WikiLeaks – NSA Targets World Leaders for US Geopolitical …

(on 2016-02-23)

Today, 23 February 2016 at 00:00 GMT [updated 12:20 GMT], WikiLeaks publishes highly classified documents showing that the US National Security Agency bugged a private climate change strategy meeting; between UN Secretary General Ban Ki-Moon and German Chancellor Angela Merkel in Berlin; singled out the Chief of Staff of UN High Commissioner for Refugees (UNHCR) for long term interception targetting his Swiss phone; singled out the Director of the Rules Division of the World Trade Organisation (WTO), Johann Human, and targetted his Swiss phone for long term interception; stole sensitive Italian diplomatic cables detailing how Israel's Prime Minister Benjamin Netanyahu implored Italy's Prime Minister Silvio Berlusconi to help patch up his relationship with US President Barack Obama, who was refusing to talk to Netanyahu; intercepted top EU and Japanese trade ministers discussing their secret strategy and red lines to stop the US "extort[ing]" them at the WTO Doha arounds (the talks subsequently collapsed); explicitly targetted five other top EU economic officials for long term interception, including their French, Austrian and Belgium phone numbers; explicitly targetted the phones of Italy's ambassador to NATO and other top Italian officials for long term interception; and intercepted details of a critical private meeting between then French president Nicolas Sarkozy, Merkel and Berluscon, where the latter was told the Italian banking system was ready to "pop like a cork".

Some of the intercepts are classified TOP-SECRET COMINT-GAMMA and are the most highly classified documents ever published by a media organization.

WikiLeaks editor Julian Assange said "Today we proved the UN Secretary General Ban Ki-Moon's private meetings over how to save the planet from climate change were bugged by a country intent on protecting its largest oil companies. Back in 2010 we revealed that the then US Secretary of State Hillary Clinton had ordered her diplomats to steal the UN leadership's biometric data and other information. The US government has signed agreements with the UN that it will not engage in such conduct. It will be interesting to see the UN's reaction, because if the United Nations Secretary General, whose communications and person have legal inviolability, can be repeatedly attacked without consequence then everyone is at risk."

The NSA data for this release: UN Sec Gen & Merkel intercept, UNHCR & WTO target selectors and assignments, Netanyahu-Berlusconi-Sarkozy-Merkel intercepts, EU-Japan WTO/Doha trade talks strategy intercept, EU & Belgium MFA target selectors and assignments and Italy target selectors and assignments.

Visit link:
WikiLeaks - NSA Targets World Leaders for US Geopolitical ...

Chelsea Manning | LinkedIn

Senior Research Assistant Georgia Regents University

July 2013 July 2015 (2 years 1 month)

-Assisting in research under the direction of Dr. Vaughn McCall, Chairman of the Psychiatry and Health Behavior Department -Coordinating multi-site NIH and industry-sponsored clinical trials -Recruiting, screening, and retention of research participants -Evaluating research participants through psychiatric rating scales and questionnaires -Monitoring participant study medication dispensation and accountability -Conducting study visits in compliance with study protocols -Data collection and entry in compliance with HIPAA, GCPs, IRB, FDA, and sponsor guidelines -Arranging after-study care for research participants and making appropriate community referrals -Communicating with sponsors, monitors, research investigators, IRB members, and other agencies involved in the studies -Training newly hired research assistants and medical student research volunteers in all aspects of study protocols and IRB policies -Using a centrifuge for spinning samples

May 2012 July 2013 (1 year 3 months)

Conducted neuropsychological assessments to children and adults to aid in diagnostic and treatment planning

Assessment Experience: Autobiographical Memory Interview-Short Form (AMI-SF), Bender Visual-Motor Gestalt Test-2, Boston Naming Test (BNT), Brief Psychiatric Rating Scale (BPRS), California Verbal Learning Test II (CVLT-II), Conners Continuous Performance Test 2 (CPT-2), Dementia Rating Scale- Initiation Perseveration Index (DRS-IP), D-KEFS Verbal Fluency Test, Grey Oral Reading Test IV (GORT-4), Hamilton Rating Scale for Depression (HRSD), Montgomerysberg Depression Rating Scale (MADRS), Miller Forensic Assessment of Symptoms Test (M-FAST), Mini International Neuropsychiatric Interview Plus, Mini Mental Status Examination (MMSE), Minnesota Multiphasic Personality Inventory (MMPI-2), Multilingual Aphasia Examination (MAE), Peabody Picture Vocabulary Test-4, Personality Assessment Inventory (PAI), Primary Test of Nonverbal Intelligence, Repeatable Battery for the Assessment of Neuropsychological Status (RBANS), Scale for Suicidal Ideation (SSI), Stroop Color and Word Test-Adult, Structured Clinical Interview for DSM-IV Axis I Disorders (SCID), Test of Memory Malingering (TOMM), Test of Verbal Conceptualization and Fluency (TCVF), Test of Visual Perceptual Skills III (TVPS-3),Time to Reorientation for Electroconvulsive Therapy (ECT), Trail Making Test (TMT) Parts A and B, Wechsler Adult Intelligence Scale IV (WAIS IV), Wechsler Intelligence Scale for Children IV (WISC-IV), Wechsler Test of Adult Reading (W-TAR), Wide Range Achievement Test 4 (WRAT-4), Wide Range Assessment of Memory and Learning 2 (WRAML-2), Wisconsin Card Sorting Test (WCST), Woodcock Johnson III (WJ-III)

January 2011 May 2012 (1 year 5 months)

-Taught graduate students how to implement and interpret personality assessments, and how to collect data to derive conclusive diagnoses -Practiced clerical skills and acted as communication liaison between faculty members -Provided animal care for the animal lab

October 2010 May 2011 (8 months)

Used biofeedback to study the effects of engagement during majority and consensus decision making. Responsibilities included: Research design, running participants, statistical analysis

Excerpt from:
Chelsea Manning | LinkedIn

Talk:Chelsea Manning/October 2013 move request – Wikipedia …

The following discussion is an archived discussion of a requested move. Please do not modify it. Subsequent comments should be made in a new section on the talk page. Editors desiring to contest the closing decision should consider a move review. No further edits should be made to this section.

The result of the move request was: Move from Bradley Manning to Chelsea Manning.

First, thank you to all of the participants of this move request. The page history shows a couple of rough moments, but the overall picture was of good-faith editors making well-reasoned arguments grounded in both policy and respect for our values.

As a reminder to both newer editors (welcome!) and those reading this who may be unfamiliar with Wikipedia's processes, move requests, like many other types of Wikipedia discussions, are not decided on the basis of vote counts, but on the strength of arguments. Thus, even though the numbers show that a strong majority of participants support the move to "Chelsea Manning", we must set that aside and focus instead on the substance of the "support" and "oppose" comments rather than how many of them there are.

The core of the debate comes down to differing interpretations of WP:COMMONNAME, part of our policy on article titles. Both sides cite COMMONNAME as supporting their positions: those supporting the move see the intent of the policy as "what do the reliable sources use (now)?" and those opposing the move view it as "what name does the average person recognize?" Both of these interpretations are reasonable, but we conclude that the supporters' interpretation is closer to the letter and spirit of the policy. The guidance that COMMONNAME offers is that editors base their article titling decision on which name is predominant "as determined by its prevalence in reliable English-language sources".

Further, COMMONNAME seems to be the opponents' main argument, whereas the supporters make other persuasive arguments: for example, that, in the absence of overwhelming reliable source usage otherwise, Wikipedia should respect what an article subject says their own name is. WP:DIGNITY and WP:HARM are, it should be noted, only essays, but the supporters make a good case that we should have a good reason for disregarding the subject's stated wishes.

A lack of reliable sourcing would be, per COMMONNAME, a good reason to overrule an article subject's preferences, but it appears, based on the evidence presented in this move request, that the reliable sources have generally (although certainly not unanimously) gotten on board with Manning's request to be referred to as Chelsea. It therefore does not seem credible to say that WP:COMMONNAME and the subject's wishes are on the opposite sides of the scale.

Given that, we find that, on the basis of COMMONNAME, there is consensus to move the article from Bradley Manning to Chelsea Manning.

That is not to say, however, that the opposing arguments lack merit. Regardless of how quickly the reliable sources adopted the new name, it is fair to say that due to past coverage of the article subject as "Bradley Manning", many people are likely to know of Manning as Bradley, not Chelsea. It is certainly true that the actions that garnered Manning notability were taken under the name Bradley Manning. Following the principle of least astonishment, a possible compromise title, such as "Chelsea (formerly Bradley) Manning" might be one way to satisfy that concern; however, the manual of style discourages longer titles where a short one would be sufficient to unambiguously identify the subject, so such a compromise proposal would have its own set of problems.

There was a fair amount of discussion, from both sides, on the applicability of our biographies of living persons policy on a potential move, but no clear consensus on whether BLP concerns were applicable to the naming dispute. Indeed, several of those who supported the move to "Chelsea Manning" explicitly rejected BLP as grounds for a move. It is clear that there is a division among editors over whether, and under what circumstance, our BLP policy mandates that we follow an article subject's wishes regarding their chosen name.

One additional concern that deserves to be addressed was that the move request itself was not worded neutrally. This is true, but to consider this something that compromises the integrity of the discussion misunderstands the nature of move requests. Move requests are, with rare exceptions, filed by an editor who believes a page should be moved, rather than someone who is indifferent. It is natural and, indeed, expected, that they would make their case in the move request for why they think the move is necessary and desirable. Participants are free to accept or reject the reasoning offered by the proposer, and to make their own cases to their fellow editors why the page should or should not be moved.

Once again, thank you to everyone who participated in this discussion for your time and input, and for the trust you have granted the three of us in assessing consensus here. The page will be moved forthwith; please continue any discussion at the main article talk page, not here. Guerillero | My Talk, 28bytes, Kim Dent-Brown (Talk) 23:25, 8 October 2013 (UTC)

Bradley Manning Chelsea Manning As proposed by the closers of the last debate and agreed by subsequent consensus, I am starting the new move discussion and proposing that we move the article currently located at Bradley Manning to Chelsea Manning, for the following reasons:

Relevant sources on usage in reliable sources as well as relevant policies and guidelines, contributed by various users over the last few weeks, are cited below. Josh Gorand (talk) 19:15, 30 September 2013 (UTC)

Please be civil, and respect the viewpoints of others. Please do not engage in battlegrounding. Please assume good faith and do not engage in personal attacks.

Please cite relevant Wikipedia policies when you make your argument. You may wish to consider the arguments that others put forward in the previous move request.

Wikipedia has editors from all over the world, raised in different societies and with different cultural norms, so please assume good faith and accept that different people may have different views from you on this subject. This discussion centers around the title of the article currently located at Bradley Manning. Please comment only about what you think the best choice of article title is according to Wikipedia's policies; please refrain from making other types of comments. For example, your personal opinions about transgenderism whether pro or con are not germane to this discussion, and such off-topic comments may be closed or ignored.

Wikipedia's Biographies of living persons policy also applies on talk pages, so please familiarize yourself with it. To avoid what some perceive as transphobia[1] during this discussion and to ensure there is a welcoming environment for editors of all kinds, please consider adhering to the following guidelines:

Please remember that the policy No personal attacks applies to this discussion, for all editors. If you see someone's comment and it offends you or you find it transphobic, consider informing them with a civil note on their talk page that you find their language inappropriate, or reporting their comment at WP:ANI if it is egregiously offensive. We're all learning here, and a more open approach (e.g. "You said this, which could be construed as harmful language towards a BLP, can you consider rewording it") may yield more dividends than simply accusing someone of transphobia because they crossed a line they may not have been aware of. Blanket statements like "Those proposing to keep the article titled Bradley are bigoted transphobes" polarize the discussion and are likely to make other contributors less willing to understand your view.

Discussion of the subject of this article and/or transgender issues falls under standard discretionary sanctions. See also, WP:BLPBAN.

This section can be used to gather evidence from reliable sources on usage of Chelsea Manning vs Bradley Manning as the primary name of the subject.

Sources are sorted based on their latest use of one name or the other in an article or editorial statement from after August 22, when the announcement was made. It is trivially obvious that sources from before the announcement use Bradley; that is not of interest and such sources are not listed here.

Note that regardless of which name they use on first mention, almost all of the sources listed in both sections mention and contribute to readers' awareness of the existence of both names.

News sources which have mixed up usage of Bradley and Chelsea. In most cases, if a news source started using Bradley post Aug 22, and then started exclusively using Chelsea, we marked it in the Chelsea list. However, if a news source has alternated between use of Bradley and Chelsea since Aug 22, then it is listed here.

On initial move from Bradley to Chelsea

On reversal from Chelsea to Bradley

(list courtesy of [14])

This section can also be used to gather reliable sources that discuss the use of names to refer to trans people. Note that this move request covers only the naming portion, and not the pronoun question.

Some editors have expressed a concern that the following source is not reliable, while other editors consider it to be reliable:

Procedurally, this Move Request was discussed and advertised at the last close and continuously on the Wiki since. At least three discussions rejected additional delay [19],[20],[21], and it appears to be a Move Request substantively within WP:RM, so the procedural and bureaucratic objections below should be rejected. Alanscottwalker (talk) 11:15, 6 October 2013 (UTC)

While BLP may guide a decision here, it in no way mandates the change, and it should not have been invoked to lock in the original move. That action turned August's RM into a referendum on enforcing the R in WP:BRD.

Many editors here suggest that it should be policy that WP titles its biographical articles based solely on the subject's legal name, while others advocate that the subject's preferred name always be used. Both suggestions are short sighted. Manning's choice of Chelsea Elizabeth appears neither whimsical nor mocking, and I am glad to see the media respecting her choice. If she had instead announced a preference for, and possibly obtained a statutory, legal name change to IDidNothingWrong ImInnocent PleasePardonMeMrPresident Manning, the media would, at best, mention this as a footnote in their articles, and we would not find a consensus here on WP to support such a title change. But what if she had chosen Liberty Innocent Manning? That is a reasonable name, but would still be viewed by many as mocking her conviction. Would we automatically choose such a name for this article's title? Fortunately, we do not need to make such arbitrary decisions ourselves because we rely on outside sources. We should always follow our sources and never lead them. -- ToE 12:39, 6 October 2013 (UTC)

The majority of people making google searches are still using "Bradley". Like it or not, thanks to decreasing fertility rates, increasing life expectancy and an aging population, the world has a surplus of wrinkly old men that outnumber young people within the developed western world (which also happens to be portion of the world that dominates internet usage), and statistically speaking (past surveys, voter statistics, etc) older people tend to hold more conservative views than younger people with more liberal ideas. Don't like this predicament? There's not much else you can do, apart from raising the fertility rate by having more babies.

I personally don't give a damn about where this article goes, however. During the last RM, my main beef was that there was admin abuse over the whole incident, which was the reason for my !vote. I was opposed to how the whole situation unfolded, where admin action was taken without proper consensus. This time, I don't really feel that I need to care about anything. That said, I would like people to take the above points into account. --benlisquareTCE 07:37, 7 October 2013 (UTC)

* The wording should be neutral so as to not unduly sway the!voting or the consensus building process. This obviously taints the result. As a point of comparison, imagine voting in a presidential election and the voting booth contained a long list of all the great things Obama is doing for America and how terrible McCain is (or vice versa). Such a scenario would be completely unacceptable. That's basically what we have here.

* This should be an RfC so as to better reflect community consensus. MRs rarely attract outside opinions from uninvolved editors.

* This is bad timing considering that ArbCom is in the middling of finalizing their decision. I expect that ArbCom will topic-ban the most disruptive editors. It should be easier for consensus building process to proceed after ArbCom completes. I suggest that this MR be closed down, and someone open an RfC with neutral wording after the ArbCom case completes. BTW, someone apparently moved my!vote. Please do not do that again. All editors should be allowed to!vote. A Quest For Knowledge (talk) 12:10, 2 October 2013 (UTC)

As a point of comparison, there are 408 page watchers over the main talk page[29] and only 81[30] over the sub talk page. Even if all 81!voted the same, that's still a tiny fraction of the majority. A Quest For Knowledge (talk) 21:53, 3 October 2013 (UTC)

* Comment * - I didn't realize my comment would cause such a shitstorm (over nothing). That definetly wasn't my intent, so I appologize for that. However, I stand by my comments as being valid and pertinent to the discussion. KoshVorlon.We are all Kosh 16:37, 1 October 2013 (UTC)

Comment When is this RM supposed to be closed? Cam94509 (talk) 18:22, 6 October 2013 (UTC)

@KB, The only complaint that is being made about this RM is that Josh Gorand acted like a horse's petute and launched his preferred version when he knew that a collaborative effort was in place. Two kinds of pork (talk) 18:22, 4 October 2013 (UTC)

It's not quite snowing, but it's definitely a solid rain here in favor of NO SNOW CLOSE of this discussion. --Obi-Wan Kenobi (talk) 01:18, 2 October 2013 (UTC)

I would like to request that this discussion not be subject to a SNOW close. Everyone who wants to express their view should have the usual time to do so. Cheers! bd2412 T 21:54, 30 September 2013 (UTC)

I think if we're still running at a roughly 36:1 ratio in a day or two we can probably declare that the Process Gods have accepted our tribute and blessed us with rain, or whatever. Phil Sandifer (talk) 00:14, 1 October 2013 (UTC)

I agree that this should just be left to run it's course, we're only doing this weeks down the line because of the impatience and hubris of the initial move, so let's learn the lessons, take our time, and leave no doubt that the consensus is solid. --Jeude54cartes (talk) 09:47, 1 October 2013 (UTC)

Comment: I am inclined to move the first two "Neutral"!votes by User:A Quest For Knowledge and User:Collect to this section, as they are addressed solely to the process, and not to the merits of the discussion. The third and fourth!votes by User:Carolmooredc and User:Sphilbrick are examples of!votes that actually weigh in on the topic at hand. Disputes about whether this should be conducted as an RfC rather than an RM (or disagreeing with the rules governing the RM process itself) should be limited to discussion sections. bd2412 T 17:43, 1 October 2013 (UTC)

Comment. The instructions for a move request say to provide "evidence in support where appropriate." Notice the last two words. It is inappropriate to provide mounds of one-sided evidence, while assiduously avoiding and omitting evidence on the other side. WP:NPOV is greatly undermined in this way. To provide all this evidence while omitting a simple Google News Search is obviously deliberate and obviously intended to produce a skewed result. No instructions anywhere prevent inclusion of non-supporting evidence, and it is never "appropriate" to deliberately omit non-supporting evidence from mounds of supporting evidence.Anythingyouwant (talk) 18:06, 6 October 2013 (UTC)

Keilana has recused herself

Keilana has been proposed as the closing admin for this move request, as per this discussion. However, her comments on Wikipedia Weekly on YouTube suggest that she strongly favors one side over another in this dispute. Therefore, while I do not doubt Keilana's integrity, I think that it would be more appropriate to find somebody who has not yet commented on this case.

Unfortunately, links to YouTube are blacklisted on Wikipedia, but anyone can find them easily. The first video is titled "Wikipedia Weekly #99: Bradley-Chelsea-Bradley Manning", and the relevant discussion takes place over the first 16 minutes. The second video is titled "Wikipedia Weekly #100 - Century Mark", and the relevant discussion begins after 13 minutes. Edge3 (talk) 00:25, 1 October 2013 (UTC)

Note: I just learned how to circumvent the blacklist on YouTube links. Video 1 (first 16 minutes) and Video 2 (after 13 minutes). Edge3 (talk) 00:35, 1 October 2013 (UTC)

At Wikipedia:Administrators' noticeboard#Manning move_discussion in progress: uninvolved admins needed, I have asked uninvolved admins to indicate their willingness to participate in a triumvirate to close this move request. -sche (talk) 01:23, 1 October 2013 (UTC)

Being a contributor to The Wikipedia Weekly, The Wikipedia Signpost and so on shouldn't disqualify an editor from closing a discussion. The close is based on policy and consensus, not on the editor's personal views. Also, it doesn't appear that the close will be controversial considering the vote currently being 401, so it probably won't matter that much anyway. Josh Gorand (talk) 01:18, 1 October 2013 (UTC)

I'm proud of my ability to stay impartial in controversial situations, including the other RfCs I've closed. I had very strong opinions about the Muhammad images and Jerusalem cases, and in fact disagreed with the consensus in one of those situations. I have also been in similar situations with AfDs, where I have ascertained a consensus that I personally disagree with. If there's a consensus that I'm unsuitable, that's fine, but I think that given my ability to read consensus despite my personal feelings and the fact that two other admins would be involved, with their own opinions (let's be honest - no one has no opinion whatsoever on this topic), I would be an acceptable closer. But it's not up to me. Keilana|Parlez ici 01:45, 1 October 2013 (UTC)

Keilana seems to be well suited to doing the close and if joined by two others I think it will be fine. Sportfan5000 (talk) 02:48, 1 October 2013 (UTC)

You know, I'm somehow not convinced this is going to be a contentious close... Phil Sandifer (talk) 04:29, 1 October 2013 (UTC)

It doesn't matter who is on the admin panel, Obi-Wan Kenobi can use the force to get the outcome he prefers. Count Iblis (talk) 02:06, 2 October 2013 (UTC)

Other than a couple of procedural things and my "vote" in the first RfC, I have stayed out of this one; but as someone who gets concerned about "procedure", I just wanted to make a comment. By my reading of the "Closure" section below, this RfC may be closed any time after 19:15 UTC, October 7. By the time I finish typing this, that will be approximately 17.5 hours away. At this point, User:Kim Dent-Brown and User:Guerillero have been discussed as part of the closing "team" and each has said they will do it if asked. I have not seen any objections to either of them. As far as I can tell, they have not actually been "asked." As for a third person, right now there isn't one. As for the ArbCom, they had a motion pending in which they would appoint the closers, but that motion has failed. I propose we take the bull by the horns (is that an Americanism? If so, apologies) and officially ask Kim Dent-Brown and Guerillero to be the TWO closers, that they try to close this as soon after 19:15 UTC as would fit in with the rest of their lives, and that their decision must be unanimous, otherwise there is no "close" and someone needs to come up with Plan B. I don't think it's my place to ask them unilaterally (especially since I have added the two-closer and unanimous parts myself), but I am hoping we can get quick agreement on this and that someone can do the asking. Neutron (talk) 01:45, 7 October 2013 (UTC)

Note: This discussion is continuing under "Closure", below. Neutron (talk) 02:49, 7 October 2013 (UTC)

Looking through the various applicable policies, I didn't notice anything explicitly addressing how name changes should be dealt with as a general issue (independently of any gender issues this particular one is enmeshed in). If Wikipedia had existed at the time Cassius Clay changed his name to Muhammad Ali, at what point in the process would the change have been applied to the article? Would it happen as soon as he said that this was the name he wanted to be known as, or would it have to wait until more people knew him as that than his former name? *Dan T.* (talk) 02:27, 1 October 2013 (UTC)

It's incorrect to say that the transition name is currently the common name. Notice that there are sources that use only Bradley and none that use only Chelsea. --DHeyward (talk) 04:04, 1 October 2013 (UTC)

I'm somewhat confused by the instructions. They read: "Add # Support or # Oppose on a new line in the appropriate section below, followed by a brief explanation, then sign your opinion using. Please remember that this survey is not a substitute for discussion, and please provide a brief explanation for your recommendation. Responses to statements made in the survey sections should be restricted to the discussion section." If this is not a poll but a discussion, then why do I have to add a # Support or # Oppose, and why does my explanation need to be brief? If it is a poll, why is an explanation required? Should there be discussion? Or is the idea here that we just voice our opinion without talking to eachother here? If so, where should discussion take place? What is the validity of a poll/survey? How will it be used in determining consensus? For something that had a month op preparation time, this seems rather ill thought out. Martijn Hoekstra (talk) 07:23, 1 October 2013 (UTC)

I don't know why dates are deemed as unhelpful. Somehow, any administrator would have trouble reading 200 or 400 votes in one day or two. --George Ho (talk) 17:59, 1 October 2013 (UTC)

Just to note that we are in fact here again having a vote on whether to recognise someone's gender transition (what looks like a vote, walks like a vote and talks like a vote is a vote, even if Wikipedia editors often insist we are not voting). This was an issue brought up in press coverage and that provoked significant negative reactions in external media (see eg. [42] and [43]) and social media the last time. Having initiated this vote this time, I would like to note that I was and am very much uncomfortable with the fact that we are holding such a vote in the first place and that I don't think it's ethical or compliant with how we ought to treat biographies of living people, but alas, this is how things apparently works on this website, for now, and thus the only available method of getting the article moved from Bradley Manning to Chelsea Manning. Josh Gorand (talk) 22:44, 1 October 2013 (UTC)

Someone collapse this. It has zero valueTwo kinds of pork (talk) 00:05, 2 October 2013 (UTC)

Well I saw that this has already been brought to WP:ANI regarding a closure request based on consensus by numbers. Consensus works by strengths of arguments not by numbers so I just want to put that out there first. Anyways is there a timeline for when this move request is to be closed? - Knowledgekid87 (talk) 20:03, 6 October 2013 (UTC)

See my note under "Choosing a closing admin panel" above. Basically I am proposing that User:Kim Dent-Brown and User:Guerillero go ahead and close this together, without a third, and that their decision must be unanimous to "count". Neutron (talk) 01:55, 7 October 2013 (UTC)

Although I think it's unlikely Kim Dent-Brown and Guerillero will deadlock in a tie over how to close this discussion, I've put out an appeal for a third admin to join them. -sche (talk) 02:25, 7 October 2013 (UTC)

When I pointed out earlier the ethical problem of voting on whether to recognise someone's gender identity, I was told "we are not voting," as Wikipedia editors often insist, but here we are, with people talking about percents and votes. The oppose arguments in this discussion are mostly very weak, as they are not supported by solid rationales, often ignoring the evidence cited in the discussion and not based on policy (eg. a lot of claims she needs to have a legal name change or even "an executive order from his commander in chief" (sic!) (whatever that means) for us to move the article). Josh Gorand (talk) 02:45, 7 October 2013 (UTC)

Are there any objections to User:28bytes being the third closer? Plus, could we please not have debate in this section over the merits of the move or the strength of the arguments? This section is about how to get this thing closed. Neutron (talk) 04:12, 7 October 2013 (UTC)

A look at their edit history (new user as of August 28th) has them only editing within the topic of this move request. I have tagged their comments as such. Mike (talk) 13:22, 7 October 2013 (UTC)

This comment was removed above with the justification that it is not relevant to discuss Manning's gender. However, there have been other comments supporting the view that Manning is a woman and using that as a rationale. ([49], [50], [51].) If editors can use this as a rationale, is it not valid for this to be discussed? This article may end up being moved to "Chelsea Manning" partly for the reason that he/she is a woman, and no discussion of this point will have been allowed. For the purpose of neutrality and the appearance of a fair discussion, I recommend that such comments be removed as off-topic. Count Truthstein (talk) 18:19, 7 October 2013 (UTC)

The rest is here:
Talk:Chelsea Manning/October 2013 move request - Wikipedia ...

CryptoCurrency Certification Consortium (C4)

The CryptoCurrency Certification Consortium (C4) understands that privacy is an extremely important right granted to all, and is not a privilege earned by some. To that end, C4 has taken care to ensure that the collection, dissemination, and use of all personally identifiable information is clearly understood. This document outlines what information is collected, when and how it is collected, how it is used once collected, with whom the information is shared and under what circumstances.

C4 collects personal information such as names, addresses, email addresses, phone numbers, employment history, affiliations, skills/knowledge, and links to social networking sites (i.e. LinkedIn). This personal information is only collected with a persons explicit knowledge and is never collected without their consent or without their knowledge.

Personal information is collected through the use of online web forms that ask users to enter their information into text boxes and submit it to C4 via a submit button, or via file upload buttons designed to submit resumes, curriculums vitae, or similar documents. These forms make it clear that this information is being collected and submitted to C4.

Names, email addresses, and technical data related to electronic mail may be additionally collected by C4 as a result of emails being sent to any email address associated with the @cryptoconsortium.org domain name.

Government-issued identification documents (such as drivers licenses and/or passports) may be reviewed by C4 staff, affiliates, partners, or subsidiaries for the purpose of identifying candidates writing exams at testing facilities.

Non-personal information is also collected from time to time without explicit consent from users. C4s web servers may collect technical information related to a socket connection such as Internet Protocol (IP) addresses, dates/times of website access(es), and logging, tracing, and debug information related to a users web browser connection to C4s web servers.

Furthermore, information regarding payments made to C4 via cryptocurrency networks (i.e. Bitcoin) are implicitly collected by the cryptocurrency networks themselves and is available to the public, including C4. This information includes cryptocurrency addresses from which payments originated, and the public keys associated with the payers cryptocurrency keys.

C4, its affiliates, subsidiaries, and/or partners use the personal information that is collected for the purpose of personnel certification and related activities. Example usage includes adding a successfully certified individual to a list of certified individuals, verifying whether or not an individuals name is present on a list of certified individuals, and informing individuals when their name is due for removal from a list of certified individuals.

C4 may use this information to contact an individual regarding their certification or their pursuit of certification. C4 may, from time to time, use this information to ensure the accuracy of other associated information (i.e. use an email address to confirm the accuracy of a mailing address).

C4 provides information controls that allow individuals to choose the capacities in which their information is used. These controls allow individuals to opt-in or opt-out of particular uses of their information, such as being sent newsletters, being listed in directories of certified professionals, or being contacted for employment or contract opportunities with companies who seek certified cryptocurrency professionals. C4 respects the privacy of individuals and will make every reasonable effort to respect the choices made by individuals who make use of C4s resources.

In the event an email is sent to an address associated with the @cryptoconsortium.org domain, C4 will assume the sender consents to the use of the email address and name information associated with the email for the purposes of receiving a reply from C4 staff. C4 will also assume that the contents of the email were intended as private, and that no consent has been given to C4 to reproduce or share the content with any 3rd party.

C4 respects the privacy of the users of its services and will take reasonable action to prevent the collected information from being given to other parties without consent.

Despite this, C4 will, from time to time, share some or all of the collected information with other parties in select cases in accordance with the choices selected by users or in accordance with local, national, or international laws.

C4 will cooperate with law enforcement personnel who present valid warrants for investigations that involve C4s collected data. C4 will refuse to cooperate with law enforcement who do not positively identify themselves, their organizations, or present a valid warrant issued by a judge, justice of peace, or other authoritative judiciary personnel.

C4 will also share aggregate information (such as the number of certified professionals who match specific criteria) with recruitment firms, headhunters, human resource departments, and other interested parties who meet C4s standards. C4 may share additional information with these parties provided this sharing respects the choices made by individuals in their user profile regarding the use of their personal information.

C4 maintains backup systems which will, from time to time, create copies of information collected by C4. C4 will take reasonable measures to limit the accessibility of this information by making use of techniques such as passwords, encryption, and physical security.

Furthermore, C4 will employ encryption such as SSL or TLS encryption where appropriate to protect the personal information during transit to and from C4s servers.

C4 believes that every individual has the right to control how their information is used. As a result, C4 will respect the request for removal of personal information from its active servers.

While it is possible to remove active data from databases, C4 acknowledges that even after removal it is possible that removed information can still exist in backups or archives of old data that is maintained for the purposes of disaster recovery efforts. These copies may be retained until the copy has been replaced by a more recent backup that no longer contains the personal information. Furthermore, C4 acknowledges that this information, in some cases, can be reconstructed through various digital forensic techniques which are beyond the control of C4. C4 will make every reasonable effort to remove personal information from its active systems where requested and to no longer use the information actively. However, C4 also acknowledges that in many cases it may be impossible to completely remove all traces of this information.

Although C4s services are not directed at children, C4 makes no attempt to prevent access to its services by children. As such, it is possible for children or minors to submit information to C4. If you feel a child or minor has submitted personal information to C4 without consent of their parent or guardian, please do not hesitate to contact C4 to have the situation addressed in a timely fashion.

Continue reading here:
CryptoCurrency Certification Consortium (C4)

Public-Key Cryptography Standards (PKCS) – emclink.net

The Public-Key Cryptography Standards are specifications produced by RSA Laboratories in cooperation with secure systems developers worldwide for the purpose of accelerating the deployment of public-key cryptography. First published in 1991 as a result of meetings with a small group of early adopters of public-key technology, the PKCS documents have become widely referenced and implemented. Contributions from the PKCS series have become part of many formal and de facto standards, including ANSI X9 documents, PKIX, SET, S/MIME, and SSL.

Further development of PKCS occurs through mailing list discussions and occasional workshops, and suggestions for improvement are welcome. For more information, please contact us.

The draft Version 2.30 of the PKCS #11 specification is now available for 30-day public review. The public review will continue through Wednesday 28-Oct-2009. Please send all comments to pkcs-editor@rsa.com.

See the PKCS #11 page for links to the draft documents.

Contributions for PKCS are welcome! Please read our contribution agreement.

Note: PKCS #2 and PKCS #4 have been incorporated into PKCS #1

Read more here:
Public-Key Cryptography Standards (PKCS) - emclink.net

NSA Spying – The Hacker News

No doubt, You must be aware that Google tracks you, but what you probably did not realize is how precisely and till what extent it tracks you.

Well, Google knows which movies I watched where, when, at what time and with how many of my friends, and knows it so well even my eyebrows raised slightly in surprise!

Yes, you heard right.

If you are using your Gmail account like I do, receiving all movie booking and tickets, Google can easily track your movie flavors and frequent hangout places without access to GPS.

I was feeling bored last night, so I decided to watch a movie and moved towards Google to search newly released films. As I googled "Movies 2015"... Holy Crap! What I saw on the monitor was unbelievable.

In Google search results, I was able to see the list of all my past movie booking event activities and even my future bookings (shown below), and it was so, so accurate.

If you have Google account logged in into your browser, then just Google "Movies 2015" and youll have all your personal data on the computer screen, as shown.

Google knows I had seen Fast and Furious 7 twice; first time on April 2nd in New Delhi with my office colleague and the second time on April 3rd in Chandigarh with my family friends.

The Google Search Engine not just knows when, which and how many times I watched a movie, but it also collects all the data related to film, including number of tickets I had booked and location of movie hall with complete address on Google map.

This absolutely scared me for a while, as in this scenario, neither I had used any GPS enabled device nor I had any intention to reveal my hangout plans to social media check-in.

If you see the above screenshot carefully, you will notice that I have seen some movies twice or thrice. Guess what...??? Sometimes I watch the same movie with my girlfriend as well as my family on different days 😛

My family is not aware of it, but Google knows.

So be careful with your laptop if you watch the same movie with different girlfriends, because, in case, one of your girlfriend see your laptop, you could be in tremendous relationship trouble.

Ha! Just scaring you a bit, but this does not mean it could not be happened to you.

No doubt, this private information is only visible to me as it is linked to my Gmail account, but the fact here is that out of thousands of official, personal, spam and promotional emails, Google is smartly and continuously listing out every piece of information related to my activities.

This actually remind me of a statement made by the famous Media tycoon Rupert Murdoch who labeled Google worse than the NSA, when it comes to tracking, saying "NSA privacy invasion bad, but nothing compared to Google."

However, the question is

How is Google able to track your activities so accurately without GPS?

Well, Gmail does scan and read all your emails, clearly defined in its terms as their, "automated systems analyze your content."

However, Google has faced criticism from privacy action groups and lawsuits from the education sector for these terms.

Structured Data Markup allows website developers or email senders to add special tags to their existing HTML code, which in turn allow search engines to understand better what information is contained in emails or web pages.

For Example, If you are booking rooms from Hotels.com or flights from makemytrip.com or movie tickets from Bookmyshow.com, these sites will send you e-tickets formatted with email markup so that Google can easily scan and index them quickly for giving your alerts via Google Now service.

So, just make sure you don't hand over your laptop to any of your friends with your gmail account logged-in. Now as you guys know that I have booked tickets for Sunburn 2015, Goa, so catch you there. Stay Tuned, Stay Safe.

Originally posted here:
NSA Spying - The Hacker News

Bradley Manning Trial FAQ – wikileaks.org

Who is Bradley Manning?

When is the trial?

How long is the trial?

What is Bradley Manning accused of?

What is the potential sentence?

What is the status of the federal investigation against Julian Assange and six other founders, owners or administrators of WikiLeaks?

What is the scope of the WikiLeaks/Manning investigation, which US officials have described as unprecedented both in its scale and nature

How does secrecy in the Manning trial compare to secret trials in Guantanamo Bay?

What legal actions has WikiLeaks taken in relation to BM?

How can Manning be charged with Aiding the Enemy?

What does the Manning trial mean for press freedoms?

Where can I find Bradley Mannings plea statement?

Twenty-five-year-old Bradley Manning is alleged to be the source of a trove of written and audiovisual material detailing, inter alia, war crimes, corruption, torture and human rights violations published by WikiLeaks. Manning is a Nobel Peace Prize nominee. He has won numerous prizes, including The Guardian "Person of the Year" award in 2012. The material concerned every country in the world. It detailed the deaths of hundreds of thousands of people (the majority civilians) in occupied Iraq and Afghanistan. Details of the execution of an Iraqi family and its cover-up ultimately precipitated the end of the Iraq War, after the Iraqi government refused to renew US immunity from prosecution. The material also revealed the existence of US death squads in Afghanistan. More

Manning was deployed as an army intelligence analyst in Iraq. He was arrested in May 2010 at the age of 23. For the first nine months the US army placed Manning in conditions of pre-trial punishment which the UN Rapporteur on Torture found to be inhuman and degrading, in violation of the UN Convention Against Torture. The military judge ruled in January 2013 that Manning had been subjected to unlawful pretrial punishment for 112 days at the Quantico marine brig.

The trial commenced on 3 June 2013. Pre-trial hearings began on 16 December 2011. http://www.bradleymanning.org/learn-more/bradley-manning

The trial is scheduled to last twelve weeks.

View the infographic comparing prosecutions charged dates versus the timeline set out by the Manning plea. Read the charge sheet here

The most serious charge against Bradley Manning is Aiding the Enemy, a capital offence. Although the prosecution has stated that they will seek a life sentence and not the death penalty, it is within the discretion of the court to pursue it nonetheless.

The criminal US investigation against WikiLeaks was most recently confirmed to be ongoing by the Department of Justice spokesman for the Eastern District of Virginia, Peter Carr, on the 26th March 2013. The federal investigation into the WikiLeaks publication and its Australian publisher Julian Assange in connection with Mannnings prosecution will establish a precedent. If successful these efforts will criminalise national security journalism.

The various limbs of the Manning/WikiLeaks investigation progress in parallel and inform one another. Prior to the recent confirmation, the US Attorney General, Eric Holder, spoke about the WikiLeaks investigation to the press here and here), as did the Department of Justice spokesman Dean Boyd.

More: http://justice4assange.com/extraditing-assange.html#WHATLAWS

WikiLeaks Grand Jury 10-GJ-3-793

The WikiLeaks Grand Jury empaneled in Alexandria, Virginia since 2010 is the mechanism through which the Obama administration is determining how to shape its criminal prosecution against Julian Assange and WikiLeaks in connection with the material allegedly leaked by Bradley Manning. The WikiLeaks grand jury has the number 10-GJ-3-793. "10" is the year it began, "GJ" stands for grand jury, "3" refers to a conspiracy statute, and "793" to the Espionage Act as encoded in US law.

The military prosecutors in the Manning case are using transcripts from 10-GJ-3-793 WikiLeaks grand jury testimony against Bradley Manning in the military trial. Bradley Mannings lawyer requested to view this evidence but was denied access to it.

Australian embassy cables describe the WikiLeaks grand jury thus: "active and vigorous inquiry into whether Julian Assange can be charged under US law, most likely the 1917 Espionage Act". US officials told the Australian embassy ["the WikiLeaks case is unprecedented both in its scale and nature". According to these diplomatic communications, the WikiLeaks grand jury casts the net beyond Assange to see if any intermediaries had been involved in communications between Assange and Manning".

Grand juries confer special powers on prosecutors and the rules of evidence are not as strict as in a trial. Witnesses to the grand jury can be compelled to testify because they cannot refuse to do so on grounds of self-incrimination. Australian diplomatic communications stated that Grand juries can issue indictments under seal, and that theoretically one could already have been issued for Assange. In this particular case, it would be more likely that an indictment would become known at the point of extradition proceedings, should these take place, in the UK or Sweden.

FBI Criminal investigation against WikiLeaks

As of a year ago, approximately 20% of the FBI classified investigation file into WikiLeaks pertained to Bradley Manning. 8,741 pages (636 documents) related to Bradley Manning out of 42,135 pages (3,475 documents) relating to WikiLeaks. The remaining FBI file involved at least eight civilians related to the WikiLeaks disclosures, including the founders, owners, or managers of WikiLeaks. The FBI investigation includes damage assessments.

The FBI conducted illegal operations as part of the WikiLeaks investigation. One unlawful FBI WikiLeaks operation became known to the public after WikiLeaks spokesman Kristinn Hrafnsson revealed the incident in a live interview on national television. The information was subsequently confirmed by Icelands Minister of Interior, Ogmundur Jonasson. A parliamentary inquiry took place in February 2013 in relation to the FBIs WikiLeaks activities in Iceland. The FBI agents and prosecutors were expelled from the country and Icelandic authorities formally suspended their collaboration with the FBI. The FBI had allegedly attempted to entrap WikiLeaks and its founder, Julian Assange. The operation in Iceland was conducted in secret. It involved six FBI officers and two US prosecutors, one of which was a prosecutor at 10-GJ-3-793, the WikiLeaks grand jury in Alexandria, Virginia. The unlawful methods of the FBI investigation should not come as a surprise given that they are led by Neil MacBride, whose prosecutorial tactics involves claiming that US criminal law applies in foreign jurisdictions.

On July 28, 2010, one month after Pfc. Bradley Manning was arrested in Iraq, the FBI opened an official criminal investigation into the editor and chief of WikiLeaks, Julian Assange, partnering with the joint investigation of the US Defense Department and the US Department of States Diplomatic Security Service. The investigation then grew into a whole of government investigation, involving interagency coordination between the Department of Defense (DOD) including: CENTCOM; SOUTHCOM; the Defense Intelligence Agency (DIA); Defense Information Systems Agency (DISA); Headquarters Department of the Army (HQDA); US Army Criminal Investigation Division (CID) for USFI (US Forces Iraq) and 1st Armored Division (AD); US Army Computer Crimes Investigative Unit (CCIU); 2nd Army (US Army Cyber Command); Within that or in addition, three military intelligence investigations were conducted. Department of Justice (DOJ) Grand Jury and the Federal Bureau of Investigation (FBI), Department of State (DOS) and Diplomatic Security Service (DSS). In addition, Wikileaks has been investigated by the Office of the Director of National Intelligence (ODNI), Office of the National CounterIntelligence Executive (ONCIX), the Central Intelligence Agency (CIA); the House Oversight Committee; the National Security Staff Interagency Committee, and the PIAB (Presidents Intelligence Advisory Board).

Source: Bradley Manning pre-trial hearing

Trials of accused terrorists in Guantanamo Bay are more transparent than the Manning trial. In the case of offshore trials in Guantanamo Bay, the military court committed to providing journalists with contemporaneous access to the material filed in court. Where information has been withheld at Guantanamo Bay proceedings, journalists can challenge the decision to keep the information secret. By contrast, the overwhelming majority of court records filed in the Manning case have been kept secret by the court and attempts to make them public have been dismissed. Although journalists have been been able to access portions of his pre-trial proceedings, the government refuses to provide its existing official court transcript of these public portions to the public. Instead, independent journalists have had to collect, piece together and report the trial in the absence of the governments compliance with the right of public access to criminal proceedings. These efforts are not funded by the US tax payer, but paid instead by donations. The most exhaustive record of Mannings court proceedings and the investigation against WikiLeaks is independent journalist Alexa OBriens site.

The Freedom of the Press Foundation is crowd-funding donations so that a court stenographer can be hired to take transcripts of the trial. Donations are tax-deductable in the US. https://pressfreedomfoundation.org/

The right of public access to the Manning hearings is protected by the First Amendment. Bradley Mannings lawyer was denied access to documents used by the prosecution. Journalists have not been allowed to view the documents filed in the proceedings.

WikiLeaks and Julian Assange have filed several petitions and complaints to the military court in relation to access in the Manning trial.

If Manning is convicted of the aiding the enemy offence, it would set a precedent that disclosing classified information to a publication is akin to communicating with Al Qaeda. The prosecution will call several operatives involved in the summary execution of Osama bin Laden to testify in secret. The prosecution has stated to the court that they would be pursuing this charge even if Manning was alleged to have submitted the information to The New York Times instead. Numerous prominent lawyers and journalists have opposed the pursual of this charge, including the spokesman for the US State Department under Hillary Clinton, PJ Crowley.

The charges against Manning and the potential or existing sealed indictment against Julian Assange carries with it the criminalisation of the news-gathering process and a calculated crippling of the First Amendment. The aiding the enemy charge implies that any press organisation, and any editor, anywhere in the world can be prosecuted for espionage, that is for divulging information that may be read by a person that the US has designated as an "enemy". In practice, this means that any information that is made available by a publisher on the Internet which the US government deems to be harmful to its national security can trigger the criminal prosecution of the publisher, even if it is a foreign publisher.

The US governments attempts to establish that the alleged WikiLeaks source and its publisher engaged in a conspiracy has been re-employed in the case of the US governments espionage subpoena of FOX news reporter James Rosen. The Manning trial and the WikiLeaks investigation marked the beginning of the sharp decline of press freedoms under Obama.

It can be found here.

Read more here:
Bradley Manning Trial FAQ - wikileaks.org

Why Won’t Bernie Sanders Support Edward Snowden?

As of right now, none of the presidential candidates have even come close to supporting Edward Snowden. In fact, candidates have called him a traitor, a spy, and stated that he's committed treason. The facts are Snowden broke the law, but in turn, exposed illegal government activity to the American people. So did Snowden actually do something illegal or commit treason? That's where the 'which came first, the chicken or egg' argument comes into play, but it seems as if all of the presidential candidates have stated the chicken clearly committed treason.

Maybe I'm not surprised that none of the candidates have spoken in favor of Snowden, but I just thought that if there was someone who would stand up for him, it would be Bernie Sanders. When asked about the issue, Sanders has stated "I think Snowden played a very important role in educating the American public... he did break the law, and I think there should be a penalty to that." But Sanders also has stated that he would shut down the NSA and was one of the very few who voted against the Patriot Act. And just recently, Sanders tweeted out:'In my view, the NSA is out of control and operating in an unconstitutional manner.'

It just doesn't make sense to me. Sanders supports the outcome of what Snowden brought to light, but doesn't agree with the methods of how the information was made public. Maybe if Sanders supported Snowden, it would hurt him in the election, so maybe this isn't a huge issue for him right now. Maybe his campaign views Snowden as a can of worms, as he is only one person. But Sanders doesn't have a history of sitting down when issues are not politically expedient. In fact, Bernie Sanders' stance on Snowden is with the majority of Americans who would prosecute Snowden, according to recent polls. And Sanders is already better than most candidates when it comes to the issue of government surveillance, the NSA, and privacy.

However, if Sanders continues on his path of standing up for ideas when it's in the infancy of popular opinion, he would come out in support of Snowden. There aren't many issues on which I disagree with Bernie Sanders, but to use his own words, his stance on Snowden is just not good enough.

Go here to read the rest:
Why Won't Bernie Sanders Support Edward Snowden?

WikiLeak blog – Small Business

It looks as if WikiLeakS.org / Julian Assange's stupid decision to abandon use of PGP encryption, back in 2007 has come home to roost, with the revelation that they idiotically re-used a symmetric encryption key password and ineptly published a full archive of the controversial US Embassy / State Department Diplomatic Cables on BitTorrent peer to peer file sharing networks

The fact that they published this unredacted archive at all via BitTorrent shows how chaotic and incompetent Julian Assange and his motley crew of inexperienced acolytes had become after Daniel Domscheit-Berg and the "Architect" left them.

The end result is that there are now many people around the world, including all the repressive governments mentioned in the quarter of a million Diplomatic cables who can now simply search for key words like (strictly protect), to find the names of informants and information sources who have been in contact with US Embassy diplomats and who could therefore now be easily persecuted.

See the Cryptome.org for a direct file link to z.gpg or to this torrent link to the same encrypted compressed file via BitTorrent peer to peer filesharing.

John Young's evident glee that WikiLeakS.org have now published the full, unredacted archive of US Diplomatic Cables, is, in its own way, just as reprehensible as Julian Assange's indifference to the fate of vulnerable individual human beings named in the cables.

He of all people should know that the US Government neither has the time, the money , nor the inclination, nor the bureaucratic efficiency to warn or protect the hundreds of named informants or contacts, which have now been betrayed to the world, an action which has been universally condemned by WikiLeakS.org's former mainstream media partners and by human rights organisations.

This is in addition to the names of political dissidents who were in contact with the US Embassy in Belarus which Assange has already handed over to the Lukashenko dictatorship via the holocaust denier Israel Shamir.

Some "open source" / "full disclosure" advocates are making the spurious claim that the publication by WikiLeakS.org of the unredacted cables.csv and onto their searchable web site front end, is somehow better for any political dissidents or confidential sources who had dealings with the US Embassies and whose names are tagged with (strictly protect) and other markers.

Firstly, not all political dissidents in repressive countries have access to the internet at all, let alone to fast, secure, anonymous connections which would allow them to download the massive cables.csv file itself or to use the (insecure) WikileakS.org cable search websites.

None of these websites employ SSL Digital certificates or provide Tor Hidden services etc. to mask the identities of people searching for their own names or those of their family or friends.

Some of the people mentioned in the US Embassy cables several years ago, could in fact be in prison or under investigation for other reasons in 2011, without any or without any safe internet access at all. Being named as having been in contact with the US Embassy, even several years ago, could easily lead to charges of espionage etc. in insane countries like Iran.

Julian Assange's disregard for the Sensitive Personal Data of innocent individuals and his organisation's utter incompetence at handling such data securely, is indistinguishable from that displayed by many of the government bureaucracies you would expect him to be opposed to. Do not to trust him or WikiLeakS.org with any future whistleblower leak material, Find another post WikiLeakS.org website or organisation instead - see the listing and analyses at LeakDirectory.org wiki.

WikiLeakS.org and PGP Public Key Encryption

WikileakS.org abandoned even their limited use of PGP Encryption with the public or with the media, back in 2007, when they let their published PGP key expire.

Why have WikiLeakS.org abandoned the use of PGP Encryption ?

If they had been using Public Key Cryptography last year, to encrypt correspondence or documents or files using their recipients' individual Public Keys, then there would have been no password for the incompetent WikiLeakS.org activists to re-use .

Every copy of the controversial cables.csv file could have been encrypted with a different recipient's Public Key and would have had a different symmetric encryption key (which no human would could have been capable of revealing, even under torture).

Not even WikiLeakS.org / Julian Assange could have decrypted a seized or intercepted or publicly leaked copy of such an encrypted file, only the recipient with access to his or her own private decryption key could have done so.

Either Julian Assange is ignorant of how to use Public Key Cryptography (hardly likely for someone who has tried to write cryptographic software himself) or he and the #wikileaks twitter feed are lying again:

https://twitter.com/#!/wikileaks/status/109134616153169920

Encryption passwords (PGP) are permanent. David Leigh constantly lies, hence even in his own book, "snaky brits".

6.24 AM September 1st 2011

https://twitter.com/#!/wikileaks/status/109136557914603520

@ABCTech It is false that the passphrase was temporary or was ever described as such. That is not how PGP files work. Ask any expert.

6.32 AM September 1st 2011

To decrypt a file encrypted with PGP using a recipient's Public Key, you need to have physical access to the Private De-Cryption key, which is not accessible to anyone who copies or intercepts the encrypted file in transit.

Obviously the password which unlocks the Private De-Cryption Key from your PGP Keyring can be changed.

Symmetric encryption unprotected by Public Key encryption is just an option with PGP, but that is not how PGP is designed to be used to protect files in transit over the internet or on vulnerable USB memory sticks !

There was nothing, except for laziness or incompetence, which prevented Julian Assange or his followers from securely destroying the symmetrically encrypted cables.csv compressed file archive immediately after he gave it to David Leigh and then re-encrypting it from the master copy with a different key and passphrase. This master copy , we assume, given the dispute between Julian Assange and Daniel Domscheit-Berg, would have been held on a separately encrypted computer file system anyway.

The award winning investigative journalist at The Guardian newspaper David Leigh's book:

WikiLeaks: Inside Julian Assange's War on Secrecy by David Leigh and Luke Harding

did reveal on pages 138 to 139 an unnecessary password, which he rightly assumed would only be a temporary one, but which should never have been re-used by Julian Assange in the first place.

Leigh refused. All or nothing, he said. "What happens if you end up in an orange jump-suit enroute to Guantnamo before you can release the full files?" In return he would give Assange a promise to keep the cables secure, and not to publish them until the time came. Assange had always been vague about timing: he generally indicated, however, that October would be a suitable date. He believed the US army's charges against the imprisoned soldier Bradley Manning would have crystallised by then, and publication could not make his fate any worse. He also said, echoing Leigh's gallows humour: "I'm going to need to be safe in Cuba first!"

Eventually, Assange capitulated. Late at night, after a two-hour debate, he started the process on one of his little netbooks that would enable Leigh to download the entire tranche of cables. The Guardian journalist had to set up the PGP encryption system on his laptop at home across the other side of London. Then he could feed in a password. Assange wrote down on a scrap of paper:ACollectionOfHistorySince_1966_ToThe_PresentDay#. That's the password," he said. "But you have to add one extra word when you type it in. You have to put the word '"Diplomatic' before the word 'History'. Can you remember that?"

"I can remember that."

Leigh set off home, and successfully installed the PGP software. He typed in the lengthy password, and was gratified to be able to download a huge file from Assange's temporary website.

So having given Leigh instructions about downloading and installing PGP software, Julian Assange failed to instruct him to generate a Public / Private key pair and to send him the Public Key, so that Julian could individually encrypt the the cables.csv compressed archive just for David Leigh and nobody else.

At the face to face meeting described in the book, Julian Assange could easily have given David Leigh a copy of a WikiLeakS.org Public Encryryption Key for him to install when he set up the PGP software on his laptop as instructed, or pointed him to an online version.

They could have agreed a pre-shared secret for extra authentication.

David Leigh could then have been instructed to generate his own Public / Private keypair (protected in his PGP Keyring by his own strong passphrase) and to send a Digitally Signed and Encrypted copy of his Public Key back to Jullian Assange via email etc. together with the pre-shared authentication secret, all encrypted with the WikiLeakS.org Public Key. This should have been sufficient cryptographic proof that David Leigh's Public Key was the correct one, since nobody else apart from Julain Assange / WikiLeakS.org could have read the contents of that message.

Julian Assange could then have encrypted the compressed cables.csv file with David Leigh's Public Key and pointed him to the secure website he had set up for the encrypted file to be downloaded from

This encrypted file could only have been de-crypted by someone in possession of both David Leigh's passphrase and the corresponding Private Key in the PGP Keyring on David Leigh's MacBook laptop.

If WikiLeakS.org had been regularly using PGP over the years, even inexperienced members of the cult would have been familiar with these simple, well documented concepts.

If that copy of the encrypted file had somehow been published by the incompetent WikiLeakS.org crew on BitTorrent, then only David Leigh could have decrypted it (assuming he was still in control of his PGP Keyring on his laptop computer) , even if he had published his own pass phrase in his book, rather than Julian's rather pompous one.

7-Zip compression

Then he realised it was zipped up - compressed using a format called 7z which he had never heard of, and couldn't understand.

The .7z file extension is used by 7-Zip . This is freely available over the internet, on various computing platforms and does offer more options for better compression than the standard .zip compression utilities which are built in to modern versions of the Microsoft Windows or Apple OSX operating systems, at the cost of longer compression times and more use of memory.

The 7-Zip Ultra compression option seems to be what the cables.csv file was compressed with down to i.e. only 21 % of its original size.

However to achieve this amount of compression on such a big file could take quite a while, perhaps up to an hour on an average PC. Unzipping is much quicker, a couple of minutes at most.

Compression is also built in to the PGP / GnuPG encryption software, but that produces a compressed file of about 640 MB i.e. about twice that of the of the 7-Zip version, about 41% of the original size of the monolithic cables.csv file.

Like most .zip compression software these days, 7-Zip also offers encryption, using the same AES 256 bit algorithm used by default by GnuPG / PGP, but Assange et al did not bother to make use of that.

He got back in his car and drove through the deserted London streets in the small hours, to Assange's headquarters in Southwick Mews

Assange was staying at Vaughan Smith's Frontline Club for investigative / foreign / war correspondent journalists, owned by Vaughan Smith, in whose Norfolk country estate has bedrooms at numbers 7 and 9 Southwick Mews

http://www.frontlineclub.com/club/bedrooms-1.php

He is now on bail and electronically tagged living at Vaughan Smith's country estate in Norfolk, where his supporters invent state surveillance fantasies for the credulous mainstream media - see "CCTV ANPR" or just "radar activated speed signs" monitoring Julian Assange at Ellingham Hall in Norfolk ?

Assange smiled a little pityingly, and unzipped it for him.

Now, isolated up in the Highlands, with hares and buzzards for company, Leigh felt safe enough to work steadily through the dangerous contents of the memory stick.

So, in the end, Julian Assange in fact actually handed over an unencrypted copy of the file to David Leigh, on an easily lost or stolen USB memory stick. If Assange really cared about protecting innocent people from evil governments, then he would not have allowed this to happen.

It is astonishing how the WikiLeakS.org cult propaganda machine has deluded itself that somehow it was David Leigh and The Guardian which was responsible for this cryptographic and internet publication incompetence, rather than the alleged technological privacy and anonymity expert Julian Assange and his supposedly expert helpers.

TextWrangler keyword search

Obviously there was no way that he, or any other human, could read through a quarter of a million cables. Cut off from the Guardian's own network, he was unable to call up such a monolithic file on his laptop and search through it in the normal simple-minded journalistic way, as a word processor document or something similar: it was just too big. Harold Frayman, the Guardian's technical expert, was there to rescue him. before Leigh left town, he sawed the material into 87 chunks, each just about small enough to call up and read separately.

Probably 19 Megabytes for each of 86 chunks with a little bit left over in the 87th chunk.

Then he explained how Leigh could use a simple program called TextWrangler

TextWrangler is the "little brother" of BBEdit and is only available for the Apple Macintosh platform. David Leigh's laptop computer.is stated to have been a MacBook elsewhere in the book.

to search for key words or phrases through all the separate files simultaneously, and present the results in a user-friendly form.

So why had Julian Assange or his WikiLeaks acolytes not already broken the 1.6 Gigabyte file down into usable chunks and zipped them up into, ideally, several archive files for their mainstream media partners ?

This WikiLeak.org blog has criticised them in the past for not offering (multiple) floppy disk or even CD-ROM sized versions of their whistleblower leaks documents, as well as just large monolithic files.

Not everybody, especially people in third world countries under repressive governments, or even people using mobile internet devices, has access to fast broadband internet connections.

Is this the end of WikiLeakS.org ?

Now that WikiLeakS.org have no more secrets left to publish, will they actually get around to re-inventing themselves and re-launching a secure anonymous system without the destructive influence of Julian Assange ?

Or will the cult continue regardless and just get dragged into long legal cases ?

Original post:
WikiLeak blog - Small Business

Encryption | Define Encryption at Dictionary.com

Contemporary Examples

The secret behind the Coin is that it is powered by a 128-bit encryption for all storage and communication.

Get to know E2E (end to end) encryption, says Dan Auerbach, a staff technologist at the Electronic Frontier Foundation.

Forget about encryptionyour ISP could require the key as condition of using its network.

Websites should probably revoke and re-issue their encryption keys as well.

Bloomberg even reported that the NSA did know and had been exploiting the mistake in encryption.

Snowden contacted Poitras in mid-January 2013 after failing to connect with Greenwald due to his lack of encryption.

With the Assange movie, there are sequences like the [Vincente] Minnelli-like visual explorations of an encryption system.

In November 2013, well before U.S. bombs started falling, ISIS did launch a Web-based encryption tool, Ahlberg said.

And then Glenn finally got on encryption, came on a plane to New York, and off we went.

How many congressmen could even describe how encryption works?

British Dictionary definitions for encryption Expand

to put (a message) into code

to put (computer data) into a coded form

to distort (a television or other signal) so that it cannot be understood without the appropriate decryption equipment

Derived Forms

encrypted, adjectiveencryption, noun

Word Origin

C20: from en-1 + crypt, as in crypto-

Word Origin and History for encryption Expand

1975 in computer sense, from en- (1) + crypt (see crypto-). Related: Encrypted; encrypting; encryption.

encryption in Science Expand

encryption in Culture Expand

The process of encoding a message so that it can be read only by the sender and the intended recipient. Encryption systems often use two keys, a public key, available to anyone, and a private key that allows only the recipient to decode the message. (See also cryptography.)

encryption in Technology Expand

Read more here:
Encryption | Define Encryption at Dictionary.com