is actually built into the smart contract as well. Buyers get 1 UET for every 0.1 Ether (ETH) invested, plus a bonus. Every UET bought comes with free UET equal to the number of ETH invested. So, as of this writing, someone who paid 0.1 ETH right now would get 1 UET from the base formula plus 52 bonus UET, because people have put in 52 ETH so far.

Plus, the system will also randomly give away some bonus tokens along the way.

This, along with the bonus blocks were completely intentional, both to mirror some of the goofy crap other ICOs have tried to do in the name of fairness or whatever, and to further highlight that these tokens arent meant to be attached to any real value, UET CEO wrote. What good is an ICO if it just gives away tokens right?

Tokens get released right away. Prices dont swing with ETHs value.

Most crypto watchers online like the gag. We liked this exchange on an Ethereum investor subreddit.

This guy gets it. Reddit

The only way to buy in is with Ethereum, which also provides most of the underlying code. So far, UET has acquired 52 ETH, worth an equivalent of nearly $14,000. Over $1,000 worth has gone in since we have been working on this post. The site continuously updates with investments, but it can all also be verified on Etherscan, a third party site that makes the blockchain records a bit more comprehensible.

So whats UET CEO trying to say with this project? Well leave that for readers to decide, but remember that the best jokes tend to be made by folks who care about a subject enough to understand it well.Will the anonymous entrepreneur imitate Brown and do something substantive at the end of the crowdsale? Or would it be more in the spirit of the project if he just took all the money and blew it on an epic night at Applebees?

Read more here:
Cryptocurrency Has Its Potato Salad Moment With the Useless Ethereum Token - Observer

Cryptocurrencies: It’s Not Like Buying a Lottery Ticket – WealthManagement.com

Prices for units of cryptocurrencies have been soaring, prompting some folks to ask if we are nearing a cryptocurrency bubble? In a recent piece on Advisor Perspectives, economist and mathematician Michael Edesess says we probably wont see a true bubble and bust of valuations, as there are aspects of the asset that would prevent such a fate. Edesess, adjunct associate professor and visiting faculty at the Hong Kong University of Science and Technology and chief investment strategist of Compendium Finance, warns advisors that cryptocurrencies can be volatile, but it'snot like betting in a casino or buying a lottery ticket, he argues. In some ways, investing in cryptocurrencies is like investing in art or collectibles, or even gold. Its scarcity may propel increases in value, at least for those cryptocurrencies that continue to have value at all. But cryptocurrency has the advantage of being much more easily used as a medium of exchange than art, collectibles, or gold, he writes.

Boomers Falling Short Of Retirement Goals

According to data released by Legg Mason, Baby Boomers have less than half of the savings they think they will need for retirement. The generation has an average of $263,000 saved in defined contribution plans, while reporting they will need $658,000. Even older boomers, aged 65 to 74, only have an average of $300,000 saved. Thomas Hoop, the executive vice president and head of product and business development at Legg Mason, said advisors could maybe help close the gap by helping them save more and educating them how to invest DC assets properly. Hoop said older investors should consider a larger, diversified allocation to equities that includes emerging markets and European markets that have lower valuations and higher dividend yields. An overly conservative approach to D.C. investing can almost defeat the purpose of the plans benefits for investors who want to achieve their long-term goals.

SEI Steps into the Family Office Arena

SEI, a provider of back office operations for financial services firms, has acquired Archway Technology Partners, LLC, which sells technology and services to family offices. Archways specialized technologies and deep knowledge of the private wealth services industry give us a more powerful, differentiated solution to a $7 trillion global family-office market that has been underserved by legacy service providers, said Steve Meyer, executive vice president of SEI and head of its Investment Manager Services division. The acquisition positions SEI as a market leader in the single and multi-family office services arena.

Excerpt from:
Cryptocurrencies: It's Not Like Buying a Lottery Ticket - WealthManagement.com

WikiLeaks: CNN extorted apology from creator of Trump wrestling gif – News965

A bold claim of blackmail and extortion by CNN lit up social media Wednesday.

The Reddit user, HanA**holeSolo, who created the image of President Donald Trump wrestling CNN has apologized for his actions, but a handful of conservative media outlets are accusing the network of blackmailing the user.

A web article, posted on CNNs website, details the efforts used to track down the Reddit user and dig into his posting history. In a thorough Reddit post, the user apologized for creating the image and for previously posting racist, bigoted, and anti-semitic content. The article explains the contents of his apology.

CNN is not publishing "HanA**holeSolo's" name because he is a private citizen who has issued an extensive statement of apology, showed his remorse by saying he has taken down all his offending posts, and because he said he is not going to repeat this ugly behavior on social media again. The article reads, In addition, he said his statement could serve as an example to others not to do the same.

WikiLeaks, Eric Trump, conservative outlets and other Twitter users are taking issue with the next line in the article that reads CNN reserves the right to publish his identity should any of that change.

Some called it extortion, unethical and possibly illegal.

As of the time this article was posted, CNN has not identified the Reddit user in question.

Continued here:
WikiLeaks: CNN extorted apology from creator of Trump wrestling gif - News965

FDP Legislative Committeeman: I Would ‘Pull the Trigger’ on Julian Assange and Edward Snowden – Sunshine State News

A once little-known Democratic operative and member of the Miami Democratic Executive Committee has found himself in hot water after threatening on Twitter to kill WikiLeaks founder Julian Assange and whistleblower Edward Snowden.

Evan Ross is a budding young Democratic lobbyist heavily involved in the South Florida Democratic scene. Ross works as a lobbyist, served as president of the Miami-Dade Young Democrats and was the Miami Democratic Partys district chairman from 2011-2012. Ross star has continued to climb. At one point he was even named Young Democrat of the Year. FDP chair Stephen Bittel hand-picked Ross to serve on the partys legislative committee, working hand-in-hand with state lawmakers to push the partys agenda through the halls of the Florida Capitol. Ross has kept a relatively low profile -- until now. It all started when hetook to Twitter Friday evening in a rant centered around WikiLeaks founder Julian Assange and whistleblower Edward Snowden. "He exposed classified American secrets that endangered lives. Ross wrote at the time. "He and his buddy Edward Snowden both deserve to meet their maker. I'd be happy to pull the trigger on both of those too." It didnt take long for Assange to catch wind of the threats and the Australian computer programmer quickly tweeted out a response, screenshotting the tweets and trashing Ross as a #tolerantliberal. Assanges Twitter account has nearly 250,000 followers, some of whom went after Ross for making the comments. Twitter users flooded Ross mentions, criticizing him for making the comments. Some users even sent him death threats. Yet, in spite of the backlash, Ross refused to back down from the statements, saying he had no regrets about expressing his thoughts. "I believe strongly in the right to free speech, but I won't be bullied into trading my patriotism for political correctness by Julian Assange or his army of Twitter trolls," Ross wrote in an email to the Miami New Times.

Ross later locked his Twitter account and accused Assange of leading a bullying campaign against him, which some users were quick to criticize.

You cant threaten someones life and then pull the theyre bullying me excuse, wrote one user. According to various sources, not everyone in the Democratic Party is happy about Ross comments. Two sources within the Miami Democratic Party told the New Times they would be filing a complaint in the party over the issue, which has only seemed to intensify as the days go on. Assange and Snowden have made headlines in recent years for blowing the lid off of national security secrets. Snowden made headlines in 2013 after leaking and exposing the National Security Agencys plans to spy on average Americans, which ultimately led to criminal charges of theft of government property, and two counts of violating the Espionage Act. Snowden later fled the country and sought asylum in Russia. Assange heads up WikiLeaks, which routinely publishes secret information and news leaks. In 2016, WikiLeaks made national headlines after releasing thousands of emails from the Democratic National Committee which suggested DNC chair Debbie Wasserman Schultz, longtime South Florida congresswoman,and other top Democratic officials unfairly favored Hillary Clinton over U.S. Sen. Bernie Sanders during the Democratic primary. Sunshine State News attempted to contact the Florida Democratic Party for a statement but had not received a response at the time of this articles release.

Reach reporter Allison Nielsen by email atallison@sunshinestatenews.comor follow her on Twitter:@AllisonNielsen.

Read more:
FDP Legislative Committeeman: I Would 'Pull the Trigger' on Julian Assange and Edward Snowden - Sunshine State News

Tribune Editorial: Lawsuit should get to the truth about NSA spying in Utah – Salt Lake Tribune

Drake continued, "The new mantra to intercepting intelligence was 'just get it' regardless of the law."

Shameful.

It is becoming clear that such a lack of candor from our government officials has become a feature of our post-9/11 surveillance state, and not a bug. Perhaps the infringements of our freedoms necessitate an end to the entire post-9/11 project. But with the billion dollar Utah Data Center sitting right-smack in Salt Lake County, it's doubtful we could successfully kill the beast that is the surveillance industry.

Perhaps we, too, like Jonathan Swift, need "A Modest Proposal." It would be a shame to let the texts, emails, phone records and Google searches of Utah's most popular citizens go to waste. We paid for these records, let's make them public.

Just think, no one would need private investigators to catch husbands texting old girlfriends. You could easily recover your mom's old meatloaf recipe she emailed years ago.

And all those public officials who, when under investigation, manage to lose thousands of emails, as one-time IRS official Lois Lerner did. And former Utah Attorney General John Swallow, who just happened to leave his tablets on airplanes. Call up the NSA. Problem solved!

Think of the money newspapers and community watchdogs would save in GRAMA / FOIA requests. And how would life be different if police, prosecutors, legislators and other government officials knew their communications would be discoverable?

Deception begets deception, poison begets poison. The Fourth Amendment means what it says, and the government should not have power to spy on Americans without a warrant. In this current case, U.S. Department of Justice officials have until March to disclose relevant documents. Let's hope they can do so honestly.

Continue reading here:
Tribune Editorial: Lawsuit should get to the truth about NSA spying in Utah - Salt Lake Tribune

Malcolm Turnbull faces Silicon Valley fight on encryption – The Australian Financial Review

Turnbull has been at pains to emphasise the government does not want a "so called" backdoor to access devices and messages. But that is not how the technologists frame this debate.

If Malcolm Turnbull presses forward on threats to force technology companies to better cooperate on countering terrorism by unlocking secret encrypted messages and data belonging to suspected violent plottersthe Prime Minister can expect a heated tussle with America's powerful Silicon Valley.

Turnbull intends to nudge world leaders at the Group of 20 in Germany this week to pressurepredominantly US-based tech giants toshare more readily with authorities the secret digital behaviour of criminal suspects using smartphones and messaging apps.

The world's most valuable companies such as Apple and Facebook are in the crosshairs of like-minded political leaders from Australia, Germany and the United Kingdom.

Criminals are using encrypted devices such as the iPhone and messaging apps likeWhatsApp,Wickr, Telegram Messenger, Signal,SilentCircle,ChatSecureand even the Sony Play Station 4 to covertly plot their crimes.

Even though Donald Trump has presented himself as a tough law and order leader and has often been at loggerheads with progressive Silicon Valley, it appears unlikely that the US President will readily embrace Turnbull's offensive against American tech firms.

Zachary Goldman, co-founder of the Center for Cyber Security at New York University, says: "These are American companies, so in terms of economic competitiveness you are potentially putting at risk the darlings of the American economy."

"The European and Australian governments may not have the same concerns."

Encryption is effectively mathematical algorithms designed to stop hackers accessing information on phones and messaging app communications.

More than 1 billion transactions globally a day are encrypted, including online banking and internet shopping.

Silicon Valley is paying close attention to Australia's posturing.

While Australia is more than a year behind the US in the so-calledprivacy versus securitydebate between tech firms and national security personnel,the battle lines are already well defined.

Apple chief executive Tim Cook wrote an open letter to customers last year after the world's most valuable company refused to build a system to help the FBI unlock the iPhone of a San Bernardino terrorism culprit who jointly killed 14 people.

The FBI wanted to see who else the husband and wife killers had been communicating with and their recent places of movement, to help identity possible accomplices and stop any future attack.

Cook stood firm, arguing that Apple had a duty to protect personal information from conversations, photos, calendars, contacts, financial information and health data.

"The government is asking Apple to hack our own users and undermine decades of security advancements that protect our customers including tens of millions of American citizens from sophisticated hackers and cybercriminals," he wrote."The same engineers who built strong encryption into the iPhone to protect our users would, ironically, be ordered to weaken those protections and make our users less safe."

Trump, then the Republican presidential frontrunner, said at the time that Apple should comply with the California judge's order to help the FBI break into the phone.

"But to think that Apple won't allow us to get into her cell phone.

"Who do they think they are?"

Since the heat of the election, President Trump and US lawmakers have sat pat, in effect siding with technologists, privacy advocates and libertarians suspicious of government intrusion.

These groups have argued that weakening encryption will make people and businesses more vulnerable to cyber hacking criminals.

Turnbull, a former internet entrepreneur, has been at pains to emphasise the government does not want a"backdoor" to access devices and messages.

But that is not how the technologists frame this debate and they view the Prime Minister's argument as semantics.

The tech sector argues that any weakening of encryption is in effect a backdoor for the good guys and the bad guys.

Once a decoding keyis built or a vulnerability is exposed, hackers will do their best to hunt down the decryption method.

AmieStepanovich, US policy manager at Access Now, which is funded by tech firms such as including Facebook, Google, Microsoft, Yahooand human rights groups, says Australia is in a difficult position but risks weakening digital security for individuals and business.

"Weakening encryption won't work because the criminals will beincentivisedto get access to the tools," she says.

"Across the board it will lower the security of the rest of the world."

The government sees it differently.

As the Prime Minister hinted at in interviews with Fairfax Media and the ABC this week, the government believes the tech companies are already aware of flaws and weaknesses in their systems.

With this knowledge, one policy under consideration is to legally compel the companies to give their best effort to access the correspondence and data, without threatening the intellectual property of the tech firms.

The government believes this is more akin to exploiting a vulnerability, not creating a backdoor.

The government may also argue that digital companies already spend billions of dollars protecting their most precious and sensitive IP such as source code, sothe firms could alsodo the same for any information about how to get around their encrypted systems.

Chris Swecker, a retired head of the FBI criminal investigative division, says tech advocates have created an "artificial distinction" between lawful intercept of old tech like cell phone calls and pager messages, compared to new encrypted communications.

"Technology moved way ahead of the legal structure," he says.

"We can't put ourselves in a position where the only guys we catch are the dumb criminals who don't use cutting edge modern technology."

"I believe this technology communications material should be available via a valid court order."

In echoes of that, Turnbull saidthis week that the rule of law must extend to cyber with the appropriate legal authority, such as a court order or warrant.

"We cannot allow these systems to be used as they are at the moment to enable terrorists and other criminals to basically conceal themselves to operate in the dark, a dark that we cannot illuminate and the law must be able to reach into those dark crevices and so that our agencies are able to keep us secure."

Still, any such move by Turnbull would also undermine the commercial interests of tech firms.

Since the 2013 revelations from rogue National Security Agency contractor Edward Snowdenabout the extent of US government spying, sometimes assisted by US telco and technology companies, Silicon Valley has become more circumspect about being seen tocooperate with law enforcement.

Turnbull knows from his time as communications minister that US tech firms like IBM and Cisco Systems suffered commercially in China because the Snowden affair raised perceptions that American hardware vendors were leaving backdoors open for NSA spooks.

If customers believe Silicon Valley is in cahoots with US spies, sales are likely to suffer, especially in large consumer markets such as China and Russia that are suspicious of the US government.

Furthermore, a related argument by technologists is that is that if Western governments like Australia force tech firms to decrypt private data and messages, less trusted foreign regimes such as in China and Russia will do the same against citizens from overseas.

The government has considered this problem too, but is also aware that presently nothing stopssuch regimes already doing this.

Indeed, Russia has tried to compel digital companies to share their source code, while China is forcing tech firms to retain locally their source code and intellectual property.

Encryption was discussed by Attorney General GeorgeBrandisand "Five Eyes"intelligence counterparts from Canada, New Zealand, the United Kingdom and US last week.

NYU's Goldman says there is no costless solution for governments and societies.

"The question is what costs are you willing to bear to accept risk?"

Critics of government-mandated decryption suggest other compromise options such as better training law enforcement to tap into digital data and for government agencies to improve their hacking techniques.

In the San Bernardino Apple iPhone case, the FBIultimately paid a third-party firm to successfully break the device's pass code.

Go here to read the rest:
Malcolm Turnbull faces Silicon Valley fight on encryption - The Australian Financial Review

Shielding data from the "five eyes": we need to stand up for encryption – Open Democracy

Street art by Banksy near Hyde Park, London. Credit: David Maddison/Flickr. Some rights reserved.The Five Eyes is a surveillance partnership of intelligence agencies consisting of Australia, Canada, New Zealand, the United Kingdom, and the United States. According to a joint communique issued after the meeting, officials discussed encryption and access to data. The communique states that encryption can severely undermine public safety efforts by impeding lawful access to the content of communications during investigations into serious crimes, including terrorism.

In the letter organized by Access Now, CIPPIC, and researchers from Citizen Lab, 83 groups and security experts wrote, we call on you to respect the right to use and develop strong encryption. Signatories also urged the members of the ministerial meeting to commit to allowing public participation in any future discussions.

Read the full letter here.

Security experts and cryptographers are as united in their views on encryption as scientists are on climate change.

Massive surveillance operations conducted by the Five Eyes partnership inherently put the human rights of people around the world at risk. The joint communique commits to human rights and the rule of law, but provides no detail as to how these powerful, secretive spy agencies plan to live up to those commitments. We call for public participation and meaningful accountability now; otherwise, those commitments are empty. Amie Stepanovich, U.S. Policy Manager at Access Now

Our political leaders are putting people around the world at greater risk of crime when they call for greater powers to weaken our digital security. Security experts and cryptographers are as united in their views on encryption as scientists are on climate change. Politicians need to listen to them before they make decisions that could put us all at risk. Jim Killock, ORG

Attempting to undermine the free use and development of strong encryption technology is not only technologically misguided, it is politically irresponsible. Both law enforcement and intelligence agencies have access to more dataand more powerful analytical toolsthan ever before in human history. Measures that undermine the efficacy or public availability of encryption will never be proportionate when weighed against their profound threat to global human rights: encryption is essential to the preservation of freedom of opinion, expression, dissent, and democratic engagement. Without it, meaningful privacy, trust, and safety in the digital sphere would not be possible. Lex Gill, Research Fellow, Citizen Lab, Munk School of Global Affairs

Encryption protects billions of ordinary people worldwide from criminals and authoritarian regimes. Agencies charged with protecting national security shouldnt be trying to undermine a cornerstone of security in the digital age. Cynthia Wong, Senior Internet Researcher, Human Rights Watch

Encryption is used by governments, businesses, and citizens alike to secure communications, safeguard personal information, and conduct business online. Deliberately weakening encryption threatens the integrity of governance, the safety of online commerce, and the interpersonal relationships that compose our daily lives. We must not sacrifice our core values to the threat of terrorism: the solution to such threats must entail better protecting our basic rights and the technologies that advance them. Christopher Parsons, Research Associate and Managing Director of the Telecom Transparency Project at the Citizen Lab, Munk School of Global Affairs

Encryption is a necessary and critical tool enabling individual privacy, a free media, online commerce and the operations of organisations of all types.

Calls to undermine encryption in the name of national security are fundamentally misguided and dangerous. Encryption is a necessary and critical tool enabling individual privacy, a free media, online commerce and the operations of organisations of all types, including of course government agencies. Undermining encryption therefore represents a serious threat to national security in its own right, as well as threatening basic human rights and the enormous economic and social benefits that the digital revolution has brought for people across the globe. Jon Lawrence, EFA

Assurances of strong encryption not only benefit civil liberties and privacy, but the economy as well. A vibrant and dynamic internet economy is only possible if consumers and users trust the environment in which theyre conducting business. While law enforcement and intelligence services have legitimate concerns over their ability to access data, those concerns need to be balanced with the benefits encryption provides to average users transacting in cyberspace. A strong Internet economy, buttressed by the trust that encryption produces, is vital to national interests around the globe. National policies should support and defend, not weaken and abridge, access to encryption. Ryan Hagemann, Niskanen Center

The strength of the tools and techniques that our government and members of the public have and use to secure our nation and protect our privacy is of significant public interest. Transparency and accountability around a nations policy regarding the use of encryption is a bedrock importance in a democracy, particularly given the potential of backdoors to put billions of online users at greater risk for intrusion, compromise of personal data, and breaches of massive consumer or electoral databases. The democracies in the Five Eyes should be open and accountable to their publics about not only the existence of these discussions but their content, removing any gap between what is being proposed and the consent of those governed by those policies. Alex Howard, Sunlight Foundation

Encryption is a vital tool for journalists, activists, and everyone whose lives and work depend on using the internet securely. It allows reporters to protect their confidential sources from reprisal, and to fearlessly pursue stories that powerful actors dont want told. It offers protection from mortal danger for dissidents trying the communicate under repressive regimes. Undermining the integrity of encryption puts lives at risk, and runs directly counter to the mandate of the Five Eyes Signals Intelligence agencies to keep their citizens safe. Tom Henheffer, Executive Director, Canadian Journalists for Free Expression

The answer to concerns on going dark is to help bring our law enforcement and counterterrorism officials into the future, not send encryption to the past. We hope to hear back from the Five Eyes that they were looking for how to adapt to digital security measures, not break them to the detriment of everyday Americans and our national security. As Five Eyes leaders work on a strategy to protect against cyberattacks, it is important to have a transparent process and cooperation between governments and civil society without stifling innovation or weakening other parts of security. Austin Carson, Executive Director, TechFreedom

Strong encryption is essential for modern society. Broken technologies undermine commerce, security, and human rights. Jeramie Scott, EPIC

Any attempt by the U.K. government to attack encrypted messengers would be nothing less than an attack on the right to a private conversation.

Any attempt by the U.K. government to attack encrypted messengers would be nothing less than an attack on the right to a private conversation. Far from making the internet safer, by undermining the technology that protects everything from our bank accounts to our private conversations, governments around the world are putting us all at risk. Transparency is vital around any coordinated plans that could jeopardize both our security and our rights. Silkie Carlo, Policy Officer, Liberty

We increasingly rely on a secure internet for work, personal relationships, commerce, and politics. While we support justifiable lawful intercept with appropriate oversight, we dont think we should be seriously weakening the security of the internet to achieve it. Attempts to weaken encryption will do more damage to our society and our freedom than the possible threats its meant to be protecting us from. Thomas Beagle, Chairperson, NZ Council for Civil Liberties

All sensitive personal data must be encrypted as a matter of human rights to privacy, especially health data, i.e., all information about our minds and bodies, wherever it exists. Today health data is the most valuable personal data of all, the most attractive to hackers, and the most sold and traded by the massive, hidden global health data broker industry. Dr. Deborah Peel, Patient Privacy Rights

We lock our devices for good reason. Introducing backdoors weakens security and violates our right to privacy. The very existence of backdoors means unwelcome guests will come knocking. Linda Sherry, Director of National Priorities, Consumer Action

Originally posted here:
Shielding data from the "five eyes": we need to stand up for encryption - Open Democracy

Weakening encryption is an attack on our freedom – Red Flag

In the wake of the recent terrorist attacks in London, there is a renewed attempt by global governments to increase surveillance of the internet.

Taking aim at encryption, Malcolm Turnbull stated that, despite it being a vital piece of security for every user of the Internet encrypted messaging applications are also used by criminals and terrorists at the moment much of this traffic is difficult for our security agencies to decrypt, and indeed for our Five Eyes partners as well.

In June, attorney-general George Darth Brandis, along with his Five Eyes counterparts from the UK, US, Canada and NZ, met in Ottawa to discuss ways to weaken encryption and pressure the tech industry to build back doors through which they can spy on global communications.

In response, a joint statement by 83 organisations and individuals from these five countries opposed these plans. The executive officer of Electronic Frontiers Australia, Jon Lawrence, said, Calls to undermine encryption in the name of national security are fundamentally misguided and dangerous. Jim Killock, executive director at the UKs Open Rights Group, said, Security experts and cryptographers are as united in their views on encryption as scientists are on climate change.

At the time of writing, we dont know what decisions were made at the Five Eyes ministerial meeting, but new attempts to circumvent encryption reflect the ways that state surveillance has changed since revelations from US whistleblower Edward Snowden.

In 2013, Snowden shocked the world when he revealed that the US and its allies had created the largest and most complex system of state surveillance that has ever existed. One of the US National Security Agencys most invasive programs was XKeyscore, a searchable database with millions of peoples emails, web browsing histories and more. This also allowed for real-time monitoring of almost any individual around the world while they used the internet.

Just four years later, the state of computer security has changed immensely, making this surveillance more difficult. According to a report published in February by the Electronic Frontiers Federation, more than half of all internet traffic is now encrypted. The expansion of Virtual Private Network services and use of the Onion Router (TOR) has made it easier for everyone to remain anonymous online. However, the development that is of most concern to the likes of the NSA is the widespread use of encrypted mobile devices and messaging applications such as Signal and WhatsApp.

These applications use a method called end-to-end encryption in which messages are encrypted, and the tools to decrypt those messages exist only on the device of the sender and receiver. Therefore, a company like WhatsApp cannot read the messages sent through its servers. As a WhatsApp spokesperson said in 2016 as part of an ongoing court case brought by the Brazilian government, We cannot share information we dont have access to.

Years before James Comey began presenting himself as the supposed good guy of the US establishment, the then FBI director railed against the use of domestic encryption tools. In 2015 he stated, If the challenges of real-time interception threaten to leave us in the dark, encryption threatens to lead all of us to a very dark place.

He pressured companies such as Apple to build back doors to bypass encryption. While the intelligence agencies recognise that they cannot currently break modern encryption algorithms, they have focused their resources on trying to get around them by hacking directly into mobile devices.

This strategy was demonstrated in March when whistleblower website WikiLeaks released Vault 7, the largest ever publication of confidential documents leaked from the CIA. Additional leaks this year by hacking group Shadow Brokers have further revealed the extent of the intelligence agencies hacking capabilities. These documents show that the US has been developing, purchasing and stockpiling security vulnerabilities in Apple and Android mobile devices. Exploiting these vulnerabilities has allowed them to read WhatsApp or Signal messages as they are being typed or read.

One of the most damning leaks in Vault 7 revealed that the CIA had discovered how to turn Samsung Smart TVs into covert listening devices, even when they are turned off.

The recent WannaCry and Petya ransomware attacks, which caused immense damage across the world, both used security holes codenamed EternalBlue that had been stockpiled by the CIA and deliberately left open. While the CIA did not intend these vulnerabilities to be used in this way, it is the inevitable result of keeping software insecure and creating back doors.

With leaks from the CIA and the NSA exposed, these security flaws are now being fixed, making it more difficult for the agencies to continue their spying activities. This explains the increased push from Five Eyes countries to force tech companies to install back doors so they can bypass encryption.

However, the argument that states should have the right to bypass encryption to stop terrorism simply doesnt hold up. It would be ludicrous to suggest that turning Smart TVs into listening devices is about stopping ISIS. It has always been about developing tools for mass surveillance, and now increasingly for espionage and cyberwar. This has been seen before. For example, the worm Stuxnet was written by the US and Israel and used to target Iranian nuclear facilities.

It is not a question of whether governments will one day use these hacking techniques for domestic surveillance they already do. On 30 June, it was revealed that Centrelink has been paying Israeli hacking company Cellebrite to break into mobile phones. The methods used are the same ones Cellebrite developed in 2015, when it helped the FBI break into an iPhone as part of the San Bernardino terrorism case.

It is now known that government departments such as the Australian Tax Office and the Department of Employment have paid around $500,000 to Cellebrite for equipment and training to hack into phones.

In the debate about metadata storage, George Brandis was adamant that the government wasnt after the content of Australians communications, just who we are talking to. These new revelations and the entire debate about encryption show that the content is exactly what they are after. No matter the justification, we should resist any attempt to weaken encryption and our right to privacy.

See the original post here:
Weakening encryption is an attack on our freedom - Red Flag