Julian Assange says Pamela Anderson is attractive, savvy – The Australian Financial Review

Julian Assange last month. Asked about Pamela Anderson on Wednesday, he said: "Over the last two years she has done more to try and get this Australian, me, out of detention without charge than the combination of the governments of Gillard, Rudd, Abbott and Turnbull."

WikiLeaks founder Julian Assange has done little to quash rumours he is in a relationship with former Baywatch actor Pamela Anderson, saying "I'm not going into private details" when quizzed about a possible romance.

Anderson has been visiting Assange in the Ecuadorian embassy in London, where the Australian has been holed up since mid-2012 to avoid extradition to Sweden over allegations of sexual assault.

The Canadian-American actress told UK television this week that WikiLeaks was "heroic and very important".

Assange was asked on Wednesday about his relationship with Anderson, who has been spotted taking food into the embassy.

During a phone interview with KIIS FM's Kyle & Jackie O Show, host Kyle Sandilands asked: "Is there some sort of romance there?"

"A lot of people want to know that, which I guess is helpful to draw attention to this situation," Assange replied.

"Pamela Anderson is an impressive figure. She's an attractive person and an attractive personality and whip-smart. She's no idiot at all - psychologically she's very savvy."

Asked if he was in love, the WikiLeaks founder told the radio station: "Over the last two years she has done more to try and get this Australian, me, out of detention without charge than the combination of the governments of Gillard, Rudd, Abbott and Turnbull."

Pressed again on whether he had formed a "love affair", Assange would only say: "I mean I like her, she's great, but I'm not going to go into the private details."

Hours earlier, Assange had activated his own personal Twitter account, posting: "Rumours of my death have been greatly exaggerated (in a curious plot)."

He told KIIS the conspiracy theory that he was dead or kidnapped started in October during the US election campaign.

One theory suggested people should neither trust WikiLeaks nor give it documents or funds "because it was secretly now run by the CIA".

"Who benefits from that?" Assange asked on Wednesday.

The 45-year-old also said Donald Trump's presidency had brought some benefits.

"I quite like the way that now suddenly it's permissible for most media to criticise government in a way that it wasn't in the past in the United States."

Here is the original post:
Julian Assange says Pamela Anderson is attractive, savvy - The Australian Financial Review

New Charity Focussed Cryptocurrency Launches – AllCoinsNews.com (blog)

Centurion, a new cryptocurrency, launched last week with a focus on ease-of-use and scalability in addition to promoting childrens charities. With a block size of 2 MB, Centurion can process and confirm transactions in under 6 minutes.

Ready-made merchant payment API libraries can be integrated into websites to enable the cryptocurrency to be used to buy products and services. The first adopter of Centurion is an online store which sells more than 100 e-books and 50 videos on marketing, cryptocurrencies, internet tips, tricks, businesses, etc. The partnerships will be revealed soon, with more stores to follow soon after. Centurion is already available for traders on the cryptocurrency exchange Excambiorex.

Mining pools for Centurion users do not require miners to sign up and manually withdraw their accumulated share of cryptocurrency. Instead, they will be receiving funds directly into their wallets. According to the company, this has been done to improve ease of use, but also reduce the risk of attacks on the mining pools wallets. The auto pay-outs are set to execute every few minutes. In order to cater to users who are not technology experts, simple, pre-configured files are provided that can be downloaded to start CPU and GPU mining.

Centurion4Children is donating 5 million Centurion coins to well-established charity organizations. It is also raising funds within the community and through the website. The foundation is already represented in India, as well as Africa and Europe with official charity partnerships being revealed in March, 2017. Centurion4Children is currently raising funds for: Support a Child and its Entire Family, Sponsor a Boy, Safe Water for Children in Development Countries, and Sustainable Schools. To cover promotion costs and to kick-start the donations distributed by Centurion4Children, the coin has reserved 50 Million of its tokens.

The cryptocurrency platform will soon embark on a marketing campaign in association with Cryptonetwork ltd, a Dubai-based entity which has a network of people spread across India, Germany, Italy, Spain and several other countries. They will be involved in various promotional activities, including the sale of products and services, for which they will receive rewards in centurion and bitcoin. An estimated 20 million Centurion tokens over a period of 5 years has been earmarked for these promotional purposes.

Centurion will donate 5 million of its reserved coins to charity and the remaining 50% will be used to reward early adopters, investors, related projects and talented individuals within the community who work to improve the Centurion cryptocurrency.

Specifications X11 Proof of Work (PoW) 3% Proof of Stake (PoS) RPC port: 5555 / P2P port: 5556 1 Minute Blocks Block Size 2Mb Reward Schedule: Blocks until 100 0 CNT (for fair difficulty balancing) Blocks 101 250,100 100 CNT Blocks 250,101 500,100 75 CNT Blocks 500,101 1,000,100 60 CNT Blocks 1,000,101 2,000,100 50 CNT Blocks 2,000,101 2,500,100 25 CNT Blocks 2,500,101 3,500,100 10 CNT Blocks 3,500,101 4,000,100 5 CNT Blocks 4,000,101 5,000,100 2.5 CNT Blocks 5,000,101 19,000,000 1 CNT Total Coin production 250 Million Reserve: 50 Million. SIDEBAR

Here is the original post:
New Charity Focussed Cryptocurrency Launches - AllCoinsNews.com (blog)

Chelsea Manning Fundraiser Garners More Than $83000 in One Week – NBCNews.com

People hold signs calling for the release of imprisoned wikileaks whistleblower Chelsea Manning while marching in a gay pride parade in San Francisco, California June 28, 2015. Elijah Nouvelage / Reuters

A fundraiser to welcome home former Army intelligence analyst Chelsea Manning has raised more than $83,000 in just one week. Nearly 2,000 individuals from across the globe have contributed to the

"It's amazing to see so much support for Chelsea, but it's not really a surprise," Evan Greer, a friend and supporter of Manning, told NBC Out. "She has done so much to fight for all of our basic human rights. I think people are grateful for the opportunity to give back by supporting her."

On January 17,

"Chelsea Manning has served a tough prison sentence," President Obama said in his final news conference. "It has been my view that given she went to trial, that due process was carried out, that she took responsibility for her crime, that the sentence that she received was very disproportionate relative to what other leakers had received and that she had served a significant amount of time, that it made sense to commute and not pardon her sentence."

Related:

The commutation was lauded by several human rights and civil liberties organizations, including the American Civil Liberties Union (ACLU) and Amnesty International, which called the commutation a "

Chase Strangio, one of Manning's ACLU attorneys, said the commutation "likely saved her life." While being incarcerated at a men's military prison at Fort Leavenworth, Kansas,

There was also expected criticism from conservatives, including House Speaker Paul Ryan, who called the commutation "outrageous" and said it set "a dangerous precedent that those who compromise our national security won't be held accountable for their crimes."

Regardless of what one thinks of Manning's actions and her punishment, once she's released from prison on May 17 -- after serving a seven-year sentence -- adjusting to her new life will likely be a challenge.

"Upon her release she will need logistical, emotional, and financial support to safely transition into the free world," her GoFundMe page states. "For the first time in her life, Chelsea will have the opportunity to live freely as her authentic self, to grow her hair, engage with her friends, and build her own networks of love and support. We want her to have the tools to do that and to overcome the years of abuse she has experienced in custody."

Manning, who came out as transgender woman after her arrest, will be dishonorably discharged from the Army and as a result

A number of those who donated to the "Chelsea Manning Welcome Home Fund" stated they were inspired to do, because they admired her "courage," "bravery" and "patriotism," and credited the leaks with exposing abuses.

"Thank you for your courage in trying to make our country better for all of us," wrote donor Dennis Peterson. Tristan Townsend, another donor, wrote, "You are such a courageous person who has endured so much for the benefit of others. Thank you so much."

While in prison Manning wrote about whistleblowing, national security, LGBTQ rights, health care and a number of other issues. She has not stated publicly exactly what she will do once she is free, but according to Strangio, she will not cease to be vocal on such issues.

"Finally she will have the opportunity to chart her own path, and only she can say what that will look like. I know from my experience with her that her commitment to fighting injustice is unwavering, and I am confident that she will continue to fight for government transparency, trans justice and the many other fights ahead," Strangio said.

Follow NBC Out on

Read the original post:
Chelsea Manning Fundraiser Garners More Than $83000 in One Week - NBCNews.com

Craven County arrests and citations for Feb. 16 – New Bern Sun Journal

The following are arrests and citations were recently issued in Craven County:

The following are arrests and citations were recently issued in Craven County:

City Police Departments: James Alexander Williams, 26, 346 N.C. 307, Vandemere, Feb. 14, misdemeanor larceny. Officer: M.A. Ramos. Danielle Kilwanna Waters, 26, 6 Arlington Circle, Apt. D, Feb. 14, driving while license revoked, expired registration card or tag. Officer: J.E. Sterling. Grady Trevon Marquise Brant, 18, 931 West St., Feb. 14, possession of marijauana greater than 1/2 to 1 1/2 ounces. Officer: N. Coffey. Christine Lynn Greene, 25, 200 Shipman Road, Apt. A7, Havelock, Feb. 13, larceny of a motor vehicle. Officer: K. Lee. Jasmine Lovick, 24, 711 Chattawka Lane, Feb. 13, injury to real property, attempted breaking or entering of building. Officer: B. Bryant. Urbing Gomez Macedo, 38, 380 Wilmar Road, Vanceboro, Feb. 13, driving while license revoked. Officer: J. Whaley. Willie W. Newkirk, 20, 1422 Washington St., Feb. 13, possession of marijuana paraphernalia. Officer: C. Garrison. Taveon Malik Taylor, 16, 1036 Sampson St., Feb. 13, simple possession schedule VI controlled substance, possession of marijuana paraphernalia. Officer: M.D. Lee. Brittney Danielle Collins, 28, 425 Ipock St., Vanceboro, Feb. 13, driving while license revoked, speeding. Officer: A.B. Callaway. Brandon Bryce, 28, 175 Cool Springs Road, Ernul, Feb. 13, felony possession of cocaine, hit and run leaving the scene with property damage, unauthorized use of motor vehicle, driving while impaired. Officer: B. Rohrs. Ivan Monroe Pickett, 47, 2913 Monroe Drive, Feb. 13, driving while license revoked. Officer: A.C. Greenidge. Christine Lynn Greene, 25, 100 Vine St., Apt. 6, Havelock, Feb. 13, driving while license revoked, failure to reduce speed. Officer: A.R. Williams. Malcolm Jamal Brown, 29, 1733 Beaumont Drive, Greenville, Feb. 12, driving while license revoked, failure to stop at steady red light. Officer: J.T. McKee. Joshua Tyler Ries, 22, 1703 Olympia Road, Feb. 12, driving while license revoked, failure to maintain lane control. Officer: K.M. Johnson. Jenny Leigh Bryant, 54, 2905 Magnolia Drive, Feb. 11, shoplifting or concealment of goods. Officer: J.F. Fell. Christine Lynn Greene, 25, 200 Shipman Road, Apt. A7, Havelock, Feb. 13, larceny of motor vehicle. Officer: K. Lee. Jasmine Lovick, 24, 711 Chattawka Lane, Feb. 13, larceny of motor vehicle. Officer: K. Lee. William Bradley Manning, 61, address unknown, Feb. 12, possession of drug paraphernalia, soliciting from highway. Officer: M. Manning. Anthony John Fedele, 34, 500 Fisher Town Road, Havelock, Feb. 12, resisting public officer, driving while license revoked. Officer: B. Young. John David McLawhorn III, 38, 100 Kinnett Blvd., Feb. 11, breaking coin or currency machine. Officer: M. Manning. William Bradley Manning, 61, address unknown, Feb. 10, solicitation and begging in New Bern. Officer: B. Lewis.

Craven County Sheriffs Office: Felix Andrew Sumner, 27, 1120 S. West Craven Middle School Road, Feb. 13, possession of marijuana up to 1/2 ounce. Deputy: D. Anderson. Gariella Brianna Cacciotti, 20, 2209 Oakview Drive, Feb. 13, felony possession of a schedule I controlled substance. Deputy: V. Arnold. William Kelsey McKiddy, 22, 115 Eagle Trail, Feb. 13, possession of drug paraphernalia. Deputy: V. Arnold. Alvin Mack Brown, 35, 17409 E. Constance Road, Suffolk, Va., Feb. 11, driving while license revoked. Deputy: J.A. Keys. Katrna Nelson, 46, 391 Parker Road, Feb. 12, simple assault. Deputy: D. Woods. Gregory Owen Sanders, 53, 715 Vann St., Feb. 12, injury to personal property. Deputy: D. Woods. Daquan Best, 22, 707 West St., Feb. 11, simple assault. Deputy: G. Clark. Demetris A. Nolan, 23, 1200 N. 20th St., Lot 91, Morehead City, Feb. 11, simple assault. Deputy: G. Clark. Kishon Jerell Toms, 32, 1503 Washington St., Feb. 11, simple assault. Deputy: G. Clark. Erik Douglas Barfield, 26, 119 Keith Circle, Feb. 11, contributing to the deliquency of a juvenile. Deputy: D. Anderson.

N.C. Highway Patrol: William Dayshawn Wilson, 27, 660 Spring Garden Road, Feb. 14, driving while license revoked, speeding, reckless driving to endanger, failure to stop at stop sign or flashing red light. Trooper: A.J. Lamp. Tony Lee German, 44, 2301 Carolina St., Feb. 13, driving while license revoked. Trooper: R.J. Onofrio. Natalie Jill Salter, 26, 395 Salter Lane, Havelock, Feb. 13, driving while license revoked. Trooper: R.L. Wallace. Jason Ray Wood, 38, 101 Pettiford Lane, Feb. 12, driving while license revoked, expired registration card or tag, expired or no inspection. Trooper: N.C. Stoneroad. Ottis Franklin Adams III, 38, 118A Gladewood Circle, Feb. 12, driving while license revoked. Trooper: J.A. Rink. Carla James Petteway, 51, 223 Creek Bank Drive, Feb. 12, possession of marijuana up to 1/2 ounce. Trooper: J.A. Rink. David Michael Slugaj, 50, 1056 Palestine Road, Fayetteville, Feb. 12, driving while license revoked, failure to wear seat belt while driving. Trooper: C.W. Lawrance. DeQuan Marshawn Norfleet, 22, 126 Concord Drive, Greenville, Apt. 4, Feb. 11, driving while license revoked, expired registration card or tag, expired or no inspection. Trooper: R.J. Onofrio. Christopher Joseph White, 34, 6115 Redwood Lane, Alexandria, Va., Feb. 11, driving while license revoked, reckless driving to endanger. Trooper: S.F. Brown. James Robert Lewis, 30, 4506 Haywood Farms Road, Feb. 11, possession of marijuana up to 1/2 ounce, unsafe tires, driving while license revoked, unintentional litter of less than or equal to 15 pounds. Jerry Lewis McCullough Jr., 34, 5 Little Valley Court, Durham, Feb. 13, driving while impaired, speeding. Trooper: M. Riggs.

Alcohol Law Enforcement: Hisham Allam Sulaiman, 55, 103 Rhem St., Feb. 12, selling or consuming alcohol beverage after hours. Officer: D.T. Chunn. Eva Nelson Cagle, 59, 814 Circle L Drive, Feb. 12, selling or consuming alcohol beverage after hours. Officer: D.T. Chunn.

Read the rest here:
Craven County arrests and citations for Feb. 16 - New Bern Sun Journal

Edward Jay Epstein’s Alternative Facts – The Nation.

Edward Snowden. Photo illustration by Michael Xiao.

Its been three and a half years since the pervasive covert surveillance of millions of Americans by the National Security Agency was exposed by Edward Snowden. In that time, public opinion has split into two camps: one that hails Snowden as a patriot for revealing countless classified NSA spying programs, and one that considers him a traitor. In How America Lost Its Secrets, Edward Jay Epstein, a partisan of the second camp, digs in even deeper. Snowden, he believes, is not just a traitor; he is also a spy. But for whom? Epstein argues that it could be China. Or possibly Russia. Or China and Russia take your pick. This is a book long on conjecture, innuendo, and unsubstantiated claims; it reads like an adrenalized addendum to the discredited House Permanent Select Committee on Intelligence report on Snowden, which, when it came out last fall, was dismissed by former Washington Post reporter Barton Gellman as aggressively dishonest.

Edward Snowden was 29 years old when he reached out to journalist Glenn Greenwald and documentary filmmaker Laura Poitras (who in turn reached out to Gellman), offering them a trove of top-secret NSA documents that, he said, would lay bare the agencys massive domestic (and global) digital data-mining apparatus. At the time, Snowden, whose computer skills were largely self-taught, was working under contract with Dell as a systems administrator at the NSAs regional cryptographic facility in Hawaii. He took that job after stints with the CIA in Switzerland safeguarding diplomats computers and with the NSA in Japan, where he was also a Dell contractor, teaching US military personnel how to shield their computers from hackers.

It was in Japan that Snowden became a China specialist with an expertise in Chinese cyber-counterintelligence, according to Luke Harding, author of The Snowden Files (2014), one of the first books published about him. Among other things, Snowden taught senior Defense Department personnel how to shield their data from the growing legion of Chinese hackers, the most notorious of which is Unit 61398, the elite cyber-combat arm of the Peoples Liberation Army.

A professed Ron Paulsupporting libertarian who had grown increasingly disturbed by what he saw in his work as unconstitutional government overreach through sweeping, warrantless phone and data capture, Snowden signed on for the Dell job in Hawaii specifically to remove documents that revealed how the US government was spying on innocent Americans, often with the collusion of Internet service providers and tech companies like Google, Microsoft, and Apple. He hoped to pass on this information to journalists who would then push it out into the world.

As a systems administrator with a high security clearance, Snowden was able to move around NSA computers without leaving a trace or arousing suspicion. (He also moved around his workplace wearing a hoodie from the Electronic Frontier Foundation that sported a caricature of the NSA logo: an eagle with headphones over its ears.) Once hed downloaded the files he was after, Snowden took another NSA contracting job, this one with Booz Allen, also in Hawaii. If he could crack the system there, he would have access to a different cache of documents, many of which detailed the American surveillance states global reach.

Over a period of about six weeks, Snowden was able to pull the documents he was after, ferrying them out of the building on thumb drives. Having succeeded in that task, he quietly left Hawaii and decamped to Hong Kong, carrying four computers loaded with incriminating material. Once there, he worked on executing the next part of his plan: passing the purloined files along to well-known journalists who could alert the world to what the NSA was doing. He checked into the upscale Mira Hotel on May 20, 2013, under his own name and using his own credit card. Greenwald and Poitras met him there on June 3. Two days later, Greenwalds first story, about a secret court order requiring Verizon to hand over the phone data of millions of Americans to the NSA, ran in The Guardian. It threw the intelligence community, the Obama White House, the US government, and the world at large into a maelstrom that continues to this day.

The Edward Snowden in How America Lost Its Secrets is a very different person from the one chronicled by Greenwald and Harding. Epstein expends thousands of words painting a portrait of the young whistle-blower as a disaffected (based on his pseudonymous posts on tech blogs, many made when Snowden was in his late teens and early 20s), shallow (his girlfriend is a sometime pole dancer), conniving (he took a hacking course in India), cheating (Epstein claims, with absolutely no evidence, that Snowden stole the answers to an NSA employment test), self-promoting (why else would he reveal himself as the source for Greenwalds and Poitrass revelations?), self-aggrandizing (no, he wasnt a senior NSA employee who made $200,000 a year, as he told the two journalists, but rather an NSA contractor who made $133,000 in a position that didnt give him the kind of access he needed to steal the documents he took), undereducated (he dropped out of high school) nothingburger. Such a fellow, Epstein suggests, would have been punching well above his weight to pull off such a remarkable heist by himself. And so, Epstein decides, he most likely didnt.

Epstein offers numerous theories about who might have helped him. First, he posits that Snowden could have been assisted by someone at his workplacea witting accomplice, in Epsteins parlance, a fellow traveler who shared the same ideals and concerns as the callow, angry IT clerk. It would be relatively easy to gain access to passwords, Epstein writes, if Snowden had the cooperation of an insider. Such an accomplice could also help explain how Snowden was able to get the job at the [NSA data] center in the first place, how he knew in advance that he could find there the lists of the NSA sources in foreign countries, and how he knew that there were security traps at the center.

Theres only one problem with this explanation: As Epstein himself points out, no witting accomplice was ever identified by the FBI, which is a cagey way of saying that the witting accomplice theory is specious. Rather than putting it completely to rest, however, Epstein burrows in further: This raises the more sinister possibility that the accomplice was not an amateur co-worker but a spy who was already in place when Snowden arrived.

Theres only one problem with this narrative, however, and its the same one as before: No such foreign agent was ever found by the CIA, the NSA, or the FBI. After extensive investigations, the worlds best investigators came up empty-handed. But this doesnt deter Epstein. Using a backhoe rather than a shovel, he points out that while no hidden collaborator at the NSA was ever found, this does not necessarily mean such a mole does not exist. True enough. And the same could be said of ghosts, the Loch Ness monster, and my doppelgnger in an undiscovered solar system. This is not investigative reporting. Its not even reporting. Its fantasy.

Its also frustrating. One could go through Epsteins book counting the number of times he uses might have and could have and would have and must havephrases that denote speculation, not confirmation. For example: Snowden might have had another motive prior to contacting journalists. And: Poitras must have found it flattering that a total stranger was willing to disclose to her in e-mails what he would not tell even his most trusted confidante.

Similarly, one could point out all the assertions that have no basis in fact, that ignore known evidence, stretch the truth, or quote people who are making stuff up. But this would require quoting much of the book. So, in the interest of concision, here are three of the more egregious examples. First, Epstein says that Snowden sought contract work from Booz Allen because it would give him access to super-secret Level 3 sensitive compartmented information, documents described by NSA executives as the Keys to the Kingdom. The problem? Theres no such thing as Level 3 sensitive compartmented information. As Gellman, who helped do much of the original reporting on Snowden, pointed out in a Twitter storm, theres no such category at the NSA.

Second, Epstein asserts that while Snowden arrived in Hong Kong on May 20, he didnt check into the Mira until June 1, shortly before meeting with Greenwald and Poitras. In Epsteins telling: As I learned from the hotel staff, Snowden had registered there under his real name and used his own passport and credit card to secure the room, an odd choice if he was hiding out. He had checked in to the hotel not on May 20, as he had told the reporters, but on June 1, 2013. Wherever Snowden stayed from May 20 to June 1, he apparently considered it a safe enough place from which to send Greenwald a welcome package, as he called it, of twenty top secret NSA documents on May 25. Later, Epstein suggests that Snowden was probably hanging out with his Chinese handlers during this period.

So lets parse this, just for fun. Epstein learns that Snowden didnt check into the hotel on May 20. Whats the proof? He offers none. What he actually says he learned from hotel staff is that Snowden checked in using his real name and credit card. Hardings and Greenwalds books, both of them published years ago, already report this. But by invoking hotel insiders, Epstein is conflating two separate things: his assertion that Snowden didnt check into the hotel on May 20, and the fact that he used his real name and credit card when he did. In doing so, Epstein makes it seem that his assertion is based on statements from the hotel staff, even though what he says they told him was something else. Its a cheap trick, but easy to miss. And it does that thing weve all become aware of in this age of fake news: It lets loose the worm of doubt. Aha, you might think, where was Snowden? Maybe he was working with the Chinese after all

Finally, theres the matter of exactly how many documents were stolen. We know that Snowden gave the reporters somewhere around 58,000 files. But how many files did he actually take? That precise number has never been established; even the NSA doesnt know. Heres Epstein again: The NSA could say that 1.7 million documents had been selected in two dozen NSA computers during Snowdens brief tenure at Booz Allen. Of these touched documents, some 1.3 million had been copied and moved to another computer. While Epstein concedes that a certain number of these were duplicates, he suggests nonetheless that these missing files were Snowdens real target; what he gave Greenwald and Poitras was perhaps a red herring, a diversion that let him hand off the rest to the bad guys.

The use of touched here is part of the problem. Its a vague term thats largely meaningless, especially in the context of Snowdens theft, since he used a so-called spider program to crawl through the masses of documents in search of specific ones. That program was likely to touch many more files than it actually downloaded. By inflating the number and then wonderingwink, winkwhat happened to the files that Snowden didnt give to journalists, Epstein continues to imply that he was working against American interests at the behest of one or more of our adversaries, using the stolen files as collateral in his escape from American justice.

One fact in the Snowden saga that Epstein gets absolutely right because its indisputableis that on June 23, two weeks after revealing that he was the person behind the NSA leaks, Edward Snowden landed in Russia. Along the way, he was helped by Julian Assange and Assanges WikiLeaks associate Sarah Harrison. After the United States revoked Snowdens passport, Assange arranged for travel documents from his hosts at the Ecuadoran embassy in London, where Assange was self-exiled to avoid being extradited to Sweden on sexual-assault charges. The idea was to get Snowden from Hong Kong to a South American country that would be disposed to grant him asylum. To get there, hed have to hopscotch across the world, avoiding countries and airspace where he could be intercepted by the US government, which had issued a warrant for his arrest. Again with Assanges assistance and counsel, that meant traveling through Russia, where he ultimately landed.

Snowden ping-ponging from one US foe (China) to another (Russia) is a conspiracy theorists dream. No matter that by the time he arrived in Russia, his travel papers had been revoked by Ecuador. Or that Snowden appealed to 20 countries for asylum and was rejected by all of them. Or that he spent 39 days in a Russian airports transit hotel waiting as these appeals were summarily rejected, until he had little choice but to accept Russias offer of temporary asylum if he didnt want to go back to the United States, where some lawmakersincluding Congressman Mike Pompeo, now head of Trumps CIAcalled for his execution. As Harding pointed out in his book: Snowdens prolonged stay in Russia was involuntary. He got stuck. But it made his own storyhis narrative of principled exile and flighta lot more complicated. It was now easier for critics to paint him not as a political refugee but as a 21st century Kim Philby, the British defector who sold his country and its secrets to the Soviets. That Snowdens Russian lawyer, Anatoly Kucherena, had direct ties to the FSB, the Russian intelligence agency, and to Vladimir Putin himself also didnt help things.

Not surprisingly, Epstein makes much of Snowdens connection, through Kucherena, to the FSB: If Snowden wasnt working for the Chinese, Epstein suggests, then he must be working with the Russians, who likely got to him when he was in Hong Kong. Or maybe the Russians recruited him well before that. Or maybe they made contact after hed gone public via Greenwald, Gellman, and Poitras. Or, at the very least, maybe the Russians turned Snowden after he arrived in Moscow.

Its like a choose-your-own-adventure story; all these plotlines are up for grabs. In the Moscow scenario, Epstein writesmeaning any of the possible ways he imagines Snowden came to be working for Putin and companythe Russians acted to advance their interests. They gave Snowden sanctuary, support, perks, and high-level treatment because he agreed to cooperate with them. If Snowden had not paid this basic price of admission, either in Russia or before his arrival, he would not have been accorded this privileged status.

There is only one word in the foregoing that is demonstrably true, and that word is scenario. Epstein is spinning a story here.

Edward Snowden has consistently said that he never handed over any NSA documents to the Chinese or Russians, and that his expert knowledge of cyber-defense ensured that no one would be able to gain access to them. In his letter to Gordon Humphrey, a former Republican senator from New Hampshire who had written to Snowden praising his actions, provided you have not leaked information that would put in harms way any intelligence agent, Snowden asserted that no intelligence servicenot even our ownhas the capacity to compromise the secrets I continue to protect. [O]ne of my specializations was to teach our people at DIA [Defense Intelligence Agency] how to keep such information from being compromised even in the highest-threat counter-intelligence environments (i.e. China). Interviewed by National Public Radio, Barton Gellman put it this way: I believe that he has rendered himself incapable of opening the archive while he is in Russia. That is to say, its not only that he doesnt have the key anymore, its that theres nothing to open anymore. And while we may never know if the Russians or Chinese obtained Snowdens purloined files, one cant help but wonder whether sophisticated spy agencies like the FSB and the Chinese MSS already had access to the material Snowden downloaded, given that the security was so lax at the facilities where he worked.

About one thing, however, there is no doubt: It was a coup for Putin to welcome the most wanted man in America to Russia. As the security blogger John Robb wrote recently, in addition to oil, Russias other main export is kompromat, the kind of information that can be used for blackmail (as in the alleged Trump golden showers video), as well as anything else that can be used to discredit or confuse an adversary. For a couple of years before the Russians began to seriously mess with the American electoral process, Snowdens residence in Moscowwhere he was allowed to move around freely, give talks via Skype, sit on the board of the Freedom of the Press Foundation, and criticize both WikiLeaks and the Russian governmenthad to be an embarrassment for Barack Obama. Inadvertently, Snowden became the embodiment of kompromat. Even without handing over files, he was valuable to the regime.

The stakes are higher now than ever. Get The Nation in your inbox.

This fact was on display five months after Snowden took up residence in Moscow, when President Obama was asked at a press conference in Washington if Snowden should be granted amnesty. Rather than answering directly, Obama said this: The fact of the matter is that the United States, for all our warts, is a country that abides by rule of law; that cares deeply about privacy; that cares about civil liberties; that cares about our Constitution. And as a consequence of these disclosures, weve got countries that do the things Mr. Snowden says hes worried about, very explicitly engaging in surveillance of their own citizens; targeting political dissidents; targeting and suppressing the press; who somehow are able to sit on the sidelines and act as if its the United States that has problems when it comes to surveillance and intelligence operations. And thats a pretty distorted view of whats going on out there.

It should be remembered that Obama, who insisted even in his final week in office that Snowden should be put on trial, was no friend to government whistle-blowers. In his eight years as president, he used the Espionage Act to prosecute government employees who leaked information to the press more than all other presidents combined. Snowden, it should also be remembered, wasnt covered under the Whistleblower Protection Act because, as an NSA contractor, he didnt technically work for the government. And though former attorney general Eric Holder conceded, in retrospect, that Snowden performed a public service by forcing a public debate about government surveillance, it was a conversation that appears to have been lost on Obama. Rather than attempting to rein in the intelligence agencies, especially in light of Donald Trumps election and all it portended, Obama expanded their reach days before he left office. His Executive Order 12333 enables the NSA to share raw-data intercepts with the Department of Homeland Security, the CIA, the FBI, the DEA, and a dozen other government agencies. According to Charlie Savage, writing in The New York Times, with this new policy the government is reducing the risk that the N.S.A. will fail to recognize that a piece of information would be valuable to another agency, but increasing the risk that officials will see private information about innocent people.

In the end, and quite ironically, there is something retrograde about a book claiming that Edward Snowden is essentially a tool of the Russians, when theres no question that the same could be said of the current American president and a number of his cabinet members and advisers. With Putins pals Donald Trump, Stephen Bannon, Rex Tillerson, and Michael Flynn in power, it remains to be seen what use the Russian president will have for Edward Snowden. In the meantime, Edward Jay Epstein might consider investigating a real spy story: the arrest this January of four high-ranking Russian intelligence officers, all charged with treason for being American operatives, and the rumor that they were exposed as moles by someone in the Trump administration. If that turns out to be true, the question will not be how America lost its secrets, but why were giving them away.

Visit link:
Edward Jay Epstein's Alternative Facts - The Nation.

Encryption Apps Help White House Staffers Leakand Maybe Break the Law – WIRED

Slide: 1 / of 1. Caption: Confide

In the four tumultuous weeks since President Donald Trumps inauguration, the White House has provided a steady stream of leaks. Some are mostly innocuous, like how Trump spends his solitary hours. Others, including reports of national security adviser Michael Flynns unauthorized talks with Russia, have proven devastating. In response, Trump has launched an investigation, and expressed his displeasure in a tweet: Why are there so many illegal leaks coming out of Washington?

The answer may have to do with uncertainty and unrest inside the administration, as well as the presidents ongoing attacks against the intelligence community. But it doesnt hurt that every White House and Congressional staffer has tools to facilitate secure communication in their pocket or bag. Specifically, multiple reports indicate that Republican operatives and White House staffers are using the end-to-end encrypted messaging app Confide, which touts disappearing messages and anti-screenshot features, to chat privately without a trace.

The ability to communicate without fear of reprisal may have helped illuminate the Trump administrations darkest corners. But that same time, anonymity rings alarms for transparency advocates. The same technology that exposes secrets also enables them, a tension thats not easy to resolve.

Confide launched in 2013 as a secure app for executives looking to trade gossip and talk shop without creating a digital trail. The service uses a proprietary encryption protocol, what the company describes as military-grade end-to-end encryption. Its marquee feature, self-destructing messages, appears on similar services like Snapchat, but Confides appeal lies in its promise of more robust protections.

Its worth noting, though, that unlike other secure messaging apps, like standard-bearer Signal, Confides encryption is closed source and proprietary, meaning no one outside the company knows whats going on under the hood of the app. Company president Jon Brod says that Confide bases its encryption protocol on the widely used PGP standard, and that the apps network connection security relies on recommended best practices like Transport Socket Layer (TLS). Brod did not respond to questions, though, about whether Confide has ever opened its code base to be independently audited by a third party.

One key is always, do you make code publicly available thats been audited where features have been inspected by the security community so that it can arrive at some consensus, says Electronic Frontier Foundation legal fellow Aaron Mackey. My understanding with Confide, at least right now, is that its not clear whether thats occurred.

Confides also not the only option in play; EPA workers have reportedly turned to Signal to discuss how to cope with an antagonistic Trump administration, to the agitation of Republican representatives.

No matter what the method, though, encrypted chat appears to have become a staple among political operativeswhich happens to raise a whole host of legal questions.

Using an app like Confide for personal communications, like keeping in touch with family members or coordinating gym trips with coworkers, is within bounds. It also, according to a recent Washington Post report, has enabled vital leaks to the media.

At this point its still possible that politicos are legitimately using Confide for personal purposes. I know people who use [Confide], but I dont know anyone whos using it who shouldnt be using it, says Scott Tranter, a founder of the political data consultancy Optimus. The people who I know use it because its secure messaging.

Its sometimes not easy, though, to separate personal conversations from those that are work-related. Where those lines blur, legal concerns arise.

If these apps are being used by White House staff, it raises very disturbing questions about compliance with the Presidential Records Act specifically, and more broadly the Federal Records Act, says David Vladeck, a communications and technology law researcher at Georgetown Law School. The whole point of these statutes is to assure that our nations history is neither lost nor manufactured, and the kinds of apps that obliterate the messages are completely incompatible with that and at odds with the law.

Confide puts the onus on its users to walk a legal line. We expect people to use Confide in a way that complies with any regulation that may be relevant to their particular situation, says Brod.

Encryption itself isnt the issue. End-to-end encrypted communication can coexist with the goals of public disclosure laws, so long as someone retains the decryption key. Using strong security for sensitive government communications makes sense and is appropriate if the parties sending and receiving the communications can still archive them.

But disappearing messages are definitionally communications that are difficult, if not impossible, to record. Plus, its hard to assess how people are using a communication service like Confide if theres no record of anything they ever sent. Since Confide is explicitly designed to eliminate a paper trail, its use creates at least the appearance of misconduct, if not the reality, says Allison Stanger, a cybersecurity fellow at the New America Foundation. Those who wanted to lock up Hillary Clinton for the use of a private email server should be very concerned about this practice.

Its a tough act to balance. Encryption-enabled leaks help hold administrations accountable, a clear public good. The challenge is preserving that level of secrecy without creating black holes where public records should be.

The rest is here:
Encryption Apps Help White House Staffers Leakand Maybe Break the Law - WIRED

Silicon Valley found a use for encryption apps: a prenup for sex tapes – Quartz


Quartz
Silicon Valley found a use for encryption apps: a prenup for sex tapes
Quartz
If you're still be on the fence about encrypting your text messages, here's an easier sell: Definitely encrypt your sex tapes. Sex tapes are never totally secure. That's why New Zealand startup Rumuki (a Japanese take on room key) is pitching itself ...

and more »

Continued here:
Silicon Valley found a use for encryption apps: a prenup for sex tapes - Quartz

GOP demands inquiry into EPA use of encrypted messaging apps – CNET

The Signal app uses data encryption to send messages only readable by the designated receiver.

Some members of Congress are demanding an investigation into the Environmental Protection Agency's use of texting and encrypted chat apps like Signal.

Encryption scrambles data and only lets a person with the correct passcode have access. Tech firms and privacy advocates argue that encryption is essential to secure personal information and communications. The government and law enforcement officials counter that encryption hurts their ability to investigate criminal and terrorist activity.

Federal employees with concerns about the impact of President Donald Trump's administration have turned to encrypted messaging apps, new email addresses and other ways to coordinate their defense strategies, according to a report earlier this month from Politico.

That article and others prompted Rep. Darin LaHood, a Republican from Illinois, and Rep. Lamar Smith, a Republican from Texas, to send a letter to EPA Inspector General Arthur A. Elkins, Jr. asking him to "determine whether it's appropriate to launch a full-scale review" of EPA workers' use of encrypted apps. Smith serves as chairman of the Committee on Science, Space and Technology, while LaHood is vice chairman of the subcommittee on oversight on the Science, Space and Tech committee.

"Over the past few years, we have seen several examples of federal officials' circumventing Federal Records Act requirements and transparency generally," they wrote. "In this instance, the Committee is concerned that these encrypted and off-the-record communication practices, if true, run afoul of federal record-keeping requirements, leaving information that could be responsive to future Freedom of Information Act (FOIA) and congressional requests unattainable."

The letter requested a response from the Inspector General by February 28. The letter doesn't mean he is required to conduct a full investigation.

"The EPA OIG leadership is carefully reviewing yesterday's request from House Science Chairman Lamar Smith and Subcommittee Chairman Darin LaHood that the OIG review EPA employees' use of encrypted messaging applications to conduct official business," said the press office for the EPA Office of the Inspector General.

The EPA didn't immediately respond to CNET's request for comment.

Encryption gained a lot of scrutiny a year ago during Apple's public battle with the FBI over a request to help unlock an encrypted iPhone used in a terrorist attack. And after Democratic Party emails were hacked, Hillary Clinton and others working on her presidential campaign adopted Signal.

The letter on Wednesday cited a recent review from the EPA inspector general that found between July 1, 2014 and June 30, 2015, only 86 of the 3.1 million text messages sent or received on government-issued devices were preserved and archived as a federal record.

"Not only does this demonstrate the vast issues presented with using text messages to conduct official business, but raises additional concerns about using encrypted messaging applications to conduct official business, which make it virtually impossible for the EPA to preserve and retain the records created in this manner to abide by federal record-keeping requirements," the letter said.

Update at 3:20 p.m. PT: Adds comment from EPA Office of the Inspector General.

CNET Magazine: Check out a sample of the stories in CNET's newsstand edition.

Life, disrupted: In Europe, millions of refugees are still searching for a safe place to settle. Tech should be part of the solution. But is it?

Read the original here:
GOP demands inquiry into EPA use of encrypted messaging apps - CNET

New Report On Encryption Confirms There’s More Of It, But Still Not Much Of A Problem For Law Enforcement – Techdirt

CSIS (Center for Strategic and International Studies) has just released its report on encryption and it comes to the same conclusions many other reports have: encryption is good for everyone and law enforcement fears are overstated and mostly-unrealized. (h/t Kevin Bankston)

The report [PDF] opens up with this statement:

It is in the national interest to encourage the use of strong encryption. No one we interviewed in law enforcement or the intelligence community disagreed with this.

The disagreement comes when law enforcement is prevented from pursuing investigative leads because of encryption. According to FBI Director James Comey and Manhattan DA Cyrus Vance, encryption is already a huge problem for law enforcement and will only get exponentially worse in the next few years. The CSIS report rebuts both of these statements.

While encryption use is growing rapidly, the share of traffic that is both of interest to law enforcement and unrecoverable is still relatively small. Most companies use encryption that allows law enforcement agencies to recover plaintext data. Most e-mail, if it uses encryption, also allows for recovery. Currently, an estimated 18 percent of global communications traffic is end-to-end encrypted. It is estimated that 22 percent of communications traffic will be end-to-end encrypted by 2019.

This is far from the encryption apocalypse promised by Comey and Vance. There's an incremental increase taking place, not an exponential one. What could pose serious problems, though, is encryption-by-default on smartphones. As the report points out, if Android devices go the way of iPhones, 99% of the world's phones would keep law enforcement locked out.

But that's only if law enforcement isn't able to access data and communications through device manufacturer/service provider cooperation, third-party app developers, email providers, and other, more old-fashioned techniques. One sure way to beat device encryption is to obtain the passcode from the user. This won't help much when the phone's owner is dead or can't be located, but compelling the production of a password is still far from settled, constitutionally-speaking. For phones secured with a fingerprint, owners are likely out of luck. A couple of courts have already reached the conclusion that providing a fingerprint isn't testimonial and has no Fifth Amendment implications.

CSIS could have put together a better estimate on how many investigations are thwarted by encryption, but law enforcement agencies -- even those fronted by encryption opponents -- aren't interested in sharing this data with the public. The report points out that the problem remains mostly theoretical. Without data, all we have are assertions from law enforcement officials that something must be done. Failure to legislate backdoors or bans will apparently lead to a sharp uptick in criminal activity except that's not happening either. The report points out that there's no data linking increased default encryption to increases in criminal activity.

As for the world's terrorism, encryption is seldom a barrier to investigations or surveillance. There's no shortage of access points to intercept communications while they're still decrypted (or post-encryption stripping). According to the CSIS report, 90% of the world's instant messages are still accessible by law enforcement, even without interception. With surveillance data-sharing being the new normal in the US, law enforcement agencies will be able to dip into NSA collections to obtain communications that might otherwise be inaccessible through a suspect's device.

The report notes that there's likely no consensus to be reached on the encryption issue. Because it protects both criminals and the innocent, it's difficult to see a nation's government -- at least those in the Western half of the world -- deciding to eliminate innocents' protections in hopes of nabbing a few more criminals. In the United States -- where certain rights have been long enshrined (if far too frequently ignored) -- the chance of anti-encryption legislation remains lowest. And, as the report's authors note, if the US doesn't make a move to curb encryption, it's unlikely the rest of the free world will do so on their own.

The law enforcement agencies making the most noise about encryption are doing the least to help their own cause. Most of what's offered is anecdotal, rather than data-based. According to the FBI's own testimony, it only has about 120 inaccessible phones in its possession. As for other law enforcement agencies, the numbers are mostly unknown. Those that have chosen to make their numbers public have failed to show anything more than the expected rise in inaccessible phones due to default encryption. While the locked devices may number in the hundreds (Cy Vance's office says 423 locked phones were seized in a two-year span, which -- according to the office's numbers -- is still only a third of the devices in law enforcement custody), they're still in the minority of those obtained.

These numbers will increase as the use of encryption increases, but if law enforcement and intelligence agencies don't like the way the future looks, they really only have themselves to blame. The report notes that the Snowden leaks -- which detailed massive surveillance programs operating under almost-nonexistent oversight -- prompted an encryption revival, both in terms of individuals doing more to ensure their privacy as well as well as device manufacturer encryption implementation.

Read the rest here:
New Report On Encryption Confirms There's More Of It, But Still Not Much Of A Problem For Law Enforcement - Techdirt

RSA panel covers cryptography trends, elections and more – TechTarget

SAN FRANCISCO -- Each year at RSA Conference, the world's top cryptographers gather on stage after the show's opening keynotes to share their views and opinions on cryptography trends.

This year, the panel was moderated for the fourth consecutive time by Paul Kocher, president in the cryptography research division of Rambus. Kocher opened the session by pointing out that with exponential growth experienced in recent years with the internet, the internet of things and related technologies, each doubling of growth brings about more change than in all prior doublings -- combined.

Kocher said one bright spot this year is that cryptography is one of the few technologies that has been able to withstand "decades of scaling" and exponential growth.

Before diving into the latest cryptography trends, Kocher began the session by congratulating Adi Shamir on winning the Japan Prize, "a prestigious international award presented to individuals whose original and outstanding achievements are not only scientifically impressive, but have also served to promote peace and prosperity for all mankind."

Shamir, Borman Professor of Computer Science at the Weizmann Institute in Israel, said the honor was "much more than a personal prize," because the award is granted for all areas of science and technology, and the fact that they chose to honor achievement in cryptography was a sign of the importance of the field. Last year, two panel participants -- Whitfield Diffie and Martin E. Hellman, professor emeritus of electrical engineering at Stanford University, received the A.M. Turing Award for their foundational work in developing the fundamental basis of public-key cryptography.

Kocher's first question to the panel was how artificial intelligence would affect computer security. Ronald Rivest, a professor in the MIT Department of Electrical Engineering and Computer Science, opined that based on what was seen during last year's presidential election, chatbots might dominate in 10 to 15 years.

Shamir was more forceful, noting that when computers become super-intelligent they will be likely to say, "in order to save the internet I have to kill it. The internet as we know it today is beyond salvaging," when asked how to solve internet security problems. He added that "AI can be very helpful on the defensive side," but he doubted it would be very helpful in finding new zero-days because of the need for human originality. However, AI will be useful for finding deviations from normal behavior that will help compare "strange behaviors" to identify threats.

In response to a question about whether and how long it will take for quantum computers to be available to threaten traditional cryptosystems, Whitfield Diffie, cryptographer and security expert at Cryptomathic, suggested it would not be worth worrying about as "we'll be dead by then."

There's a "higher chance" that RSA will be broken by classical attempts, Shamir said, though he admitted it "could turn out quantum computers will be able to break all the quantum proof schemes we're working on now."

"We've tried to factor quickly for about two thousand years," said Susan Landau, Professor of Cybersecurity Policy and Professor of Computer Science at Worcester Polytechnic Institute, but she's "not seeing same level of math research behind proposed quantum algorithms," which she called "worrying." Many modern cryptosystems rely on the difficulty of factoring products of large primes to protect encrypted data.

In response to a question about controversy swirling around the 2016 election, Rivest pointed out that while allegations of rigging are not new, "trying to convince the winner" that he won is unusual. "We should have done post-election audits everywhere to see if there were problems."

The Russians, Landau said, see this as "war by other means" and are attacking the west this way. The techniques they use for hacking are "old-fashioned," but they are using the information in a new way. "We've known for 20 years that we need to protect government data," Landau said, but now that smaller civic organizations with fewer resources are being targeted, "that's a much broader swath of society we have to protect."

"The U.S. [has] done its share of similar dirty ops to influence other country's elections," Shamir added. "Using stolen documents that are compromising is not a new invention."

"I'm shocked -- shocked! -- by what the Russians have been doing, but they are not alone," Shamir said.

Kocher asked the panel about the recent statement by Attorney General Jeff Sessions, calling for the ability of law enforcement to "overcome encryption." Rivest said, "overcoming encryption, to me, means a backdoor," but Landau suggested there are other ways, and that she has not found those in Congress necessarily supporting Session's position.

For U.S. companies, Shamir said that putting backdoors in their products would be "shooting themselves in the foot."

Find out more about the voter database hacks that triggered election concerns

Learn about elliptic curve cryptography in ticketing

Keep up with the rest of the RSA Conference 2017

Excerpt from:
RSA panel covers cryptography trends, elections and more - TechTarget