UAE crown prince asked US to bomb Al Jazeera, WikiLeaks claims – Daily Sabah

A diplomatic cable released Wednesday by WikiLeaks suggested that Abu Dhabi's crown prince and the Deputy Supreme Commander of the UAE Armed Forces Sheikh Mohammed bin Zayed asked the United States to "bomb the offices of Al Jazeera."

According to the leaked documents, Sheikh Mohammed bin Zayed also referred to as "MBZ" in the documents urged U.S. diplomat Richard Haass to control the media coverage of Iraq's invasion in 2003, emphasizing the "importance of reining the Doha-based Al Jazeera newtwork prior to any military action."

During his conversation with the U.S. diplomat, bin Zayed also reportedly recalled a meeting between the Qatari Emir Hamad Al-Thani and his father Shaykh Zayid, which was held before the U.S. invasion of Afghanistan.

"Hamad complained about a report he had received that MBZ had asked General Franks to bomb Al-Jazeera. According to MBZ, Zayid derisively responded: 'Do you blame him?,'" the WikiLeaks post said.

U.S. General Tommy Franks, who is now retired, was at that time responsible for monitoring military operations across the Middle East as head of the U.S. Central Command.

State-funded Qatari broadcaster Al Jazeera had previously accused the U.S. of deliberately targeting its outlets.

One of its offices in Afghanistan's Kabul was destroyed in U.S. airstrikes, despite the fact that the news network had reported its location to Washington.

Chief Editor Ibrahim Hilal said at that time that he believed the U.S. attack was long-planned, as Al Jazeera's coverage of the Afghanistan war was mostly criticized by U.S. officials as "inflammatory propaganda," Russia Today reported.

"I still believe the decision to exclude our office from the coverage was taken weeks before the bombing," Hilal said, adding that he did not think the U.S. would have attacked while they were the only office in Kabul.

A U.S. missile also struck Al Jazeera's offices in Baghdad in April 2003, leading to the death of one staff member and injuring another.

Al Jazeera "was not and never had been a target," a spokesperson for the U.S. Central Command said at that time.

Read more from the original source:
UAE crown prince asked US to bomb Al Jazeera, WikiLeaks claims - Daily Sabah

Podesta Clashes With Bartiromo Over Russia Ties: ‘Go Back and Get Your Facts Straight’ – Washington Free Beacon

BY: Paul Crookston June 29, 2017 2:31 pm

John Podesta, the chairman for Hillary Clinton's 2016 presidential campaign, was a target of WikiLeaks during the election, but Wednesday he battled with Fox Business host Maria Bartiromo over his own links to Russia.

Podesta blamed the Russians when his hacked emails were published by WikiLeaks during the 2016 campaign, asserting that Moscow was working to elect now-President Donald Trump. The U.S. intelligence community has said the hack was part of a broader Russian effort to interfere in the election.

But the longtime Clinton ally, who met with the House Intelligence Committee behind closed doors on Tuesday to discuss Russian meddling, has also faced allegations that he owned shares in a Kremlin-backed energy company,Joule Unlimited.

Bartiromo pushed Podesta on his association with the company, which she said was "widely reported" to be Kremlin-backed. Podesta served on the company's board for multiple years starting in 2011.

"You joined the board of a small energy company in 2011," Bartiromo said. "Two months later a Russian entitydirectly funded by the Kremlin invested $35 million in the company. You were given 75,000 sharesin a Russian companywhich you failed to disclose when you became an Obama associate."

"Maria, that is not true. I fully disclosed and I was completely compliant," Podesta responded.

"You are picking through my emails that were stolen from the Russians and released by WikiLeaks and creating a story that is not true," he added.

Bartiromo continued to say he had shares in a "Russian company."

"Go back and get your facts straight, Maria," Podesta said.

"That's not true, John. We know you owned 75,000 shares," Bartiromo responded.

Podesta insisted that it was not a Russian company, but she responded that "it's backed by the Kremlin."

"The Russian company had a small investment in that company," Podesta said, before attacking her sources.

"Maria, maybe you're looking at widely reported information from InfoWars," he said, referring to a website run by conspiracy theorist Alex Jones.

Bartiromo defended herself by saying she got information from places like the Wall Street Journal. She then moved onto Democrats' general ties to Russia.

"There are much deeper ties to Russia on the Democratic side than there are on the Republican side," she said. "It's been your team that's been in bed with the Russians."

"Fox can do whateverit wants to do on this matter," Podesta replied. "The truth is that [Russian President] Vladimir Putinat his direction, accordingto 17 U.S. intelligence agenciesinterfered with the U.S. election to help elect Donald Trump."

"I'm surprised you're not concerned about that, that the Russians would hack to commit crimes in the United States and then work with WikiLeaks," he continued.

"I am concerned about that, but I know that Russian meddling goes back decades," Bartiromo responded. "The story that Democrats have been riding, this Trump collusion, is simply not true, and we have no evidence of it."

Podesta retorted by citing former National Security Adviser Michael Flynn's connections to Russia.

"He had to leave because he liedabout his contacts with the Russians," Podesta said of Flynn.

The White House forced Flynn to resign earlier this year after he misled Vice President Mike Pence about conversations he had with the Russian ambassador to the U.S.

"There's a lot to investigate here, and I'm glad that the House Intelligence Committee has gotten back on track with a bipartisan investigation," Podesta said. "Senate Intelligence Committee is doing the same thing, [special counsel Robert] Mueller is doing the same thing, and we'll see where it all ends."

Follow this link:
Podesta Clashes With Bartiromo Over Russia Ties: 'Go Back and Get Your Facts Straight' - Washington Free Beacon

Chelsea Manning to show exhibit of self-portraits constructed from … – The Guardian

The 3-D-printed portraits from the series by Manning and Dewey-Hagborg. Photograph: Courtesy of Fridman Gallery

Chelsea Manning is to showcase an exhibition at New Yorks Fridman Gallery in collaboration with the artist Heather Dewey-Hagborg.

Manning, who was released from prison last month after being sentenced in violation of the Espionage Act for disclosing classified government documents to WikiLeaks in 2013, will share A Becoming Resemblance from 2 August until 5 September. An announcement from the gallery said the exhibit would investigate emerging technologies of genomic identity construction and our societal moment, using cheek swabs and hair clippings Manning sent Dewey-Hagborg while she was in prison. Dewey-Hagborg used these DNA samples to create 3D-printed portraits of Manning, whose face was concealed from public view until her release on 17 May.

Manning, a trans woman who has identified as female since childhood, and whose 35-year sentence was commuted by Barack Obama in January, described the exhibition in a statement to the gallery.

Prisons try very hard to make us inhuman and unreal by denying our image, and thus our existence, to the rest of the world, Manning explained. Imagery has become a kind of proof of existence. The use of DNA in art provides a cutting edge and a very post-modern almost post-post-modern analysis of thought, identity, and expression. It combines chemistry, biology, information, and our ideas of beauty and identity.

The exhibition, which also includes a series titled Suppressed Images, a comic book collaboration between Manning and the illustrator Shoili Kanungo, was curated by Roddy Schrock. Manning made headlines last week after attending Pride festivities in New York City, where during the annual parade she appeared on a float sponsored by the American Civil Liberties Union. A Becoming Resemblance will feature 30 3D portraits of Manning as well as an installation called Probably Chelsea, which interrogates the different ways DNA can be interpreted.

More:
Chelsea Manning to show exhibit of self-portraits constructed from ... - The Guardian

Chelsea Manning joins first pride march since prison release – USA TODAY

On Sunday, June 25th, New York City held its annual LGBT pride march. USA TODAY

This undated file photo provided by Chelsea Manning shows a portrait of her that she posted on her Instagram account on Thursday, May 18, 2017. Manning said she had "a responsibility to the public" to leak a trove of classified documents in her first interview following her release from a federal prison broadcast Friday, June 9 on ABC's "Good Morning America."(Photo: Tim Travers Hawkins, AP)

Chelsea Manning,the transgender U.S. Army soldier who spent seven years in prison for leaking classified documents, took part on Sunday in her first Pride March since her early release last May.

Manning, 29, who came out as transgender in 2013, tweeted that she was honored to represent the American Civil Liberties Union (ACLU) at the NYC Pride March. Her tweet included a photo of herself alongsideGavin Grimm, the transgender teenager who sued his school for denying him access to the boys' bathroom. Grimm's case was ultimately remanded by the U.S. Supreme Court.

More: Gay pride events take many forms, take on many fights

Manning later said Sunday's eventwas not her first Pride March but the first she attended since her release, NBC News reported.

She was convicted of leaking more than 700,000 classified documents, including battlefield reports on Iraq and Afghanistan and State Department cables, while working as an intelligence analyst in Iraq. She said the leaks were intended to expose wrongdoing.

More: In 1st interview since release, Chelsea Manning thanks Obama for 2nd chance

Manning's 35-year sentence in military prison, the longest punishment ever imposed by the U.S. government for a leaking conviction, was commuted in the final days of the Obama administration, a move that infuriated some in the military as well as President Trump.

At the time of her arrest, she was known as Pvt. Bradley Manning, but came out as transgender during her incarceration. She remains an active-duty, unpaid soldier, eligible for health care and other benefits while her court-martial conviction remains under appeal.

Contributing: Aamer Madhani, USA TODAY. Follow Greg Toppo on Twitter: @gtoppo

Read or Share this story: https://usat.ly/2tbgMU1

View post:
Chelsea Manning joins first pride march since prison release - USA TODAY

Julian Assange’s mask slips once again in Risk – RTE.ie

Updated / Thursday, 29 Jun 2017 15:32

Laura Poitras follows up her Oscar-winning documentary about Edward Snowden with this portrait of Wikileaks founder Julian Assange. It is an itchy and disturbing experience.

One of the most surreal scenes in Risk, a documentary full of surreal scenes, is Wikileaks founder Julian Assange carefully applying a disguise so he can make one of his rare public appearances.

He hennas his hair, puts in contacts, glues on a false goatee, and dons full leathers so he can pass himself off as a London motorbike courier. As he goes through this ritual, his mother is waiting in the next room in the hotel. When Assange - one mans freedom (of information) fighter, anothers traitor - emerges from the bathroom he looks like... Julian Assange dressed up as a London motorbike courier.

Laura Poitras strange film is full of such comical but disturbing moments - from a testy Assange being interviewed by Lady Gaga, who seems to be dressed as a witch (Im not making this up), in the Ecuadorean Embassy in London to Assange communicating via Post It notes and then burning them, to Assange calling up the White House and fully expecting to be put through to then Secretary of State Hillary Clinton.

Risk is a companion piece to Poitras Oscar-winning 2014 Edward Snowden documentary CitizenFour and while it may start out as a candid portrait of the embattled and besieged Assange, it ends up as a deeply acrimonious communication breakdown between a clearly frightened Poitras and her subject.

She begins to film as a fly on the wall in 2011 but by the time the film ends in 2016, around the time of continued allegations of Russian interference in the US election, she has become, to Assange at least, a fly in the ointment.

The director witnesses many of the key moments in the remarkable story of Wikileaks. When the first tranche of Iraq and Afghan warlogs are released in 2010, the world is agog; when revelations of mass government surveillance of their own citizens are made clear, anger erupts; we then see the arrest of Bradley Manning, the flight of Snowden; and then the hotly-debated issue of Assanges own extradition to Sweden to face multiple sexual assault allegations, which have now, of course, been dropped.

Along the way - behind the closely-guarded scenes - we meet Wikileaks lawyers, journalists and activists who all operate in orbit around this Sun King of secrecy and it is hard not to conclude that while the revelations they make may be very real, Assange himself is a preening narcissist.

At one point, he is forced to abort an interview with Poitras taking place in the forest outside the mansion in Norfolk he used as Wikileaks HQ because he keeps hearing rustling in the bushes. It is both funny and tragic and reminded me of the grim ending to Francis Ford Coppolas The Conversation when Gene Hackmans surveillance expert ends up ripping his own apartment apart in a desperate search for bugging devices.

Throughout the making of Risk, Poitras kepta "production journal" in which she recordedaudio as a running commentary on her observations of Assange as she gets to know him better. Unfortunately, she uses entries sparingly but as she observes towards the fraught closing minutes of her film, it is Assange'scontradictions that have become the storyand not what he calls his crusade to "expose the crimes of the US empire."

Just like its subject, this is a jarring, non-linear and chaotic documentary. Even before its release, Risk has arrived front-loaded with claim and counter-claim and legal threats from Wikileaks, who are unhappy with the changes they claim Poitras made to the "new" version of her film.

Assange may not be very good at wearing disguises but he is a master of ambiguity who runs Wikileaks like an intelligence agency. Shot by both sides, by the end of Risk he has become as paranoid and controlling as the very state monoliths and governments he is trying to expose.

Alan Corr @corralan

See the article here:
Julian Assange's mask slips once again in Risk - RTE.ie

Laura Poitras on her WikiLeaks film Risk: ‘I knew Julian Assange was going to be furious’ – The Guardian

I dont want to have fallings out with people that I have respect for: film-maker Laura Poitras. Photograph: Malte Jaeger/Archimedes Exhibition GmbH

Laura Poitras wants to make one thing absolutely clear. She still admires Julian Assange despite everything that has happened. But, it soon emerges, this is a mighty caveat.

Risk, Poitrass film on Assange, six years in the making, is finally finished. During this time she has gone from being an Assange supporter given privileged access to an outsider banished from the WikiLeaks inner sanctum; she has exposed the National Security Agencys global spying programme (a lot of it published in Britain by the Guardian) after being the first journalist to make contact with whistleblower Edward Snowden, and she has made an Oscar-winning documentary about Snowden called Citizenfour.

Her Snowden film is gripping a complex, real-life seat-of-the pants thriller. The Assange film, Risk, is very different. At times, it could be a black comedy part The Office, part Brass Eye.

Yet it was never meant to be like this. Poitras initially contacted Assange because she believed the work he was doing (again, a lot of it published in Britain by the Guardian) was so important.

I thought WikiLeaks was doing the hard journalism that hadnt been done for a long time post 9/11. The mainstream media had abdicated responsibility to ask hard questions of what was going on in the occupation of Iraq and Afghanistan. It was crucial and brave journalism. I was also interested in the global impact it was having. So I was very optimistic about the project. She pauses. And I remain optimistic about many things about the work they do and its necessity. Another caveat.

WikiLeaks seemed to be reinventing journalism when it launched in 2006 as an online platform allowing sources to leak classified information anonymously. In 2007, the not-for-profit organisation discovered that some prisoners held at Guantnamo Bay were denied access to the Red Cross. In 2010, it received more than 700,000 US military and state department documents and released the Collateral Murder tape showing a US Army Apache helicopter crew killing 15 civilians (including two Reuters journalists) as the crew laughed at the dead bastards saying light em up! Last year, WikiLeaks exposed the Democratic party leaderships bias against Bernie Sanders and for Hillary Clinton. And on it goes.

Assange, born in Australia and a computer programmer by profession, is the founder and editor-in-chief of WikiLeaks. In 2011, to all intents and purposes he was WikiLeaks the crown prince of transparency. Poitras says it took time for Assange to agree to access. At one point in the film, she says: Its a mystery why he trusts me because I dont think he likes me.

Poitras, by contrast, was born in Massachusetts to wealthy parents (in 2007, they donated $20m [15m] to found the Poitras Center for Affective Disorders Research at the McGovern Institute for Brain Research). As a teenager, she dreamed of becoming a chef and worked as a cook in a French restaurant in Boston. She then became fascinated with film, which she studied at the San Francisco Art Institute, and, in 1992, moved to New York to pursue film-making. In 2006, her film My Country, My Country, a documentary about life for Iraqis under US occupation, was nominated for an Academy award. Her 2010 film The Oath is about two Yemeni men caught up in Americas war on terror.

Assange was aware of both films. It is clear he believed Poitras would faithfully document the hero behind the groundbreaking work. Which she has done. And some. So we see portrayed a man of principle desperate to expose the secret institutions that shape how we live. But we also see a pompous Assange demanding to speak to Hillary Clinton and telling the US Department of State that he is only calling as an act of altruism (To try and make it clear, we dont have a problem, you have a problem); a comically deluded Assange, who believes dyeing his hair ginger and putting on a floppy hat and pair of shades was the perfect disguise, and a narcissistic dictator having his hair cut by two members of staff.

We also meet the paranoid Assange who, according to Poitras, runs the organisation like an intelligence agency using denial and deception; and the contemptuous Assange, who tells his colleague Sarah Harrison to imagine the press are a piece of shit on your shoe. Then there is the messianic Assange with the self-confessed God complex, who tells Lady Gaga, Lets not pretend Im a normal person, and ticks her off for asking how he feels. (Its irrelevant how I feel because the cause is so much bigger.) Not forgetting Assange the wannabe celeb, who readily acquiesces to Gagas request for him to wear a T-shirt instead of his shirt, so he looks different for her fans.

Poitras knew Assange could be difficult when she started filming he had already fallen out with the Guardian but the level of difficulty surprised her. In 2010, an arrest warrant was issued in Sweden, where WikiLeaks is based, in relation to sexual assault allegations against two women. Things became more difficult in 2012, when the UKs Supreme Court ruled that he should be extradited to Sweden and he sought sanctuary in the Ecuadorian embassy.

In one astonishing scene, Assange talks to Helena Kennedy QC, who is advising him on how to deal with the allegations. Assange says, as if to excuse himself, that it is a radical feminist conspiracy and dismisses the complainants as lesbians. Kennedy tells him it is not helpful to talk like this. No, not publicly, he says, while being filmed. Her look of despair is priceless. Assange then explains why it is not in the best interests of the women to press charges. An actual court case is going to be very hard for these women they will be reviled for ever by a large segment of the world population. I dont think its in their interest to proceed that way.

It is this scene that led to Poitras and Assanges falling out. She promised him she would show him the film when it was ready. And shortly before an early version of Risk premiered at Cannes, he did see it and blew a gasket. His lawyers demanded we took this scene out, and another one where he talks about the investigation and the women involved. We didnt, and then he sent a text saying the film is a threat to his freedom and he is forced to treat it accordingly. What right did he have to make that demand? He had no right. He had no editorial control over the film.

Did it surprise her when he tried to censor Risk? Yes it absolutely did, considering what WikiLeaks stands for. I was surprised on the ideological level not only did he demand that things were removed, but more recently he sent cease and desist letters to my distributors demanding that they stop releasing the film. He was really angry and he tried to intimidate.

Would she have had more respect for Assange if he had returned to Sweden to be interviewed by the police? She exhales loudly. I dont know. I do think his fear of US indictment is not paranoia. The investigation is massive, and he has very good reason to be concerned about being extradited to the US.

Poitrass relationship with WikiLeaks was further complicated when it emerged in 2016 that Jacob Applebaum, one of Assanges closest WikiLeaks confidantes, has also been accused of sexual abuse. Poitras discloses that she and Applebaum had been involved briefly in 2014. She then realised she was making a very different film from the one she started out making. It does take on a question about gender and sexism. When there is another person in the film who has been accused of abuse of power and sexual misconduct, how could I not address it?

The longer she filmed Assange and WikiLeaks, the more critical she became of their failure to redact names from documents putting people at risk, the tone of the WikiLeaks Twitter feed, attitudes to women, and the motive for some releases. While Poitras is no fan of Hillary Clinton, she does question the timing of the Podesta emails (John Podesta was chairman of Clintons election campaign), thought to have been hacked by the Russians and published by WikiLeaks in October/November 2016 just before the election. Clinton partially blamed her defeat on WikiLeaks.

I ask Poitras if she enjoyed making Risk. She laughs, which feels like an answer in itself. Did I enjoy it? No, I cant say I did. Filming is always hard, and this was particularly hard. I knew Julian was going to be furious with the film, and I dont have any joy with that. I know hes polarising, but there is no doubt hes a really significant historical figure in the work that he has done, which has transformed journalism, and I think he understood ahead of many people how the internet was going to change global politics.

While she is critical of Assange, Poitras is also scathing of the media indeed, the film is partly a critique of the pack mentality of the press. She also believes the Guardian and the Washington Post took too much credit for the Snowden story and literally tried to push her out of the limelight. In New York, when they gave the Pulitzer prize to the Guardian and the Washington Post, neither organisation invited me on to the stage. That pissed me off. That was really bad behaviour. On the other hand, the story needed institutions behind it.

It is hard to watch Risk and not compare it with Citizenfour. In fact, for a long time Poitras thought they were going to be one and the same film. Assange and Snowden seem such different men, I say. I dont feel its my job to judge and compare them but, yes, they have different motivations. Certainly, my feelings that come through in the film are much more conflicted. Is there a moral purity to what Snowden did? People would ask me when I was releasing the film: Is he a hero? People are defined by their actions, and he did something deeply heroic. And I think it was selfless. He knew the consequences could be the end of his freedom or the end of his life.

She says the whistleblower Chelsea Manning would be a more suitable person to compare Snowden with. What is the most annoying thing about Snowden? He can lecture. He can get a little bit talky, if you watch some of his public appearances, but thats not something that pissed me off.

Her life has changed considerably since making Citizenfour. At times, she has felt scared for her own safety. Right after the Snowden stuff, I knew I was being followed by intelligence agencies. I felt really nervous about threats from the government, private contractors, intelligence agencies all over the world. There are a lot of bad actors out there. But I have to keep doing the work.

She says shes exhausted and could do with a break, but shes hooked on film-making: surveillance and the intelligence services in particular. What would she like to do next? Id love to look at whats happening in the investigation into Trump. I dont think I am going to get that access! she laughs. I dont think Comey would take my phone call, unfortunately. Hed be top of the list of people Id love to film at the moment.

But for now, she is focusing on the release of Risk. After Assange complained about the film, Poitras took it away, spent a year re-editing it and returned with a film that was tougher on him. Was that her response to his intimidation; a form of revenge? Again, she exhales loudly and pauses. I dont make vengeful films, but I do have to make films that are honest.

Does she think that Assange was right to trust her? I think thats a question for Julian. I tell her I think its a fine film, and her response surprises me. She sounds upset almost heartbroken. I dont want to have fallings out with people that I have respect for, she says. For me its a tragedy.

Risk is released on 30 June 2017.

See the rest here:
Laura Poitras on her WikiLeaks film Risk: 'I knew Julian Assange was going to be furious' - The Guardian

AMD Ryzen PRO Family Announced With On-Chip Memory And Virtualization Encryption Engine – Hot Hardware

In this case, AMD's Rzyen PRO desktop chips are tweaked versions of the company's consumer-based Ryzen processors, with the PRO parts taking aim at Intel's vPro lineup. What really makes the PRO processors stand out from regular Ryzen chips is the focus on integrated security and encryption features. We will get to those features in a moment, but first let's take a look at the full lineup.

What enterprise customers should take away from this is that AMD is providing a full range of solutions based on use case and budget. And not to dwell on the Ryzen 3 PRO, but its worth noting that Intel does not make any vPro-enabled Core i3 processors. With that in mind, AMD is poised to capitalize in a market segment that Intel essentially oversteps.

AMD also backs its Ryzen PRO processors with a 36-month warranty. That is three times as long as the consumer variants, which come with a 12-month backing. So not only are business clients buying processors cut from the highest yields, they're also getting an extended warranty from AMD.

For management duties, Ryzen PRO platforms support DASH (Desktop and Mobile Architecture for System Hardware). This is essentially a remote management protocol, one that has been supported by AMD for several years.

AMD has a white paper (PDF) that explains its memory encryption, but what it boils down to is a powerful architectural feature that allows for main memory encryption for an operating system or hypervisor. In this way, customers are protected against physical hardware attacks, and in some cases they're even protected from rogue administrators. And the importance of memory encryption can't be overstated for NVDIMMs, which store data even when powered down.

Ryzen PRO also incorporates Secure Encrypted Virtualization (SEV) support. This integrates main memory encryption capabilities with the existing AMD-V virtualization architecture to support encrypted virtual machines. How this benefits clients is that it keeps them protected both from physical threats and other virtual machines, or even the hypervisor itself. With malware strains such as WannaCry demonstrating the ability to worm their way through networks, this is a big deal for customers.

"Today marks another important step in our journey to bring innovation and excitement back to the PC industry: the launch of our Ryzen PRO desktop CPUs that will bring disruptive levels of performance to the premium commercial market," said Jim Anderson, senior vice president and general manager, Computing and Graphics Group, AMD. "Offering a significant leap in generational performance, leadership multi-threaded performance, and the first-ever 8-core,16-thread CPU for commercial-grade PCs, Ryzen PRO provides a portfolio of technology choices that meet the evolving needs of businesses today and tomorrow."

AMD says that commercial client desktops with Ryzen PRO inside will start shipping to businesses in the second half of this year, followed by a Ryzen PRO mobile launch in the first half of 2018.

Link:
AMD Ryzen PRO Family Announced With On-Chip Memory And Virtualization Encryption Engine - Hot Hardware

Encryption cracking campaign receives lacklustre support from Five Eyes – Computerworld Australia

Five Eyes nations' ministers and attorney-generals have committed to develop our engagement with communications and technology companies to explore shared solutions around the encrypted content of communications sent by criminals.

This will be done while upholding cybersecurity and individual rights and freedoms a joint communique issued following two days of talksin Ottawa, Canadanoted.

Despite being a key topic for the Australian government in recent weeks spoken about by Prime Minister Malcolm Turnbull in his security statement to the House of Representative earlier this month, and in numerous TV and radio interviews by Brandis it appears cracking encryption may be less of a priority for the other Five Eyes member nations (the US, UK, New Zealand and Canada).

It was mentioned in just two sentences in the official communique, coming at the very end of the description of topics discussed.

In a press release following the meeting, New Zealand Attorney-General Christopher Finlayson made no mention of the discussion around encryption. The UK governments press release about the meeting focused on urging internet providers to remove terrorist contentonline and made no mention of encryption.

A release from US Attorney Jeff Sessions following the meeting noted that encryption had been a topic of discussion, but was concentrated on preventing radicalisation and human trafficking.

The Canadian government had made no official statement beyond the communique at the time of publication.

Not about creating backdoors

Speaking on ABCs RN Breakfast on Wednesday, Brandis said the nations had agreed to engage with ISPs and device makers to ensure that we secure from them the greatest possible level of cooperation but denied this amounted to forcing them to build backdoors into their products.

What we need is to develop, and what we'll be asking the device makers and the ISPs to agree to, is a series of protocols as to the circumstances to which they will be able to provide voluntary assistance to law enforcement, he said.

We're not specifically asking them to do that [build in backdoors] and its not as simple as that, he added.

Brandis reassurances around backdoors echoes those made by Prime Minister Malcolm Turnbull earlier this month.

This is not about creating or exploiting back doors, as some privacy advocates continue to say, despite constant reassurance from us, Turnbullsaid. It is about collaboration with and assistance from industry in the pursuit of public safety.

Voluntary solutions

Encrypted communications represent a challenge for governments hoping to thwart terrorist plots and criminals, the communique noted.

Ministers and Attorneys General also noted that encryption can severely undermine public safety efforts by impeding lawful access to the content of communications during investigations into serious crimes, including terrorism, it read.

It is unclear how the Australian government expects ISPs and device-makers to assist in investigations and provide access to encrypted communications without building backdoors into their products.

Brandis said the government will be meeting with the private sector in the coming months to discuss options.

We want to engage with the private sector, to achieve a set of voluntary solutions, he told the ABC.

Brandis said he did not want to resort to the coercive powers which had been legislated by the UK and New Zealand.

Late last year the UK introduced its Investigatory Powers Act,which allows the government to compel communications providers to remove electronic protection appliedto any communications or data.

The governments power to force the removal of encryption, the legislation notes, must be reasonable and practicable; caveats that are yet to be tested.

The so-called Snoopers Charter passed into law in December, but isbeing hamperedby the European Court of Justice which deemed it unlawful.

Error: Please check your email address.

Tags backdoorPrime Minister Malcolm TurnbulldecrytionFive eyessecurityForeign policyencryptioncyberAttorney-General George Brandisexploits and vulnerabilities

More about Attorney-General

See the rest here:
Encryption cracking campaign receives lacklustre support from Five Eyes - Computerworld Australia

Australia Wants Encryption Weakened, US Citizens Would Lose – Liberty Nation (registration) (blog)

DOUG DAVIS

In yet another attempted power grab from the globalist deep state, top Australian officials are beating on the terrorism drum again, claiming that the weakening of standard consumer encryption is necessary for the safety of western society. U.S. law enforcement has been beating this dead horse for decades, and it is still as bad an idea today as ever.

Encryption is a system whereby two people communicating via electronic media can encode messages mathematically so that only the intended parties can read it. Because hacking various internet traffic has become commonplace, encryption is one of the few means available to individuals to protect the content of their communications from prying eyes. As such, it is becoming more popular, and various products such as Signal, Wickr, and WhatsApp allow regular people to take advantage of encryption for their communications. Virtual Private Networks (VPNs) also use encryption as the basis of their privacy enhancing function, and allow users to surf the internet while hiding what theyre doing.

The Australian Attorney General and Minister for Immigration and Border Protection announced that they intend to thwart the encryption of terrorist messaging at the upcoming FIVEEYES conference in Ottawa next week. (FIVEEYES is an intelligence alliance between Australia, Canada, New Zealand, the United Kingdom, and the United States.) Senator Brandis, the Australian Attorney General, was quoted in an Australian Government press release as saying:

As Australias priority issue, I will raise the need to address ongoing challenges posed by terrorists and criminals using encryption. These discussions will focus on the need to cooperate with service providers to ensure reasonable assistance is provided to law enforcement and security agencies.

In short, Australia intends to push for an international agreement among FIVEEYES countries that will force software companies, social media providers, and communications hardware companies to install backdoors into their products. Another proposal they are considering pushing is a key-escrow system, whereby the government maintains a set of keys for all consumer encryption so that they can break any encrypted message sent over the internet.

The news matters to American citizens because as many leaks have shown in the last few years, the U.S. cooperates with other countries in the FIVEEYES alliance so that all of them can spy on each others citizens, then provide the host country with the information. That means that the UK, for example, can spy on Americans, then provide the U.S. intelligence community with the information they have collected on U.S. citizens allowing the U.S. government to collect information on its people that it should not possess. When Australia demands that governments be able to bypass encryption, Americans should pay attention, because it means that the U.S. government will benefit from it and the American people will lose.

Australias horrible idea has been brought up again and again, mostly by law enforcement in the United States, and goes back as far as the clipper chip, an early 1990s proposal which would have companies use a standardized encryption chip, for which the government would maintain keys. Disgraced former FBI Director James Comey also complained to Congress about the need for maintaining state accessible keys for consumer encryption as recently as 2015.

There are a few obvious issues with all this. First, terrorism is only a serious problem because of globalism. Sure, there are domestic terrorists, but the West didnt have a problem catching these criminals historically using standard law enforcement investigative techniques because domestic terrorism is infrequent, and when it happens, the FBI can focus large amounts of manpower on the group involved. International terrorism is a much bigger threat because regularly bombing people across the world makes a lot of enemies, so the risks grow exponentially. You can neutralize these threats in one of two ways. If you stop messing around in the internal affairs of other nations, you are less likely to make enemies. If you stop allowing terrorists to travel or immigrate to your country, they cant set off bombs on your streets or fly your planes into buildings. We could cut the international terrorism threat tomorrow by suspending all foreign visas and immigration, but we wont do that because it isnt in the interest of the State. They would prefer to spy on everyone.

Second, giving government back doors or master keys to encryption necessarily weakens the systems that people rely on to keep them safe from hackers. Governments are notoriously bad at protecting their data, as evidenced by the recent Wikipedia Vault 7 data dumps and NSA hacking tools which have been stolen and released into the wild. An encryption key repository would constantly be under attack and would some hacker would eventually compromise it. Every backdoor into a commonly used software package is eventually discovered and exploited by criminals.

Finally, the real issue is that Law Enforcement is spoiled. They envision the world where they just sit around and let software tell them what everyone is doing and saying, so they can decide who has broken the law, strap on their toys, and kick in doors. Western society, particularly the United States, wasnt designed to work like that. We have a community which balances the God-given liberties of individuals against the desires of the State. We require that law enforcement have reasonable articulable suspicion of criminality before inserting themselves into the lives of the citizenry, and Probable Cause before warrant or arrest is permissible.

Giving the State the ability to read everyones messages and internet traffic destroys liberty and the legal protections that our forefathers gave their lives to create. The truth is that the NSA has the means by which to crack all commonly used encryption, it is just expensive and time-consuming. By allowing the citizenry to use strong encryption, the balance between individual rights and the demands of the State are re-balanced. If another Unabomber arises, and the FBI needs to crack a suspects messages, they can get their warrant, collect the data, and the NSA can run it through their supercomputer farm in Utah. Or they can hire private consultants to crack the system in question as they did after the San Bernardino terrorist attack after insisting that only Apple could solve the problem.

Law enforcement is a hard job. The maintenance of liberty requires that it stay that way. If we allow statist officials from foreign lands who dont respect the individual to set our privacy policy, it wont be long before we lose what makes us uniquely American.

Doug lives on the West Coast and writes on law and liberty.

See the original post here:
Australia Wants Encryption Weakened, US Citizens Would Lose - Liberty Nation (registration) (blog)

Lancaster County Commissioners order police transmissions encrypted, blocking scanners for public, media – LancasterOnline

By Thanksgiving, the public will no longer be able to listen in on police dispatches in Lancaster County.

County Commissioners on Tuesday directed Lancaster County-Wide Communications to encrypt police transmissions, blocking the public and media from hearing whats going on in the county.

Commissioners Dennis Stuckey and Joshua Parsons favored the move.

We live in a changed and changing world, Stuckey said. Gone are the days when you can talk to a 15- or 20-year veteran who says hes only had to pull his gun out twice.

We have to be cognizant of that. Whenever I hear that theres concern for the safety of police officers who put their lives on the line every day, I have to take that seriously.

Commissioner Craig Lehman said hes also concerned about police safety, but said officers may become further isolated from their communities if they decrease transparency.

He said police should compromise, encrypting public transmissions but giving news outlets access to those broadcasts.

Encryption wont affect fire and EMS broadcasts.

Communications director Michael Weaver said converting the countys 6,000-some police radios wont cost anything except time.

The switchover probably wont be made until November, he said.

A public vote was not required on the matter, Stuckey said. Its an administrative decision, he said, but officials wanted to handle it in an open forum.

Lehman said someone who wants to ambush police is more likely to make a fake 911 call, not monitor police movements on a radio. He said encrypting transmissions could give officers a false sense of security.

Parsons said he shares Lehmans concerns, but said he trusts the judgment of police chiefs when they say this is a safety issue.

The fake 911 ambush scenario could happen no matter what we do today, Parsons said. However, he said, encryption does provide some percentage of safety.

Pugliese defended the move by saying there have been several incidents in the county where the public or the media interfered with investigations, in some cases by getting to crime scenes more quickly than police.

Later, Pugliese said he doesnt know of an instance when members of the media interfered at a crime scene.

Pugliese said police in Lancaster County are going to have to change the way we do business in order to keep information flowing.

However, he chided the media for being in such a rush to get the news out that it reports inaccurate information based on radio broadcasts. When police later release the facts, he said, it appears that were trying to cover something up.

Many police departments already used the CrimeWatch website to issue press releases, he said. Software also exists for an online mapping program that shows police dispatches without revealing addresses, he added; however, the maps typically run three to four hours behind real-time, he said.

Lehman said blocking police transmissions is going to further isolate police ... and make police less safe if that (public) trust is lost.

Some local police departments do a really good job of providing the media with timely information, he said. Some departments, less so.

Lehman said he would be open to a compromise that gives the media access to those broadcasts. Stuckey and Parsons agreed they would be interested in exploring that option in the future.

Pugliese said similar arrangements exist in other communities, but said before we take a serious look at that, we would have to have a discussion about the ground rules.

For instance, he said, would the media have access to all or some police channels? Who would pay for the radios needed to give the media that access?

It has been done, he said. Its not a common practice, but it is out there.

He didnt say if he would support a compromise solution.

Melissa Melewsky, media law counsel for the Pennsylvania NewsMedia Association, said earlier this month that the proposal will prevent news agencies from staying on top of breaking news.

Media organizations have used emergency radio transmissions for decades without incident to keep the public informed about emergency situations in the community, she said.

Read the original:
Lancaster County Commissioners order police transmissions encrypted, blocking scanners for public, media - LancasterOnline