All The People Who Betrayed Chelsea Manning

Over and over, the young private who exposed so much of the U.S. governments inner workings trusted peopleonly to get knifed.

I first heard the name Bradley Manning at a cheap Japanese restaurant near Sacramento, California, sitting across from the ex-hacker whod just turned the soldier in.

It was May 2010, and I was following up on a remarkable story Id heard in cryptic bits and pieces from Adrian Lamo, a former recreational hacker Id once reported on extensively. Lamo told me hed been contacted online by an Army intelligence analyst deployed to Iraq, and the soldier, mistaking Lamo for a kindred spirit, confided that hed been providing the secret-spilling website WikiLeaks with a trove of material from a classified network. The leaks included a quarter million State Department cableswhich WikiLeaks had not yet acknowledged havingand a shocking video of a U.S. Army helicopter attack in Baghdad that the site had already released under the title Collateral Murder.

Lamo considered the leaks reckless and dangerous, and decided to turn in the soldier, who I learned was a 22-year-old kid named Bradley Manning. By the time of that lunch, Lamo had already met once with law enforcement officials, and he was scheduled to meet with them again later that day to hand over the logs hed kept of his chats with Manning. Hed agreed to give me a copy as well under embargo, if I showed up in person with a thumbdrive.

I hadnt seen Lamo in years, and he was in a bad state, recently separated, living with his parents, and apparently hungryhe asked for a hot lunch and small talk before hed detail his exchanges with Manning, or give me the chat logs. And so we ate, talked about the old days when Lamo effortlessly hacked the likes of Yahoo and The New York Times, back when he was as young and fearless as the soldier he was giving up.

In the end, I got the logs, and was on my way back to San Francisco by the time Lamo and the feds had their second meeting. I remember wondering on the drive what would become of the soldier Lamo had felt obliged to betray.

Now we know. On Tuesday, outgoing President Barack Obama commuted the sentence of the woman now named Chelsea Manning, who will be freed from the military prison at Ft. Leavenworth on May 17 after serving seven years on a harsh 35-year sentence.

The announcement comes just three days before Obama turns the White House over to Donald Trump, and follows a concerted online campaign thats been pushing for Mannings freedom since the day I reported her arrest. Most recently, an online petition urging clemency for Manning gathered over 100,000 signatures in about a month.

Manning became a WikiLeaks source in 2010, when her work as an intelligence analyst in Iraq led her to a crisis of conscience over Americas military engagements in Iraq and Afghanistan. I started to question the morality of what we were doing, she later told a military judge. I realized that our efforts to meet the risk posed to us by the enemy, we had forgotten our humanity. We consciously elected to devalue life both in Iraq and Afghanistan. When we engaged those that we perceived were the enemy, we sometimes killed innocent civilians.

That point was underscored by her most plainly righteously leak, the Collateral Murder video that gave the public a gunners-eye-view of a 2007 Apache helicopter attack on a group of men mistakenly identified as insurgents. Two Reuters employees died in the assault, as did a Baghdad man who stumbled on the scene afterward and tried to rescue one of the victims by pulling him into his van. The mans two children were in the van and suffered serious injuries in the hail of gunfire. Though the incident was already public, the Army had refused to release the video, which showed the consequences of urban warfare with more clarity than any report.

Other leaks were less focused. Manning gave Julian Assange databases of nearly 500,000 Army field reports from the wars in Iraq and Afghanistan, reports on prisoners held in Guantanamo, and, just as shed told Lamo, 250,000 U.S. State Department diplomatic cables.

When Lamo lifted his embargo, another reporter and I broke the news of Mannings arrest on the website of Wired magazine. Assange took to Twitter with a barrage of tweets disputing the story and attacking me directly. He denied knowing whether Manning was the source of the Collateral Murder video, and denied having a quarter-million diplomatic cables. He and others demanded that I publish the full logs of Mannings chats, though Assange knew full well why I wouldnt: Manning had told Lamo all about her struggles with gender dysphoria, and those personal disclosures were out-of-bounds. By her own account, her leaks were impelled by her moral compass and nothing else.

When Assange finally stopped denying that he had the Manning leaks, and starting releasing them, the disclosures made a sensation of his organization, which pulled in about $1.9 million in donations in 2010.

Manning became a hero and martyr of the anti-war movement, and she seemed to channel her more ardent supporters in her first clemency application in 2014, defending her leaks in a tone that approached defiance, and seeking a full presidential pardon. If you deny my request for a pardon, I will serve my time knowing that sometimes you have to pay a heavy price to live in a free society, she wrote. The application was denied.

This time around, Manning asked only for Obama to shorten her sentence to time-served, and she wrote virtually nothing of her leaks, and much about her struggles in the Army, which began as a young private coming to terms with her gender dysphoria while serving in a military still guided by Dont Ask, Dont Tell. Her struggles only intensified after her court martial when Manning came out as a transgender woman, and took the name Chelsea, but her jailors refused to acknowledge her gender identity. She had to sue the Army to receive hormone therapy. Last year, she attempted suicide twice.

I have served a sufficiently long sentence, Manning wrote. I am not asking for a pardon of my conviction. I understand that the various collateral consequences of the court-martial conviction will stay on my record forever. The sole relief am asking for is to be released from military prison after serving six years of confinement as a person who did not intend to harm the interests of the United States or harm any service members.

Thank You!

You are now subscribed to the Daily Digest and Cheat Sheet. We will not share your email with anyone for any reason

I am merely asking for a first chance to live my life outside as the person I was born to be.

The WikiLeaks that Manning knew has all but vanished. Founded to challenge primarily highly oppressive regimes in China, Russia and Central Eurasia, the groups major focus last year was the U.S. Democratic party, publishing thousands of emails stolen from the DNC and Hillary Clintons campaign. Unlike the Manning leaks, the Democrats emails were published without redaction, as Assange deliberately left in details like the names, credit card and Social Security numbers of party donors.

To his credit, though, Assange, never stopped drawing the publics attention to Mannings situation, even offering last September to take her place in prison. If Obama grants Manning clemency, Assange will agree to U.S. prison in exchangedespite its clear unlawfulness, he tweeted last September. As of press time, though, Assange had not been sighted leaving the safety of the Ecuadorian embassy in London.

Excerpt from:
All The People Who Betrayed Chelsea Manning

Bradley Manning and Obamas Transgender Obsession

Image: Bradley Manning Support Network flickr.com

Barack Obamas commutation of the sentence of male traitor Bradley Manning reveals that transgenderism is part of Obamas religious fanaticism. Its part of his comrades religiousfanaticism too. This is a significant threat to society.

One of my short stories is about a president obsessed with the concept of a transgender human being. Chapter 16 of Matt Barbers nonfiction book, Hating Jesus, addresses Obamas obsession with transgenderism and sodomy in general, including in the Department of Defense and intelligence community. I dont believe people realized transgenderism was such a big issue when we wrote what we did. They should start realizing it now.

Obama is not a secret Muslim like many people think he is. He is a communist autotheist. In other words, Obama believes he and his cohorts are gods who deem what is right and wrong. And as is with such things as abortion and global warming, they have deemed sodomy (including transgenderism) not just an inalienable right, but a religious tenet that must be worshipped. This is why sodomy was preeminent in everything throughout Obamas presidencyfrom national security, to promoting it in schools, to evangelizing it across the globe. Obama and his fellow autotheists deemed it holy so they therefore have to enforce it on everyone at all costs.

That people still dont fully grasp how important sodomy is to autotheists, and how they have damaged society with their promotion of it, showshow successful they have been in their manipulation. It also shows why America is doomed.

Once society accepts the most blatant of lies as truth (and even conservatives and professing Christians are referring to Manning and other maniacs by the wrong pronouns), we have both humiliated ourselves and clearly aligned with evil. Theodore Dalrymple indirectly addressed this years ago when he was talking about communism and political correctness.

Dalrymple: Political correctness is communist propaganda writ small. In my study of communist societies, I came to the conclusion that the purpose of communist propaganda was not to persuade or convince, nor to inform, but to humiliate; and therefore, the less it corresponded to reality the better. When people are forced to remain silent when they are being told the most obvious lies, or even worse when they are forced to repeat the lies themselves, they lose once and for all their sense of probity. To assent to obvious lies is to co-operate with evil, and in some small way to become evil oneself. Ones standing to resist anything is thus eroded, and even destroyed. A society of emasculated liars is easy to control. I think if you examine political correctness, it has the same effect and is intended to.

America has accepted the transgender lie. And Obama played a huge part in advancing this evil through the massive influence operations he and his fellow autotheists run. Furthermore, his commutation of Bradley Mannings sentencereveals that transgenderism isa fundamental part oftheir religious fanaticism. Transgenderismis a threat. People should start treating it like one.

BarbWire Books is pleased to announce

Dr. Don Boys

Muslin Invasion: The Fuse is Burning! is an interesting, informative, and for the politically correct and infuriating read. Islam, Muslims, immigration, Jihad, Sharia, and the war against our civilization, culture, and creed is a present reality. Gutless public officials are selling us short either by complicity with the enemy or due to a doctrinaire commitment to idiotic tolerance ideology. Whatever the case, citizens must stand up against the invasion now before it is to late. The author suggests that the fuse is burning and the results will end in a complete upheaval of America and every free nation, unless we act now. Forget the lame stream media. Forget Obama. Common sense mandates, our very survival demands that we act NOW to keep America from going off the cliff; This book promises to be a life changing read.

Paul Hair is an author and national security/intelligence expert. He writes fiction and nonfiction under his own name and as a ghostwriter. He provides his national security and intelligence insight as a freelance consultant. Connect with him at http://www.liberateliberty.com/. Contact him at paul@liberateliberty.com.

Previous Article

Mattiss 'Dont care' attitude: The Maddest Military Social Experiment Yet?

Next Article

God, the Bible and the U.S. Presidential Inaugural Addresses

We have no tolerance for comments containing violence, racism, vulgarity, profanity, all caps, or discourteous behavior. Thank you for partnering with us to maintain a courteous and useful public environment where we can engage in reasonable discourse. Read More

Excerpt from:
Bradley Manning and Obamas Transgender Obsession

Data Encryption and Decryption (Windows)

This documentation is archived and is not being maintained.

Encryption is the process of translating plain text data (plaintext) into something that appears to be random and meaningless (ciphertext). Decryption is the process of converting ciphertext back to plaintext.

To encrypt more than a small amount of data, symmetric encryption is used. A symmetric key is used during both the encryption and decryption processes. To decrypt a particular piece of ciphertext, the key that was used to encrypt the data must be used.

The goal of every encryption algorithm is to make it as difficult as possible to decrypt the generated ciphertext without using the key. If a really good encryption algorithm is used, there is no technique significantly better than methodically trying every possible key. For such an algorithm, the longer the key, the more difficult it is to decrypt a piece of ciphertext without possessing the key.

It is difficult to determine the quality of an encryption algorithm. Algorithms that look promising sometimes turn out to be very easy to break, given the proper attack. When selecting an encryption algorithm, it is a good idea to choose one that has been in use for several years and has successfully resisted all attacks.

For more information, see Data Encryption and Decryption Functions.

Go here to see the original:
Data Encryption and Decryption (Windows)

Russia says Edward Snowden can stay "a couple of years …

MOSCOW -- Russian authorities have extended a residence permit for U.S. intelligence contractor Edward Snowden, who leaked thousands of secret documents from the National Security Agency.

Foreign Ministry spokeswoman Maria Zakharova said in a post on Facebook late Tuesday that Snowdens residence permit has been extended for a couple of years.

Play Video

Former NSA contract worker Edward Snowden, who leaked classified information on government surveillance, made his case to President Obama for a p...

Snowden has been living in Russia -- and in contact with Russian intelligence serivces, according to a U.S. congressional report -- since 2013 when he got stuck in the transit area at a Moscow airport after the United States canceled his passport.

The announcement comes as President Obama has commuted the prison sentence of Chelsea Manning, who was convicted of leaking more than 700,000 U.S. documents.

But there has been no pardon from Mr. Obama for Snowden, whom the U.S. has been unable to extradite from Russia. Snowden tweeted on Tuesday his congratulations to Manning, and his thanks to Mr. Obama for commuting her sentence.

Snowden hasnt formally applied for clemency, though his supporters have called for it.

The White House has drawn a distinction between the unapologetic Snowden and Manning, whom officials noted has expressed remorse and served several years already for her crime.

Reporters asked presidential spokesman Dmitry Peskov on Wednesday whether Snowden was planning to return to the United States in reaction to the Manning pardon. Peskov said the Kremlin is not aware what Snowdens plans are.

Play Video

President-elect Donald Trump took to Twitter to slam U.S. intelligence officials over their investigation of Russian hacking during the 2016 pres...

Mr. Obamas commutation for Manning also raised fresh questions about the future of another figure involved in Mannings case: WikiLeaks founder Julian Assange.

WikiLeaks had earlier pledged, via tweet, that its founder would agree to U.S. extradition if Mr. Obama granted clemency to Manning. Holed up for more than four years at the Ecuadorian Embassy in London, Assange has refused to meet prosecutors in Sweden, where hes wanted on a rape allegation, fearing he would be extradited to the U.S. to face espionage charges if he leaves the embassy.

But the Justice Department has never announced any indictment of Assange. WikiLeaks lawyer Melinda Taylor said U.S. and British authorities refuse to say whether the U.S. has requested extradition. Though she praised the commutation for Manning, Taylor made no mention of Assanges earlier promise to agree to extradition.

White House officials said neither Assanges fate nor separate concerns about WikiLeaks role in Russian hacking of the U.S. presidential election factored into the decision to commute Mannings sentence. The officials briefed reporters on condition of anonymity.

Any action that Justice Department officials may take regarding Assange is something that they would do independent of the White House, spokesman Josh Earnest told CNN.

2017 CBS Interactive Inc. All Rights Reserved. This material may not be published, broadcast, rewritten, or redistributed. The Associated Press contributed to this report.

Originally posted here:
Russia says Edward Snowden can stay "a couple of years ...

XML Encryption – Wikipedia

XML Encryption, also known as XML-Enc, is a specification, governed by a W3C recommendation, that defines how to encrypt the contents of an XML element.

Although XML Encryption can be used to encrypt any kind of data, it is nonetheless known as "XML Encryption" because an XML element (either an EncryptedData or EncryptedKey element) contains or refers to the cipher text, keying information, and algorithms.

Both XML Signature and XML Encryption use the KeyInfo element, which appears as the child of a SignedInfo, EncryptedData, or EncryptedKey element and provides information to a recipient about what keying material to use in validating a signature or decrypting encrypted data.

The KeyInfo element is optional: it can be attached in the message, or be delivered through a secure channel.

XML Encryption is different from and unrelated to Transport Layer Security, which is used to send encrypted messages (including xml content, both encrypted and otherwise) over the internet.

It has been reported that this specification has severe security concerns.[1][2]

Originally posted here:
XML Encryption - Wikipedia

Dash (cryptocurrency) – Wikipedia

Dash

Official Dash logo

Dash (formerly known as Darkcoin and XCoin) is an open source peer-to-peer cryptocurrency that offers instant transactions (InstantSend),[1] private transactions (PrivateSend)[2] and token fungibility. It was rebranded from "Darkcoin" to "Dash" on March 25, 2015, a portmanteau of "Digital Cash".[3]

Dash operates a decentralized governance and budgeting system, making it the first decentralized autonomous organization.[4]

Dash uses a chained hashing algorithm called X11 for the proof-of-work. Instead of using the SHA-256 (from well-known Secure Hash Algorithm family) or scrypt it uses 11 rounds of different hashing functions.[5]

As of 2016, Dash is among the top-7 most popular cryptocurrencies.[6]

Main website is http://www.dash.org

PrivateSend is a coin-mixing service originally based on CoinJoin. Later iterations used a more advanced method of pre-mixing denominations built into the user's wallet. The implementation of PrivateSend also allows masternodes to submit the transactions using special network code called DSTX,[7] this provides additional privacy to users due to the deadchange issue present in other CoinJoin based implementations such as DarkWallet and CoinShuffle.[8]

DarkSend rebranded to PrivateSend June 2016.

In its current implementation it adds privacy to transactions by combining identical inputs from multiple users into a single transaction with several outputs. Due to the identical inputs, transactions usually cannot be directly traced, obfuscating the flow of funds. PrivateSend makes Dash "Fungible"[9] by mixing the coins in the same denomination with other wallets, ensuring that all coins are of the same value.

PrivateSend's mixing is performed by Masternodes, servers operating on a decentralized network which have the responsibility of signing the transactions. For each round of PrivateSend, the user selects two to eight (or even more) rounds of mixing which vary the degree of anonymity achieved. Random Masternodes are then elected to perform the coin mixing. Masternodes are trust-less cryptographic technology, in the sense that they cannot steal user coins, and the combination of multiple Masternodes ensures that no single node has full knowledge of both inputs and outputs in the transaction process.

To avoid the possibility of sybil attack, a process where a peer-to-peer network is overtaken by "bad actors", collateral requirements have been added to the process of joining the Masternode network second tier. These are presently 1000 DASH [10] and allow secure network communication in via signed messages. As an incentive for operating a Masternode, chosen nodes currently earn 45% of the mining rewards.[11]

InstantSend is a service that allows for near-instant transactions. Through this system, inputs can be locked to only specific transactions and verified by consensus of the Masternode network. Conflicting transactions and blocks are rejected. If a consensus cannot be reached, validation of the transaction occurs through standard block confirmation. InstantSend purportedly solves the double-spending problem without the longer confirmation times of other cryptocurriencies such as Bitcoin.[12]

InstantX rebranded to InstantSend June 2016.

X11 is a hashing algorithm created by Dash core developer Evan Duffield. X11's chained hashing algorithm approach utilizes a sequence of eleven cryptographic hashing algorithms for the proof-of-work. This is so that the processing distribution is fair and coins will be distributed in much the same way Bitcoin's were originally.[citation needed]

With chained hashing, high end CPUs give an average return similar to that of GPUs. Another side effect of the algorithm is that GPUs run at about 30% less electrical power than scrypt and 30% to 50% cooler, putting less stress on the computing setup and ensuring lower energy bills for miners.[13]

Dark Gravity Wave (DGW) is a mining difficulty adjustment algorithm created by Dash core developer Evan Duffield to address flaws in Kimoto's Gravity Well. It uses multiple exponential moving averages and a simple moving average to smoothly adjust the difficulty, which is re-targeted every block. The block reward is not adjusted strictly by block number, but instead uses a formula controlled by Moore's law: 2222222/((Difficulty+2600)/9)2.[14][15]

Dash is the first decentralized autonomous organization powered by a Sybil proof decentralized governance and funding system.[16] DGBB or Decentralized Governance By Blockchain as it's called is a decentralized process by which the network determines where money is spent. Each Masternode operator is given the ability to use 1 vote on each governance proposal, which is a completely open and decentralized process.[17] Community interaction with proposal submitters is done usually through community driven websites, like DashWhale.[18] These websites allow proposal submitters to provide multiple drafts, then lobby for community support before finally submitting their project to the network for a vote. After the submitter has enough support, the network will automatically pay out the required funds in the next super block, which happen monthly.

Although, only in use a few months, the funding system has seen growth of its month revenue, from originally ~$14 thousands in September 2015, to nearly $30 thousands in March 2016.[19] Eventually the budget system can theoretically scale to $9M per month at a market cap of $500M.[20]

Since its inception, the project has used the system for important assets like acquiring dash.org,[21] adoption into the Lamassu ATM[22][23] and the Dash N' Drink instant soda machine,[24] along with funding many public events.[25][26][27][28]

Masternodes utilize a cryptographic bond model, which results a supply and demand market between the interest rate Masternodes are paid and the risk of holding the underlying asset. Early on in the history of the asset, the high return caused a massive uptake of Masternodes, starting from about 500 in Oct 2014 and increasing to 3650 in March 2016.[29]

Dash was originally released as XCoin (XCO) on January 18, 2014. On February 28, the name was changed to "Darkcoin". On March 25, 2015, Darkcoin was rebranded as "Dash".[3]

I discovered Bitcoin in mid 2010 and was obsessed ever since. After a couple of years in 2012 I started really thinking about how to add anonymity to Bitcoin. I came up with maybe 10 ways of doing this, but I soon realized that Bitcoin would never add my code. The developers really want the core protocol to stay the same for the most part and everything else to be implemented on the top of it. This was the birth of the concept of Darkcoin. I implemented X11 in a weekend and found it worked pretty well and it would give a completely fair start to the currency. What I really was aiming for with X11 is a similar development curve where miners would fight to create small advantages much like the early start of Bitcoin. I think this a requirement to create a healthy ecosystem.

[30]

Within the first hour of launch, approximately 500,000 coins were mined, followed by another 1,000,000 coins in the next 7 hours and finally another 400,000 in 36 hours. All told 1.9 million coins were mined in 48 hours, or approximately 32% of the current supply (as of October 2015) of approximately 5.9 million,[31][32] generating controversy regarding the initial distribution of coins. According to Duffield, this was the result of an error in the code "which incorrectly converted the difficulty, then tried using a corrupt value to calculate the subsidy, causing the instamine".[33] At the time, Duffield was working a full-time job and coding for Dash on the side, so its not surprising that there were errors in the initial code.[33] Duffield claims in the official bitcointalk.org thread (mirrored) that "Dash has no premine and was fairly and transparently launched".[34]

At the time Dash (then called Xcoin) was launched, the cryptocurrency space was riddled with scams. People were creating new currencies, hyping their value, then dumping them and abandoning the project. Many likely feared the same for Dash. However, since Dash's launch, there has been over two years of development, leading to a cryptocurrency that has over 50 volunteers and has solved such vexing issues as slow confirmation times, block size increases, decentralized governance, and a self-funding development budget.

According to CoinMarketCap, in August 2016 the daily trade volume of Dash was ~1% of the total trade of all cryptocurrencies,[35] and the market capitalization of Dash was ~80 millions of US dollars.[36] Since then, Dash has become the most active community on BitcoinTalk reaching more than 6000 pages, 122k replies, 6.6M reads.

Zerocoin, Cloakcoin and DarkNet also have built in the mixing services as a part of their blockchain network.[37]

The Dark Wallet client software for bitcoin was built to natively mix transactions between users.[38]

Monero_(cryptocurrency) is a cryptocurrency based on the CryptoNote protocol. It has gained attention recently for being adopted by dark net market AlphaBay.[39]

Go here to read the rest:
Dash (cryptocurrency) - Wikipedia

WikiLeaks chief Julian Assange: US hacking report is ’embarrassing …

Speaking at a news conference broadcast on Periscope Monday, the founder and editor-in-chief of WikiLeaks said the report was "embarrassing to the reputation of the US intelligence services."

The intelligence community also assessed "with high confidence" that the GRU provided WikiLeaks with the material it obtained from hacking the Democratic National Committee and top Democratic officials.

Assange hit back by labeling the report a "press release" and criticized the Obama administration for politicizing the US intelligence services.

"Most of this so-called intelligence report is not even fabricated," he said, suggesting there wasn't enough in it to be made up.

"It does not even make assertions for the most part... it uses speculative terms... it engages us in sneaky conflations... How good a report is it as an intelligence report from 1 to 10? The evidentiary weight is literally zero. There is no evidence of any kind supplied," Assange said.

Assange spoke from the Ecuadorian Embassy in London, where he's been holed up for more than four years to avoid facing sexual assault charges in Sweden and a potential extradition to the United States.

He gave little away when asked by CNN whether WikiLeaks acted as a go-between as suggested by the report.

"We can't play 20 questions to our sources. Each piece of information you disclose about the source narrows the scope of any investigation... if our sources were, for example, a state, we would have a lot less concern in attempting to protect them."

The report was the first official, full and public accounting by the US intelligence community of its assessment of Russian cyberhacking activities during the 2016 presidential campaign and election, and the motivations behind that hacking.

"What we see is ... that all of this looks like is a full-scale witch hunt."

See the original post here:
WikiLeaks chief Julian Assange: US hacking report is 'embarrassing ...

How Edward Snowden changed history – economist.com

How America Lost Its Secrets: Edward Snowden, the Man and the Theft. By Edward Jay Epstein. Knopf; 350 pages; $27.95.

THE effects of Edward Snowdens heist of secrets from Americas National Security Agency (NSA) in 2013 can be divided into the good, the bad and the ugly, writes Edward Jay Epstein in a meticulous and devastating account of the worst intelligence disaster in the countrys history, How America Lost Its Secrets.

Even that categorisation is contentious. Mr Snowdens fans do not believe he did anything wrong at all: he simply lifted the lid on a rogue agency, risking his liberty on behalf of privacy everywhere. For their part, his foes believe his actions lack any justification: he is a traitor masquerading as a whistle-blower, who exposed no wrongdoing but did colossal damage.

These stances rest more on faith than facts. Their adherents regard as secondary the details of Mr Snowdens career, and the means by which he took millions of pieces of top-secret information from the NSAs computers. More important for such people is whether you trust American and other Western institutions, or regard them as inherently corrupt and oppressive.

Mr Snowdens fans believe that the authorities, especially intelligence agencies, lie about everything. Nothing they say about the case can be believed. Any peculiaritiessuch as inconsistencies in Mr Snowdens public statements, or the fact that he now lives in Moscow as a guest of Russias security service, the FSB, are mere side-issues, easily explicable by exigency and urgency. For his foes, nothing Mr Snowden says is trustworthy, whereas statements made by officials are true.

Mr Epstein is a formidable investigative journalist and his quarry is worthy of his talents. He has unearthed many new details and assembles them, with the publicly known information, into a coherent and largely damning account.

The first part of the book examines Mr Snowdens rather patchy professional career. He was neither (as many believe, and he has claimed) a successful and senior intelligence officer, nor was he a computer wizard. Mysteriously, possibly through his familys extensive connections with the spy world, he joined the CIA, but proved untrustworthy and incompetent. On leaving, he kept his security clearance, making him eligible for a good job in the private sector, where computer-literate ex-spooks are at a premium. But secrecy rules meant that nobody could check on his past.

The author agrees that Mr Snowden performed a salutary service in alerting both the public and the government to the potential danger of a surveillance leviathan. The bureaucratic mission creep, he argues, badly needed to be brought under closer oversight by Congress. He also notes that Mr Snowden inadvertently highlighted the security consequences of contractorisationoutsourcing spook work to the private sector.

But he also shows that the vast majority of stolen documents had nothing to do with Mr Snowdens purported concerns about privacy and government surveillance. He switched jobs in order to have access to much bigger secrets. He gave away American technical capabilitiessuch as the ability to snoop on computers that are not connected to the internetwhich are of real value in tracking criminals, terrorists and enemies. To believe that was justified, you have to regard America as being no better than Russia, China or al-Qaeda. He also stoked an ugly, misplaced cynicism about the trustworthiness of government.

Mr Epstein is cautious on the biggest question: whether Mr Snowden was acting alone, or under the control of Russian intelligence. The crucial evidence, he says, is Mr Snowdens contact with digital-privacy activists such as Glenn Greenwald. No Russian handler would allow a well-placed and valuable spy to make such a risky move, Mr Epstein argues. Better to keep him in place, to steal yet more secrets.

That may be too categorical. The intelligence world is full of bluffs and double-bluffsand errors. Agents misbehave. Aims change over time. But certainly nobody reading this book will easily retain faith in the Hollywood fable of Mr Snowdens bravery and brilliance.

Original post:
How Edward Snowden changed history - economist.com

Snowden (film) – Wikipedia

Snowden is a 2016 biographical political thriller film directed by Oliver Stone and written by Stone and Kieran Fitzgerald, based on the books The Snowden Files by Luke Harding and Time of the Octopus by Anatoly Kucherena. The cast includes Joseph Gordon-Levitt as the title character, Edward Snowden, with Shailene Woodley, Melissa Leo, Zachary Quinto, Tom Wilkinson, Scott Eastwood, Logan Marshall-Green, Timothy Olyphant, Ben Schnetzer, LaKeith Lee Stanfield, Rhys Ifans and Nicolas Cage also starring. Filming began on February 16, 2015 in Munich, Germany.

Snowden screened at Comic-Con on July 21, 2016, before premiering at the 2016 Toronto International Film Festival on September 9, 2016. The film was theatrically released in the United States on September 16, 2016, by Open Road Films and on September 22 in Germany.[5] It received mixed reviews and was a box office disappointment, grossing $34.3 million worldwide[4] against its $40 million budget.[2]

In 2013, Edward Snowden arranges a clandestine meet in Hong Kong with documentarian Laura Poitras and journalist Glenn Greenwald. They discuss releasing the classified information in the formers possession regarding illegal mass surveillance conducted by the National Security Agency (NSA).

In 2004, Snowden is undergoing basic training, having enlisted in the U.S. Army with intentions of matriculating to the Special Forces. He eventually fractures his tibia, and is informed that he will be receiving an administrative discharge and that he may serve his country in other ways.

Snowden applies for a position at the Central Intelligence Agency (CIA) and subsequently undergoes the screening process. Initially his answers to the screening questions are insufficient, but Deputy Director Corbin O'Brian decides to take a chance on him, given the demands of such extraordinary times. Snowden is then brought to "The Hill" where he is educated and tested on cyberwarfare. He learns about the Foreign Intelligence Surveillance Act, which circumvents the Fourth Amendment rights of U.S. citizens by allowing warrant requests to be approved by a panel of judges that were appointed by the chief justice. Snowden and his peers are each tasked with building a covert communications network in their hometown, deleting it, and then rebuilding it in eight hours or less, with five being the average time taken. Snowden impresses O'Brian when he completes the exercise in 38 minutes.

Meanwhile, Snowden meets Lindsay Mills via a dating website. The two bond, despite sharply contrasting political ideologies. Snowden acquires his first post abroad working with diplomatic cover in Geneva in 2007, taking Mills with him. He meets Gabriel Sol, who has ample experience in electronic surveillance. Snowden begins questioning the ethical implications of their assignment. After his superior decides to set up their target on a DUI charge in order to leverage information from him, Snowden resigns from the CIA.

Snowden later takes a position with the NSA in Japan, initially under the pretense of building a program that would allow the government to back up all critical data from the Middle East in an emergency, a program which he names "Epic Shelter". Snowden learns of the practices the NSA and other U.S. Government agencies are using not just in Japan, but in most countries the U.S. is currently allied with, which include planting malware in different computers that manage government, infrastructure and financial sectors so that, in the event that any allies turn against the US, that country can effectively be shut down in retaliation. The stress associated with the job results in the end of his relationship with Mills, who moves back with her family in Maryland.

Three months later, Snowden has left his post with the NSA and returned to Maryland where he and Mills resume their relationship and he takes a position consulting for the CIA. During a hunting trip, O'Brian reveals an operation in Oahu that revolves around counterattacking Chinese hackers. After Snowden is diagnosed with epilepsy, Mills agrees that he should join the operation for she believes the environment in Hawaii may be beneficial for him. Upon beginning his new job in "The Tunnel", an underground World War II bunker that has been repurposed for massive electronic surveillance and SIGINT operations, Snowden learns that Epic Shelter is actually providing real-time data that assists U.S. drone pilots in launching lethal strikes against terror suspects in Afghanistan.

Snowden ultimately becomes disillusioned with what he is a part of. It culminates in Snowden smuggling a microSD card into his office by way of a Rubik's Cube, and loading all relevant data. He then tells his colleagues he is feeling ill and departs. He advises Mills to fly home to Maryland, after which he contacts Poitras and Greenwald to schedule the meet.

With the help of journalist Ewen MacAskill, the information is disseminated to the press on June 5, 2013, with additional leaks published in the following days. In the aftermath, with the help of MacAskill, Greenwald and Poitras, Snowden is smuggled out of Hong Kong on a flight bound for Latin America by way of Russia. However, the U.S. Government revokes his passport, forcing him to remain in Moscow indefinitely. He is eventually granted asylum for three years, with Mills joining him at a later date. Snowden continues his activism.

When Oliver Stone was first approached to helm the film, he was hesitant. At the time, he was working on another controversial subject, about the last few years in the life of Martin Luther King Jr., with Jamie Foxx attached to star, and did not immediately wish to tackle a project as incendiary again.[6] He had been previously criticized for being too apathetic towards George W. Bush despite calling him the second worst President in U.S. history only after Richard Nixon in his film, W. (2008).[7] Nonetheless,[8] a series of events and persuasion prompted him to finally agree to direct it. Glenn Greenwald, the journalist who worked with Laura Poitras to break the Snowden story, asked him for some advice; a couple of months later, Snowden's Russian lawyer, Anatoly Kucherena, contacted Stone via his producer asking to meet him.[6] Wanting to sell his book about Snowden, Kucherena arranged a meeting in Moscow, in a secure place that Stone would not reveal. It was a fictional book, but Stone developed an interest towards it and called it "very [Fyodor] Dostoyevsky", in the sense that none of it is realistic. Stone, who did not know if Snowden would cooperate, was undecided whether to make a fictional film with an unnamed character or a story as realistic as possible.[7]

Stone began meeting Edward Snowden on January 2014.[9] At first, Snowden was wary about the idea of turning his life into a film. Stone went to meet Snowden two more times then in late May of that year,[9] and Snowden finally agreed to the idea and even decided to take part. Although he became involved in the project, he was given no script approval, nor did he receive any payment for the film. Payment was instead given to The Guardian.[7] Snowden had seen a piece of Oliver Stone's Untold History of the United States and was fascinated by it.[7] Columbia Pictures already had the rights to Greenwald's book on the case.[8]

On June 2, 2014, it was announced that Stone and Moritz Borman had acquired the rights to the nonfiction book The Snowden Files by Luke Harding, and that Stone would write and direct a film based on it.[10] The film on Martin Luther King Jr. was scrapped since Stone was committed to direct Snowden instead.[11] Eight days later, on June 10, 2014, Stone acquired the rights to another book, Time of the Octopus, by Kucherena. (In April 2015, WikiLeaks revealed that Stone paid $700,000 for the rights to Harding's book and $1 million for the rights to Kucherena's novel.)[12] Stone used both books as the sources for his screenplay.[13] On November 6, 2014, Open Road Films acquired the U.S. rights to the film, while Wild Bunch was set to handle foreign sales.[14]Deadline.com confirmed on November 10, 2014, that Endgame Entertainment had come on board to produce the film.[15]

"It's a very strange thing to do [a story about] an American man, and not be able to finance this movie in America. And that's very disturbing, if you think about its implications on any subject that is not overtly pro-American. They say we have freedom of expression; but thought is financed, and thought is controlled, and the media is controlled. This country is very tight on that, and there's no criticism allowed at a certain level. You can make movies about civil rights leaders who are dead, but it's not easy to make one about a current man."

Before production began, Stone and Gordon-Levitt personally met Snowden in 2015 in Moscow, where he had been living in exile with his girlfriend, Lindsay Mills, since evading the U.S. government's attempts to arrest him for espionage. The U.S. government had revoked his passport while Snowden was trying to reach South America.[6] Gordon-Levitt described Snowden as a person who is akin to Philippe Petit, whom Gordon-Levitt played in the 2015 film The Walk.[16] Problems arose in Russia, however, as companies that were affiliated with the U.S. refused to become involved in the project,[6] and no studio was ready to support it. It became extremely difficult for Stone, who had to finance everything along with the producer.[6] Eventually, financing came through from France and Germany, and the film ended up being shot in Germany as a German production, with contracts being signed eight days before production began.[6][8] Since the budget was too tight, Stone had to miss the funeral of his mother, who had died in America while filming was occurring in Germany. Going back to America would have meant that Stone would have had to cut four days of work, which he said he could not afford to do.[7]

On September 21, 2014, Joseph Gordon-Levitt was in talks to play Edward Snowden, the American computer professional who leaked classified information from the National Security Agency (NSA) to the mainstream media starting in June 2013.[17] On November 10, 2014, news confirmed that Gordon-Levitt would be starring in the lead role.[18] On November 14, 2014, Shailene Woodley was in final talks to join the film, to play Snowden's girlfriend, Lindsay Mills.[19] On February 2, 2015, Scott Eastwood joined the cast to play an NSA agent.[20] On February 4, 2015, three more actors joined the cast; Melissa Leo played documentary filmmaker Laura Poitras, who filmed the most famous recording of Snowden, Zachary Quinto played Glenn Greenwald, the journalist chosen by Snowden to leak sensitive information, and Tom Wilkinson played Ewen MacAskill, defense and intelligence correspondent for The Guardian, who helped report the Snowden story.[21] On February 13, 2015, Variety reported that Ben Schnetzer had also joined the film.[22] On February 19, 2015, Timothy Olyphant joined the film to star as a CIA agent who befriended Snowden before he left for Russia,[23] and Rhys Ifans and Joely Richardson were added to the cast of the film on February 20, 2015.[24] On February 23, 2015, Nicolas Cage also signed on to play the role of a former US Intelligence official.[25]Keith Stanfield was added to the cast on February 25, 2015, to play an NSA co-worker and a close friend to Snowden.[26]

For his role as Snowden, Joseph Gordon-Levitt pledged to donate his entire salary from the film to "help facilitate the conversation" about the relationship between technology and democracy.[27]

Principal photography began on February 16, 2015 in Munich, Germany.[28] Shooting was underway in Washington, D.C. in early April,[29] and shooting in Hawaii began on April 15 and lasted until April 18. The house used to film is on the same street Snowden lived on. At the end of April, Hong Kong press reported that crews started filming in The Mira Hong Kong, followed by outdoor filming in some old buildings in To Kwa Wan.[30] Shooting lasted until mid-May.[24]

Due to fear of interference by the National Security Agency, Stone decided to shoot the film mostly outside of the United States.[6] "We felt like we were at risk here. We didnt know what the NSA might do, so we ended up in Munich, which was a beautiful experience," Stone said.[6] Due to fears of the film leaking, Stone employed self-described ethical hacker Ralph Echemendia as a technical supervisor, and made sure all cast and crew used a secure chat-and-file-sharing program.[31]

Peter Gabriel's song "The Veil"[32] was composed especially for the film.[33]

On February 20, 2015, Open Road Films set the film for a December 25, 2015 domestic release date.[24]Path would release the film in France on December 30, 2015, and Universum Film would release it in Germany on January 7, 2016.[24] However, in September 2015, Open Road moved the film from its December release date to 2016. The studio did not give reasons for the delay; however, The Hollywood Reporter reported that maybe it was because the film was not finished yet.[34] On October 7, 2015, the film was set for a May 13, 2016 release.[35] On February 19, 2016, the release date was again pushed back to September 16, at the forefront of awards season.[36] The official trailer was published on April 27, 2016.[37]

The film was invited to compete at the 2016 Cannes Film Festival, as the festival's director, Thierry Frmaux, saw the film, and praised it, calling it a "really good film. It complements Citizenfour marvelously. It helps understand a lot of things". Frmaux said he wanted the film to screen at Cannes, but explained that the film's producers "want to aim for the Oscars, so for them a Cannes premiere was a little too early".[38] It was shown at the 2016 Toronto International Film Festival,[39] and had its European premiere at the 64th San Sebastin Film Festival.[40]

Stone held a private screening of Snowden at the former home of Ernest Hemingway in Sun Valley, for an invited audience of around two dozen, including actress Melissa Leo, who portrayed documentary filmmaker Laura Poitras. Guests were required to sign non-disclosure agreements. The film received critical praise from the attendees, and one audience member was quoted saying, "What he did that's so brilliant is, he gave this kid's whole back story, so you really like him."[6]

The film had an invitation-only screening at San Diego Comic-Con on July 21, 2016.[41] A second trailer for the film was released at the event.[42]

Snowden grossed $21.6 million in the United States and Canada and $12.7 million in other countries, for a worldwide total of $34.3 million,[4] against a production budget of $40 million.[2]

The film was released on September 16, 2016, alongside Blair Witch, Bridget Jones's Baby and Hillsong: Let Hope Rise, and was projected to gross around $10 million from 2,443 theaters in its opening weekend.[43] It went on to open to $8 million, finishing 4th at the box office. It marked the lowest opening of Oliver Stone's career for a film playing in over 2,000 theaters.[44]

Snowden received mixed reviews from critics, although Gordon-Levitt's performance garnered critical praise. On review aggregator website Rotten Tomatoes, the film has an approval rating of 61%, based on 221 reviews, with a weighted average score of 6.2/10. The site's critical consensus reads, "Snowden boasts a thrilling fact-based tale and a solid lead performance from Joseph Gordon-Levitt, even if director Oliver Stone saps the story of some of its impact by playing it safe."[45] On Metacritic, the film has a score of 58 out of 100, based on 43 critics, indicating "mixed or average reviews".[46] Audiences polled by CinemaScore gave the film an average "A" grade, on an A+ to F scale.[47]

Richard Roeper gave the film three out of four stars, saying, "Snowden works best when it's just Edward and the three journalists in that hotel room, sweating it out, or when we see the pattern of events that led him to commit acts that exposed the shocking practices of our own government but also quite possibly created serious security breaches."[48]

On 19 November 2016, during the Camerimage festival, cinematographer Anthony Dod Mantle received the Bronze Frog award for his work on this film.[49][50]

Read the original post:
Snowden (film) - Wikipedia

WikiLeaks proposes tracking verified Twitter users homes …

WikiLeaks wants to start building a list of verifiedTwitter users that would include highly sensitive and personal information about their families, their finances and their housing situations.

We are thinking of making an online database with all 'verified' twitter accounts & their family/job/financial/housing relationships, WikiLeaks tweeted Friday.

The disclosure organization, run by Julian Assange, says the information would be used for an artificial-intelligence program.ButTwitter users immediately fired back, saying WikiLeaks would use the list to takepolitical vengeanceagainst those who criticizeit.

Twitter verifies certain users, such as world leaders, nonprofit organizations and news outlets,with a blue check mark beside their names so that other users of the service can be confident about theposters' identities. WikiLeaks, which has a verified Twitter account, did not say whether it would subject itself tothe scrutiny it was proposing. (Itwas also unclear whether, under its plan, WikiLeaks would seek to uncover information about the financial lives of Russian PresidentVladimir Putinor President-elect Donald Trump,both of whom are verified on Twitter.)

Asked by journalist Kevin Collier why it needed to build a database of dossiers, WikiLeaks replied thatthe database would be used asa metric to understand influence networks based on proximity graphs.

But the proposal faced a sharp and swift backlash as technologists, journalists and security researchers slammed the idea as a sinister and dangerous abuse of power and privacy.

This is a good plan. If you're Darth Vader, Matthew Green, a professor who teaches cryptography at Johns Hopkins University, tweeted.

Timothy Berners-Lee, the inventor of the World Wide Web, compared the WikiLeaks proposal to a piece of British legislation that has been criticized as a massive boon to the surveillance industry.

Don't.even.think.about.it, he tweeted.

Wikileaks founder Julian Assange told Fox News host Sean Hannity on Jan. 3 that Russia did not provide the organization with hacked emails from the Hillary Clinton campaign. (Peter Stevenson/The Washington Post)

Even the hacktivist organization Anonymous lined up against WikiLeaks.

This is a sickening display of intimidation tactics, it said, tagging the official Twitter accounts for the social network, its support team and chief executive Jack Dorsey.

Someread WikiLeaks' suggestion asimplying the threat of harassment or violence.

Isn't threatening to dox hundreds of thousands of Twitter users a TOS violation? wondered Anil Dash, a tech entrepreneur. (To dox a person is to release documents related to his or her personal life in a way that potentially endangers that person's safety. TOS stands for terms of service.)

Shnd't have to say, but leaking *&data collection* for harassment etc have nothing in common with legit disclosures in the public interest, said David Kaye, a California-based U.N. special rapporteur on freedom of expression.

Here are a few other reactions from Twitter.

As for Twitter itself, the social network warnedin a statement that WikiLeaks risked running afoul of its platform policies if it published personal information publicly.Posting another person's private and confidential information is a violation of the Twitter Rules, the company told The Washington Post.

WikiLeaks did not respond to a request for comment onTwitter's statement.

WikiLeaks had already been in the news this week afterU.S. intelligence officials said they had informationproving a link between the organization and the Russian hackerssuspected of breaking into the Democratic National Committee's emails in an attempt to sway the presidential election.

See more here:
WikiLeaks proposes tracking verified Twitter users homes ...