Encryption software – Wikipedia, the free encyclopedia

Encryption software is software that can encrypt and decrypt data, often in the form of files on a hard drive or packets sent over a network.

Encryption software uses an encryption scheme that encodes computer data so that it cannot be recovered without the correct key. Software encryption is a fundamental part of modern computer communications and file protection.

The purpose of encryption is to prevent third parties from recovering any of the original data, or even any information about the data, from the encrypted data. This is particularly important for sensitive data like social security numbers.

Many encryption algorithms and schemes exist for many different purposes. Public-key algorithms like RSA and ElGamal are used by HTTPS for encrypting web communications and by PGP for encrypting emails. Symmetric-key algorithms like AES operated in CBC mode are popular for encrypting individual files. Full disk encryption has different constraints, and so the now-defunct TrueCrypt used AES in XTS mode.

Ciphers can be categorized into two general types: public key ciphers and symmetric key ciphers.

Public key systems use algorithms that rely on a pair of mathematically-linked keys. Data encrypted with one key can only be decrypted using the other key. These systems are used for exchanging secrets (often a key for subsequent use in a symmetric key cipher) and digital signatures.

Symmetric key ciphers (also referred to as secret key ciphers) use the same key for both encryption and decryption. Thus, in order for messages encrypted with a symmetric key cipher to remain secure, the key used must remain secret. Symmetric key ciphers can be further subdivided into stream ciphers and block ciphers.

Stream ciphers typically encrypt plaintext a bit or byte at a time, and are most commonly used to encrypt real-time communications, such as audio and video information. The key is used to establish the initial state of a keystream generator, and the output of that generator is used to encrypt the plaintext.

Block cipher algorithms split the plaintext into fixed-size blocks and encrypt one block at a time. For example, AES processes 16-byte blocks, while its predecessor DES encrypted blocks of eight bytes.

There are many factors that affect the choice of an encryption algorithm. Common factors include the security, speed, parallelizability of encryption and decryption, memory requirements, known weaknesses, and similarity to existing designs.

A common mistake made by amateur cryptographers is to assume that because the method is secret, the cipher is secure. This is usually not true. Many "home grown" encryption algorithms reveal the key quite easily when fed a string of identical bytes (e.g., nulls).

The purpose of disseminating an encryption method is to allow the community to evaluate it. If it is indeed secure, then its power lies in the fact that its method has been subjected to scrutiny and found to be sound, not that it is secret.

Encryption software can be used in many ways. Common categories include:

Network traffic encryption tools

Each of these categories define the range and location of the data to be encrypted, but the process is the same for each.

View post:
Encryption software - Wikipedia, the free encyclopedia

United States diplomatic cables leak – Wikipedia, the free …

Cablegate Description Release of 251,287 United States diplomatic cables Dates of cables 19662010 Period of release 18 February 2010 1 September 2011 Key publishers El Pas, Der Spiegel, Le Monde, The Guardian, The New York Times, WikiLeaks Related articles Afghan War documents leak, Iraq War documents leak Subject Data protection, First Amendment, freedom of information, freedom of speech

The United States diplomatic cables leak, widely known as Cablegate, began on Sunday, 28 November 2010[1] when WikiLeaksa non-profit organization that publishes submissions from anonymous whistleblowersbegan releasing classified cables that had been sent to the U.S. State Department by 274 of its consulates, embassies, and diplomatic missions around the world. Dated between December 1966 and February 2010, the cables contain diplomatic analysis from world leaders, and the diplomats' assessment of host countries and their officials.[2] According to WikiLeaks, the 251,287 cables consist of 261,276,536 words, making Cablegate "the largest set of confidential documents ever to be released into the public domain."[3]

The first document, the so-called Reykjavik 13 cable, was released by WikiLeaks on 18 February 2010, and was followed by the release of State Department profiles of Icelandic politicians a month later.[4] Later that year, Julian Assange, WikiLeaks' editor-in-chief, reached an agreement with media partners in Europe and the United States to publish the rest of the cables in redacted form, removing the names of sources and others in vulnerable positions. On 28 November, the first 220 cables were published under this agreement by El Pas (Spain), Der Spiegel (Germany), Le Monde (France), The Guardian (United Kingdom) and The New York Times (United States).[5] WikiLeaks had planned to release the rest over several months, and as of 11 January 2011, 2,017 had been published.

The remaining cables were published in September 2011 after a series of events compromised the security of a WikiLeaks file containing the cables. This included WikiLeaks volunteers placing an encrypted file containing all WikiLeaks data online as "insurance" in July 2010, in case something happened to the organization.[6] In February 2011 David Leigh of The Guardian published the encryption passphrase in a book; he had received it from Assange so he could access a copy of the Cablegate file, and believed the passphrase was a temporary one, unique to that file. In August 2011, a German magazine, Der Freitag, published some of these details, enabling others to piece the information together and decrypt the Cablegate files. The cables were then available online, fully unredacted. In response, WikiLeaks decided on 1 September 2011 to publish all 251,287 unedited documents.[7]

The publication of the cables was the third in a series of U.S. classified document "mega-leaks" distributed by WikiLeaks in 2010, following the Afghan War documents leak in July, and the Iraq War documents leak in October. Over 130,000 of the cables are unclassified, some 100,000 are labeled "confidential", around 15,000 have the higher classification "secret", and none are classified as "top secret" on the classification scale.[5] Reactions to the leak in 2010 varied. Western governments expressed strong disapproval, while the material generated intense interest from the public and journalists. Some political leaders referred to Assange as a criminal, while blaming the U.S. Department of Defense for security lapses. Supporters of Assange referred to him in November 2010 as a key defender of free speech and freedom of the press.[8] Reaction to the release in September 2011 of the unredacted cables attracted stronger criticism, and was condemned by the five newspapers that had first published the cables in redacted form in November 2010.[9]

In June 2010, the magazine Wired reported that the U.S. State Department and embassy personnel were concerned that Chelsea (then known as Bradley) Manning, a United States Army soldier charged with the unauthorized download of classified material while stationed in Iraq, had leaked diplomatic cables. WikiLeaks rejected the report as inaccurate: "Allegations in Wired that we have been sent 260,000 classified U.S. embassy cables are, as far as we can tell, incorrect".[10][11]

However, by June 2010, The Guardian had been offered "half a million military dispatches from the battlefields of Afghanistan and Iraq. There might be more after that, including an immense bundle of confidential diplomatic cables", and Alan Rusbridger, the editor of The Guardian had contacted Bill Keller, editor of The New York Times, to see if he would be interested in sharing the dissemination of the information.[12]

Manning was suspected to have uploaded all that was obtained to WikiLeaks, which chose to release the material in stages so as to have the greatest possible impact.[13]

According to The Guardian, all the diplomatic cables were marked "Sipdis", denoting "secret internet protocol distribution", which means they had been distributed via the closed U.S. SIPRNet, the U.S. Department of Defense's classified version of the civilian internet.[14] More than three million U.S. government personnel and soldiers have access to this network.[15] Documents marked "top secret" are not included in the system. Such a large quantity of secret information was available to a wide audience because, as The Guardian alleged, after the 11 September attacks an increased focus had been placed on sharing information since gaps in intra-governmental information sharing had been exposed.[14] More specifically, the diplomatic, military, law enforcement and intelligence communities would be able to do their jobs better with this easy access to analytic and operative information.[14] A spokesman said that in the previous weeks and months additional measures had been taken to improve the security of the system and prevent leaks.[14]

On 22 November, an announcement was made via WikiLeaks's Twitter feed that the next release would be "7the size of the Iraq War Logs".[16][17] U.S. authorities and the media had speculated, at the time, that they could contain diplomatic cables.[18] Prior to the expected leak, the government of the United Kingdom (UK) sent a DA-Notice to UK newspapers, which requested advance notice from newspapers regarding the expected publication.[19]Index on Censorship pointed out that "there is no obligation on [the] media to comply".[19] Under the terms of a DA-Notice, "[n]ewspaper editors would speak to [the] Defence, Press and Broadcasting Advisory Committee prior to publication".[19]The Guardian was revealed to have been the source of the copy of the documents given to The New York Times in order to prevent the British government from obtaining any injunction against its publication.[20] The Pakistani newspaper Dawn stated that the U.S. newspapers The New York Times and The Washington Post were expected to publish parts of the diplomatic cables on 28 November, including 94 Pakistan-related documents.[21]

On 26 November, Assange sent a letter to the U.S. Department of State, via his lawyer Jennifer Robinson, inviting them to "privately nominate any specific instances (record numbers or names) where it considers the publication of information would put individual persons at significant risk of harm that has not already been addressed".[22][23][24]Harold Koh, the Legal Adviser of the Department of State, rejected the proposal, stating: "We will not engage in a negotiation regarding the further release or dissemination of illegally obtained U.S. Government classified materials".[24] Assange responded by writing back to the U.S. State Department that "you have chosen to respond in a manner which leads me to conclude that the supposed risks are entirely fanciful and you are instead concerned to suppress evidence of human rights abuse and other criminal behaviour".[25][26] Ahead of the leak, United States Secretary of State Hillary Clinton and other American officials contacted governments in several countries about the impending release.[27]

Nov: Bradley Manning allegedly contacts WikiLeaks.

18 Feb: WikiLeaks releases Reykjavik 13 cable.

29 Mar : WikiLeaks releases State Dept profiles of Icelandic politicians.

26 May: Manning arrested in Iraq.

30 July: Wikileaks posts 1.4 gigabyte encrypted file containing WL material on several Internet exchange platforms as "insurance."

Aug: Julian Assange gives The Guardian's David Leigh the Cablegate file's encryption passphrase.

15 Sep: Daniel Domscheit-Berg formally leaves WikiLeaks.

Sep: WikiLeaks volunteer gives Heather Brooke Cablegate file access.

28 Nov: 220 redacted cables published by five newspapers.

11 Jan: Redacted publication continues; 2,017 cables published as of this date.

1 Feb: David Leigh and Luke Harding publish Cablegate passphrase in a book, believing it no longer in use.

25 Aug: Der Freitag reports file and passphrase are online; does not reveal passphrase.

Aug: Others piece details together; gain access.

1 Sep: WikiLeaks releases all 251,287 unredacted cables.

The five newspapers that had obtained an advance copy of all leaked cables began releasing the cables on 28 November 2010, and WikiLeaks made the cables selected by these newspapers and redacted by their journalists available on its website. "They are releasing the documents we selected", Le Monde's managing editor, Sylvie Kauffmann, said in an interview.[28]

WikiLeaks aimed to release the cables in phases over several months due to their global scope and significance.[29] The first batch of leaks released comprised 220 cables.[29] Further cables were subsequently made available on the WikiLeaks website. The full set of cables published by WikiLeaks can be browsed and searched by a variety of websites, see Sites offering search capabilities.[30]

The contents of the U.S. diplomatic cables leak describe in detail events and incidents surrounding international affairs from 274 embassies dating from 28 December 1966 to 28 February 2010. The diplomatic cables revealed numerous unguarded comments and revelations: critiques and praises about the host countries of various U.S. embassies, discussion and resolutions towards ending ongoing tension in the Middle East, efforts for and resistance against nuclear disarmament, actions in the War on Terror, assessments of other threats around the world, dealings between various countries, U.S. intelligence and counterintelligence efforts, U.S. support of dictatorship and other diplomatic actions.

The leaked cables revealed that diplomats of the U.S. and Britain eavesdropped on Secretary General Kofi Annan in the weeks before the U.S.-led invasion of Iraq in 2003, in apparent violation of international treaties prohibiting spying at the UN.[31]

The Guardian released its coverage of the leaked cables in numerous articles, including an interactive database, starting on 28 November.[32]

Der Spiegel also released its preliminary report, with extended coverage promised for the next day.[33] Its cover for 29 November was also leaked with the initial report.[34]

The New York Times initially covered the story in a nine-part series spanning nine days, with the first story published simultaneously with the other outlets.[35]The New York Times was not originally intended to receive the leak, allegedly[36] due to its unflattering portrayal of the site's founder, but The Guardian decided to share coverage, citing earlier cooperation while covering the Afghan and Iraqi war logs.

The Washington Post reported that it also requested permission to see the documents, but was rejected for undisclosed reasons.[36]

El Pas released its report[37] saying there was an agreement between the newspapers for simultaneous publication of the "internationally relevant" documents, but that each newspaper was free to select and treat those documents that primarily relate to its own country.[38]

Several of the newspapers coordinating with WikiLeaks have published some of the cables on their own websites.[39]

The Lebanese daily newspaper Al-Akhbar published about 183 cables on 2 December 2010.[40][41]

The Swedish newspapers Svenska Dagbladet and Aftonbladet started reporting on the leaks early December.[42] In Norway Verdens Gang (VG) brought the first leaks concerning USA and the Norwegian government on 7 December.[43]

Aftenposten, a Norwegian daily newspaper, reported on 17 December 2010 that it had gained access to the full cable set of 251,287 documents.[44] While it is unclear how it received the documents, they were apparently not obtained directly from WikiLeaks. Aftenposten started releasing cables that are not available in the official WikiLeaks distribution.[45] As of 5 January 2011[ref], it had released just over one hundred cables unpublished by WikiLeaks, with about a third of these related to Sri Lanka, and many related to Norway.[45]

Politiken, a Danish daily newspaper, announced on 8 January 2011 that it had obtained access to the full set of cables.[46]

NRC, a Dutch daily newspaper, and RTL Nieuws, a Dutch television news service, announced on 14 January 2011 that they had gained access to the about 3000 cables sent from The Hague, via Aftenposten.[47]NOS announced on the same day that it had obtained these same cables from Wikileaks.[48]

Die Welt, a German daily newspaper, announced on 17 January 2011 that they had gained access to the full set of cables, via Aftenposten.[49]

Australian-based Fairfax Media obtained access to the cables under a separate arrangement.[50] Fairfax newspapers began releasing their own stories based on the leaked cables on 7 December 2010. Unlike other newspapers given access, Fairfax originally had not posted any of the original cables online, citing the need to maintain its competitive advantage over other Australian newspapers.[51] However, on 16 December 2010, Fairfax reversed its position, and began publishing the cables used in its stories.[52]

The Russian weekly newspaper Russky Reporter ( '')[53] has published a large number of cables, both in English and in Russian translation.[54]

The Cuban government-run website Razones de Cuba[55] started publishing Spanish translations of WikiLeaks documents on 23 December 2010.[56]

The Costa Rican newspaper La Nacin announced on 1 March 2011 it had received 827 cables from WikiLeaks which it started publishing the next day. 764 of these were sent from the U.S. Embassy in San Jos while 63 were sent from other embassies and deal with Costa Rican affairs.[57]

CNN was originally supposed to receive an advance copy of the documents as well, but did not after it refused to sign a confidentiality agreement with WikiLeaks.[58]The Wall Street Journal also refused advance access, apparently for similar reasons as CNN.[59]

The Ecuadorian newspaper El Universo started releasing 343 cables related to the Ecuadorian government or institutions on 6 April 2011.[60] The publication was done the day after the Spanish newspaper El Pas published a cable in which the ambassador Heather Hodges showed concerns regarding corruption in the Ecuadorian National Police, especially of Gral. Jaime Hurtado Vaca, former Police commander. The ambassador was later declared persona non grata and requested to leave the country as soon as possible.[61]

In August 2010, Assange gave Guardian journalist David Leigh an encryption key and a URL where he could locate the full Cablegate file. In February 2011, shortly before Domscheit-Berg's book appeared, he and Luke Harding, another Guardian journalist, published WikiLeaks: Inside Julian Assange's War on Secrecy via Guardian Books. In it, Leigh revealed the encryption key Assange had given him.[7]

"Denn der Freitag hat eine Datei, die auch unredigierte US-Botschaftsdepeschen enthlt. [...] Die Datei mit dem Namen "cables.csv" ist 1,73 Gigabyte gro. [...] Das Passwort zu dieser Datei liegt offen zutage und ist fr Kenner der Materie zu identifizieren."

"Because der Freitag have discovered a file on the internet which includes the unredacted embassy files. [...] The file is called "cables.csv" and is 1.73 gigabytes in size. [...] The password for this file is plain to see and identifiable for someone familiar with the material."

It is not yet clear how or when the encrypted file itself was released inadvertently. So far it appears that it was released to bittorrent as part of a mirror file for the WikiLeaks web server[63] on which it had been placed to aid in transferring the file from WikiLeaks to Leigh, and either not removed due to oversight, or mirrored by other WikiLeaks staff before it could be removed. The password leaked in Leigh's book is not the password for the whole of the "insurance file" which WikiLeaks published in a separate event. It also remains unclear if during the transfer process the file was exposed publicly under the assumption that it is acceptable to transfer an encrypted file in plain sight so long as the key remains secret.

On 25 August 2011, the German magazine Der Freitag published an article about it,[62] and while it left out the crucial details, there was enough to allow others to piece the information together. The story was also published in the Danish newspaper Dagbladet Information the same day.[64] By 1 September, the encrypted Cablegate file had been decrypted and published by a Twitter user, and WikiLeaks therefore decided to publish all the diplomatic cables unredacted. Their reasoning, according to Glenn Greenwald in Salon, was that government intelligence agencies were able to find and read the files, while ordinary people-including journalists, whistleblowers, and those directly affected-were not. WikiLeaks took the view that sources could better protect themselves if the information were equally available.[7] The archive includes 34,687 files on Iraq, 8,003 on Kuwait, 9,755 on Australia, and 12,606 on Egypt.[65] According to The Guardian, it includes more than 1,000 cables containing the names of individual activists, and around 150 identifying whistleblowers.[66]

Leigh disclaimed responsibility for the release, saying Assange had assured him the password would expire hours after it was disclosed to him.[67]The Guardian wrote that the decision to publish the cables was made by Assange alone, a decision that it-and its four previous media partners-condemned. The partners released a joint statement saying the uncensored publication put sources at risk of dismissal, detention and physical harm,[68] while other commentators have agreed with WikiLeaks' rationale for the release of unredacted cables.[7][69] Leigh was nevertheless criticized by several commentators, including Glenn Greenwald, who called the publication of the password "reckless", arguing that, even if it had been a temporary one, publishing it divulged the type of passwords WikiLeaks was using.[7] WikiLeaks said it was pursuing pre-litigation action against The Guardian for an alleged breach of a confidentiality agreement.[70]

An investigation into two senior Zimbabwe army commanders who communicated with US Ambassador Charles A. Ray was launched, with the two facing a possible court martial.[71] On September 14 the Committee to Protect Journalists said that an Ethiopian journalist named in the cables was forced to flee the country[72] but WikiLeaks accused the CPJ of distorting the situation "for marketing purposes".[73]Al Jazeera replaced its news director, Wadah Khanfar, on September 20 after he was identified in the cables.[74] The naming of mainland China residents reportedly "sparked an online witch-hunt by Chinese nationalist groups, with some advocating violence against those now known to have met with U.S. Embassy staff."[75]

About an hour prior to the planned release of the initial documents, WikiLeaks announced it was experiencing a massive distributed denial-of-service attack (DDoS),[76] but vowed to still release the cables and documents via pre-agreed prominent media outlets El Pas, Le Monde, Der Spiegel, The Guardian, and The New York Times.[77]

According to Arbor Networks, an Internet-analyst group, the DDoS attack accounted for between two and four gigabits per second (Gbit/s) of additional traffic to the WikiLeaks host network, compared to an average traffic of between twelve and fifteen Gbit/s under ordinary conditions.[78] The attack was slightly more powerful than ordinary DDoS attacks, though well below the maximum of 60 to 100Gbit/s of other major attacks during 2010.[78] The attack was claimed to have been carried out by a person by the name of "Jester", who describes himself as a "hacktivist". Jester took credit for the attack on Twitter, stating that WikiLeaks "threaten[ed] the lives of our troops and 'other assets'".[78][79]

On 2 December 2010, EveryDNS, who provide a free DNS hosting service, dropped WikiLeaks from its entries, citing DDoS attacks that "threatened the stability of its infrastructure",[80] but the site was copied and made available at many other addresses, an example of the Streisand effect.[81]

John Perry Barlow, co-founder of the Electronic Frontier Foundation, wrote a tweet saying: "The first serious infowar is now engaged. The field of battle is WikiLeaks. You are the troops."[82]

Amazon.com removed WikiLeaks from its servers on 1 December 2010 at 19:30 GMT, and the latter website was unreachable until 20:17 GMT when the site had defaulted to its Swedish servers, hosted by Bahnhof. U.S. Senator Joe Lieberman, among the members of the U.S. Senate Homeland Security and Governmental Affairs Committee who had questioned Amazon in private communication on the company's hosting of WikiLeaks and the illegally obtained documents, commended Amazon for the action;[83] WikiLeaks, however, responded by stating on its official Twitter page that "WikiLeaks servers at Amazon ousted. Free speech the land of the freefine our $ are now spent to employ people in Europe",[84] and later that "If Amazon are so uncomfortable with the first amendment, they should get out of the business of selling books".[85]

On 4 December, Paypal cut off the account used by WikiLeaks to collect donations.[86]

On 6 December, the Swiss bank PostFinance announced that it had frozen the assets of Assange;[87] on the same day, MasterCard stopped payments to WikiLeaks,[88] with Visa following them on 7 December.[89]

Official efforts by the U.S. government to limit access to, conversation about, and general spread of the cables leaked by WikiLeaks were revealed by leading media organizations. A 4 December 2010 article by MSNBC,[90] reported that the Obama administration has warned federal government employees and students in educational institutions studying towards careers in public service that they must refrain from downloading or linking to any WikiLeaks documents. However, State Department spokesman P.J. Crowley denied ordering students, stating, "We do not control private networks. We have issued no authoritative instructions to people who are not employees of the Department of State." He said the warning was from an "overzealous employee."[91] According to a 3 December 2010 article in The Guardian,[92] access to WikiLeaks has been blocked for federal workers. The U.S. Library of Congress, the U.S. Commerce Department and other government agencies have confirmed that the ban is already in place.

A spokesman for Columbia University confirmed on 4 December that its Office of Career Services sent an e-mail warning students at Columbia's School of International and Public Affairs to refrain from accessing WikiLeaks cables and discussing this subject on the grounds that "discourse about the documents would call into question your ability to deal with confidential information".[93] However, this was quickly retracted on the following day. SIPA Dean John Henry Coatsworth wrote that "Freedom of information and expression is a core value of our institution, [...] thus, SIPA's position is that students have a right to discuss and debate any information in the public arena that they deem relevant to their studies or to their roles as global citizens, and to do so without fear of adverse consequences."[94]

The New York Times reported on 14 December[95] that the U.S. Air Force bars its personnel from access to news sites (such as those of The New York Times and The Guardian) that publish leaked cables.

On 18 December, the Bank of America stopped handling payments for WikiLeaks.[96] Bank of America is also blocking access to WikiLeaks from its internal network preventing employees from accessing WikiLeaks.[citation needed]

In response to perceived federal and corporate censorship of the cable leaks, internet group Anonymous attacked several of such websites via DDOS attacks. So far, the websites of the Swedish prosecutor, PostFinance (the Swiss post-office banking company), MasterCard and Visa have all been targeted.[97]

The websites of the government of Zimbabwe were targeted by Anonymous with DDoS attacks due to censorship of the WikiLeaks documents.[98] The websites of the government of Tunisia were targeted by Anonymous due to censorship of the WikiLeaks documents and the Tunisian revolution.[98] Tunisians were reported to be assisting in these denial-of-service attacks launched by Anonymous.[99] Anonymous's role in the DDoS attacks on the Tunisian government's websites have led to an upsurge of internet activism among Tunisians against the government.[100] Anonymous released an online message denouncing the government clampdown on recent protests and posted it on the Tunisian government website.[101] Anonymous has named their attacks as "Operation Tunisia".[102] Anonymous successfully DDoSsed eight Tunisian government websites. They plan attacks in Internet Relay Chat networks. Someone attacked Anonymous's website with a DDoS on 5 January.[103]

On 9 December 2010, major Pakistani newspapers (such as The News International, The Express Tribune and the Daily Jang) and television channels carried stories that claimed to detail U.S. diplomats' assessments of senior Indian generals as "vain, egotistical and genocidal", also saying "India's government is secretly allied with Hindu fundamentalists", and that "Indian spies are covertly supporting Islamist militants in Pakistan's tribal belt and Balochistan."[104] However, none of the cables revealed any such assessments. The claims were credited to an Islamabad-based news service agency that frequently ran pro-Pakistan Army stories.[104]

Later, The News International admitted the story "was dubious and may have been planted", and The Express Tribune offered "profuse" apologies to readers.[105]Urdu-language papers such as the Daily Jang, however, declined to retract the story.[105]

On 14 December 2010, a U.S. federal court subpoenaed Twitter for extensive information regarding WikiLeaks, but also put on a gagging order. The order was said to be part of an "ongoing criminal investigation", and required information regarding the Twitter accounts of WikiLeaks, Assange, Manning, Rop Gonggrijp, Jacob Appelbaum and Birgitta Jonsdottir. According to Salon.com journalist Glenn Greenwald, the court "gave Twitter three days to respond and barred the company from notifying anyone, including the users, of the existence of the Order."[106] Twitter requested that it be allowed to notify the users, giving them ten days to object. The court order was unsealed on 5 January 2011, and Jonsdottir decided to publicly fight the order.[107]

Elected representatives of Iceland have declared such actions by the U.S. government "serious", "peculiar", "outlandish", and akin to heavy breathing on the telephone.[108] The published subpoena text demands "you are to provide ... subscriber names, user names ... mailing addresses, residential addresses, business addresses ... telephone number[s] ... credit card or bank account number[s] ... billing records", "as well as 'destination email addresses and IP addresses".[109] As of 10 January 2011, there were 636,759 followers of the WikiLeaks Twitter feed with destination email addresses and IP addresses.[110][111]

The cable leaks have been pointed to as a catalyst for the 20102011 Tunisian revolution and government overthrow. Foreign Policy magazine said, "We might also count Tunisia as the first time that WikiLeaks pushed people over the brink."[112] Additionally, The New York Times said, "The protesters...found grist for the complaints in leaked cables from the United States Embassy in Tunisia, released by WikiLeaks, that detailed the self-dealing and excess of the president's family."[113][114][115]

It is widely believed that the Tunisian revolution then spread to other parts of the Middle East, turning into the Arab Spring.[116]

See the rest here:
United States diplomatic cables leak - Wikipedia, the free ...

Wikileaks Mirrors – About

Home About

This site is not affiliated with Wikileaks. It is hosted on a different server, uses different DNS servers, a different registrar and has a different owner. So if Wikileaks is not reachable any more (due to technical or due to legal reasons), you can try different links from this site.

The domain wikileaks.info played an important role in the early stages of Wikileaks. As it was abandoned by its owner in May 2009, we picked it up to use it for the cause of Wikileaks.

If you have knowledge of more mirrors or cover sites, let us know and we will list them here. If a site is offline for several weeks, we will de-list it.

We also host a mirror of the old leaks (2006-2010) at mirror.wikileaks.info. As this is a static copy, the dynamic links (like search) don't work, but you can get to many of the old leaks.

On Saturday 11-Dec-2010 at 4:00 AM, the original domain - wikileaks.org - was redirected to our mirror.wikileaks.info site, which resulted in over 1 Million hits a day. As a consequence we had to move to a faster host.

On On 25-May-2011, the domain wikileaks.org was switched back to its original site (currently hosted at OVH in France).

On On 13-August-2012, the Wikileaks.org domains started to route through the Cloudflare proxy system in order to sustain a continued DDOS attack. Many of the mirrored domains that haven't updated their DNS are not working due to that change.

Although there is no direct connection, the Wikileaks core team is aware of us, as you can see in this tweet on their official Twitter channel.

Questions? - Write to [emailprotected] Last change: 30-March-2015

See the rest here:
Wikileaks Mirrors - About

Edward Snowden fans mistweet Toronto woman | Toronto Star

Sarah Snowdon has had hundreds of strangers thank her online over the last few days. Every time she refreshes Twitter, she says, she has at least five new mentions, mostly people praising her courage and conviction.

Those strangers might want to double-check their spelling though, because theyre actually trying to thank renowned whistleblower Edward Snowden.

When Snowden joined Twitter on Tuesday afternoon, he was quickly greeted by a million followers and global media coverage. He also chose the simple handle of @snowden. Sarah Snowdon had a similar idea when she joined Twitter in 2008, taking the handle @snowdon.

Theyre saying, Im so glad @snowdon is on Twitter. Hes my hero. Some [other] people are confused, Sarah Snowdon said.

Though Edward Snowden has had a small but steady stream of negative tweets directed at him, the tweets at Sarah Snowdon have been mostly positive, she said. For now, shes just watching it happen, and not correcting anybody.

I havent responded. I think I retweeted one guys tweet because it was really funny, she said.

Its not the first time her Twitter handle has been the source of confusion, either. Shes been occasionally confused for Snowden before, but before Tuesday she was more often mistaken for Mount Snowdon, the highest mountain in Wales. Snowdon the person regularly gets tagged in pictures of hikers who have made the ascent up the British landmark.

Theyre always tweeting at me, either because they think Im Edward Snowden, or they think Im Mt. Snowdon Im used to it now, she said.

The extra attention hasnt been annoying, she said, though she does hope the surge of tweets dies down after a few days.

I think its hilarious. I really respect Edward Snowden, so I think its great Im glad hes on Twitter, she said.

Edward Snowden previously considered joining Twitter on Sept. 25, in an interview with astrophysicist Neil deGrasse Tyson. During the interview, Tyson suggested Snowden join the social network.

I tried to find you on Twitter. Whats your handle? Tyson asked.

I dont actually have one yet, he responded.

You need a Twitter handle. @snowden maybe? Tyson suggested.

Link:
Edward Snowden fans mistweet Toronto woman | Toronto Star

Twitter Comedian Pranks HLN, Talks About Edward Scissorhands …

Edward Snowden supporter and Twitter comedian Jon Hendren went on HLNto talk about Snowden's decision to join Twitter and ended up talking about Edward Scissorhands.

In the beginning of the interview Hendren spoke about Snowden being a hero, but soon switched to a conversation about Edward Scissorhands.

"To cast him out, to make him invalid in society, simply because he has scissors for hands," said Hendren with a straight face, "I mean thats strange."

HLNanchorYasmin Vossoughiandidn't object toHendren or appear to notice what he was doing. Hendren continued, "People didnt get scared until he started sculpting shrubs into dinosaur shapes and whatnot."

Vossoughianwent on to ask Hendren about Snowden seeking asylum in Russia. Hendren said that casting him out is wrong. "Were treating him like an animal, like somebody who should be quarantined and put away. Just because he was created on top of a mountain by Vincent Price, incomplete with scissors for hands and no heart, uh, Edward Scissorhands is a complete hero to me."

Still not responding, Vossoughianpressed Hendren to talk about Snowden's decision to go to Russia, a place known for abusing human rights.

"I mean, where else is he going to go? You know?" said Hendren. "We cast him out. We got scared when he poked a hole in a waterbed with his scissor finger, and that was just unreasonable of us."

Here is the original post:
Twitter Comedian Pranks HLN, Talks About Edward Scissorhands ...

Whistleblower Edward Snowden Joins Twitter, Follows The One …

Edward Snowden has joined Twitter. 7 tweets and 855K followers later, he has given the world the perfect thing to talk about. The account he follows: The National Security Agency.

Forbes

We all know why this ex-CIA employee became America's favourite traitor. After blowing the whistle on the NSA - wherein he revealed classified surveillance programs - he has since been in asylum, currently in Russia.

For some he's a hero, for others he's a patriot and many other consider him a traitor. He has been interviewed via video links several times already, and he continues to do so from an undisclosed location.

But now, his glorious arrival on Twitter puts him in direct contact with the public, and his first tweet is a perfect celebration of it:

And within half-an hour of this tweet, Twitterverse exploded. While some welcomed him, others bombarded him with questions like:

Snowden's response couldn't be better:

Not even God himself could resist the urge to welcome Snowden aboard:

But the one account that he follows has caught everyone's fancy. As per the Intercept, the handle @Snowden was discussed for three years before its ownership was officially handed to the whistleblower.

Snowden's Twitter bio reads: "I used to work for the government. Now I work for the public"

If you haven't already followed him, do it now! Trust us, Snowden's one handle you wouldn't want to miss!

Follow this link:
Whistleblower Edward Snowden Joins Twitter, Follows The One ...

If Edward Snowden Is Right About Clinton’s Emails, Bernie …

Perhaps nobody on the planet knows more about intelligence protocol than Edward Snowden. If Snowden says it's "completely ridiculous" to believe that Clinton's emails were safe, then yes, it's fair to include his viewpoint in any critique of Hillary Clinton's latest controversy. In addition, since I believe Senator Bernie Sanders is desperately needed at this point in U.S. history, and electing Clinton or a Republican would essentially be nominating the same president on war and foreign policy, it's important to address relevant analysis of the email controversy.

There seems to be a bizarre paradigm of thought among some Democrats that prevents any scandal associated with Hillary Clinton from being a part of debate or discussion. When Anthony Weiner questioned the legitimacy of Sanders running as a Democrat, or when Senator Claire McCaskill attacked Bernie for being "too liberal" and "extreme," ironically there was never any uproar or indignation among those who claim to support unity among progressives.

Just recently, a pro-Clinton super PAC tried to link controversial statements made by Hugo Chavez to Bernie Sanders. Also, let's not bring up Hillary Clinton's 2008 campaign against Barack Obama. If you don't think Clinton's 3 AM ad in 2008 contained a "racist sub-message," then read the analysis of a Harvard sociologist and remember the viewpoint ("black people are incensed over all of this") of South Carolina's James Clyburn.

Therefore, since we know that some Clinton supporters have no qualms about comparing Bernie Sanders to a Fox News socialist or even linking him to Hugo Chavez, let's simply address reality while others genuinely "go negative." The reality is that other intelligence experts have come to the same conclusion as Snowden.

However, even before the email issue, it's important to note why Sanders will defeat Clinton even without a breakthrough from the FBI or CIA.

One look at the Huffpost Pollster interactive chart shows why Sanders will win the Democratic nomination and the presidency. This election will be about polling trajectory and nothing else, when it comes to analyzing public opinion. Without billionaire donors and simply with a grass roots effort, Bernie Sanders has gone from 4% support on January 12, 2015 to 27.5% on September 27, 2015. No, Sanders doesn't need to go negative on anyone. Stating the obvious, however, isn't negative. If Bernie Sanders can get to 7 points within Clinton, without an official statement from the FBI about Clinton's emails being a threat to national security, then imagine if Snowden is correct.

What if Edward Snowden is correct to believe that it's "completely ridiculous" to think Clinton's emails were safe? If this is true, then it's feasible to foresee a breakthrough in the FBI investigation. Yes, it's logical to assume that national security was jeopardized if Snowden and others feel Clinton was reckless with her intelligence protocol. We're then looking at a Bernie Sanders landslide victory in the Democratic primaries.

Edward Snowden isn't part of a GOP conspiracy and has no incentive other than to illustrate a relevant viewpoint, when he addressed Clinton's private emails and server. I have no incentive to write this piece other than to highlight a key distinction between two Democratic candidates. Also, I am voting only for Senator Bernie Sanders and nobody else.

In addition, the person weighing in on this topic is more than just an expert on intelligence and national security issues. First, Snowden is a whistleblower who fostered a national discussion about domestic spying. His actions weren't treason, resulted in "needed transparency" and we've had a national debate about civil liberties and the Bill of Rights because of his actions. Furthermore, if Clinton can store classified and "Top Secret" emails (whether or not many were retroactively classified is irrelevant, there were also "born classified" emails) and the FBI owns the server of a presidential candidate, then as I've advocated, bring Snowden home.

Yes, Bernie Sanders will win the presidency because of his bold message and policies, but since Clinton's PAC's and supporters will inevitably fabricate a narrative about Sanders, the least any writer can do is simply state the facts. A POLITICO article titled Snowden: No way Hillary's private server was secure highlights why the Democratic Party should be concerned about Hillary Clinton in a general election:

Edward Snowden blasted Hillary Clinton's assertion that her State Department emails were secure on a private server, calling the notion "completely ridiculous" in excerpts of an interview with Al Jazeera English published Thursday.

"When the unclassified systems of the United States government, which has a full-time information security staff regularly gets hacked, the idea that someone keeping a private server in the renovated bathroom of a server farm in Colorado, is more secure is completely ridiculous," Snowden said, referring to the physical location of the server hosted by Denver-based Platte River Networks.

Simply claiming something is legal doesn't make it right, and Snowden goes on to say that if anyone acted like Clinton, "they would not only lose their jobs and lose their clearance, they would very likely face prosecution for it."

In my analysis of 2016, I've tried my best to make relevant distinctions between Sanders and Clinton. In my recent appearances on Ring of Fire and The Benjamin Dixon Show, I highlight why Clinton had essentially been a Republican on issues ranging from war and foreign policy to gay marriage, Keystone XL, the TPP, and other topics. As for my views on foreign policy, I've also appeared on Ring of Fire to discuss my thoughts on Dick Cheney and Jeb Bush.

With Snowden's commentary of Hillary Clinton's email practices, however, my opinions on politics take a backseat to the potential of a president who can't type an email without a nationwide scandal. You might think Hillary Clinton would make a fine president, but you can't say Edward Snowden doesn't know anything about intelligence protocol.

Another article in The Hill titled Snowden: Clinton's email server 'a problem', highlights Snowden's belief of why Clinton failed to keep intelligence secure:

"This is a problem because anyone who has the clearances that the secretary of State has, or the director of any top level agency has, knows how classified information should be handled," he said, according to excerpts of an Al Jazeera interviewairing Friday.

"If an ordinary worker at the State Department or the Central Intelligence Agency ... were sending details about the security of the embassies, which is alleged to be in her email, meetings with private government officials, foreign government officials and the statements that were made to them in confidence over unclassified email systems, they would not only lose their jobs and lose their clearance, they would very likely face prosecution for it," he added.

Therefore, Clinton's email server, at least according to one of the top experts on the planet pertaining to intelligence protocol, is "a problem." It's also an issues because unlike the excuse of "convenience," top officials know exactly how "classified information should be handled."

As for Snowden's comments, don't think Democratic superdelegates and party officials aren't worried about the email issue. A New York Times article titled Hillary Clinton's Handling of Email Issue Frustrates Democratic Leaders explains why the DNC is already worried:

Democratic leaders are increasingly frustrated by Hillary Rodham Clinton's failure to put to rest questions about her State Department email practices...

Interviews with more than 75 Democratic governors, lawmakers, candidates and party members have laid bare a widespread bewilderment that Mrs. Clinton has allowed a cloud to settle over her candidacy -- by using a private email server in the first place, since it was likely to raise questions about her judgment, and by not defusing those questions once and for all when the issue first emerged in March.

To simply say that nobody is concerned about this ignores the reality that leaders within the Democratic Party know that deleted emails could doom a general election.

Not everything is "Benghazi." Hillary Clinton is competing against Bernie Sanders for the Democratic nomination and a genuine distinction should be made, not just on issues, but on character. If you feel that Clinton's stances on war, foreign policy, and gay marriage warrant the presidency, then you might be a "Facebook liberal." As for me, I'm voting for Bernie Sanders. He doesn't need a Clinton scandal to win the Democratic nomination, but he will win the nomination in a landslide of Edward Snowden is correct.

Read this article:
If Edward Snowden Is Right About Clinton's Emails, Bernie ...

Military approves hormone treatment for WikiLeaks source …

WASHINGTON Defense Department officials said Thursday that hormone treatment for gender reassignment has been approved for Chelsea Manning, the former intelligence analyst convicted of espionage for sending classified documents to the WikiLeaks website.

The officials said the hormone therapy was approved Feb. 5 by Col. Erica Nelson, commandant of the U.S. Disciplinary Barracks at Fort Leavenworth, Kan., where Manning is serving a 35-year sentence.

The treatment would enable the Army private formerly known as Bradley Manning to make the transition to a woman. Manning changed her legal name in April 2014.

The officials were not authorized to discuss the matter publicly and spoke on condition of anonymity. The memo approving Mannings hormone treatment was first reported by USA Today.

Calls to military officials at Fort Leavenworth werent immediately returned.

The decision came after a lawsuit was filed in September in U.S. District Court for the District of Columbia. It alleged Manning was at a high risk of self-castration and suicide unless she received more focused treatment for gender dysphoria, the sense of being a woman in a mans body.

The Army was providing some treatment but not enough, according to the lawsuit, including psychotherapy from a mental health specialist who lacked the qualifications to treat gender dysphoria. The Federal Bureau of Prisons and many state and local corrections agencies administer hormone therapy to prisoners with gender dysphoria, but Manning is the first transgender military prisoner to request such treatment.

Such clear disregard of well-established medical protocols constitutes cruel and unusual punishment, ACLU attorney Chase Strangio said in September. Outgoing Defense Secretary Chuck Hagel had approved medical treatment in August, but it hadnt started by the time the ACLU filed the lawsuit.

The 26-year-old former intelligence analyst was convicted in August 2013 of espionage and other offenses for sending more than 700,000 classified documents to WikiLeaks while working in Iraq.

Transgender people are not allowed to serve in the U.S. military, but Manning cant be discharged from the service while serving her prison sentence.

Link:
Military approves hormone treatment for WikiLeaks source ...

George Pataki calls for Twitter to ban Edward Snowden …

Hours after the man who achieved international notice for leaking thousands of National Security Agency documents joined Twitter, Republican presidential candidate and former New York Gov. George Pataki called on the social network to revoke Snowden's account.

"Twitter is a great American company that should not give a platform to terrorists or traitors -- @Jack shutdown @Snowden today," the former New York governor tweeted at Twitter cofounder and CEO of Twitter, Jack Dorsey.

Pataki also called Snowden "a traitor who put Americans at risk, hides in Russia and belongs behind bars."

Pataki's comments caught the attention of Glenn Greenwald, one of the journalists who received and published reports based on the leaked documents. Greenwald mocked Pataki, tweeting, "Hi, I'm running for President. My support in all polls is an asterisk. And I'm here to say who should and shouldn't be allowed on Twitter."

For his part, Dorsey welcomed Snowden to Twitter.

As of this writing Snowden has over 680,000 followers on Twitter.

Read more here:
George Pataki calls for Twitter to ban Edward Snowden ...

Edward Snowden joins Twitter, immediately gets more followers …

Edward Snowden, the fugitive who exposed the mass-surveillance practices at the National Security Agency, is now on Twitter, and he already has more followers on the social network than the NSA.

His account, which has been verified by Twitter as authentic, isn't hard to find: It's @Snowden. His attorney, Ben Wizner of the American Civil Liberties Union, confirmed to the Los Angeles Times that Snowden himself controls the account.

Snowden gained almost 300,000 followers in less than two hours after he tweeted his first message Tuesday morning. Soon after, he posted a cheeky swipe at his former employer, the NSA, whose account only has 76,000 followers. (The NSA is also the only Twitter account that Snowden follows.)

See the most-read stories this hour >>

The NSA did not immediately respond to The Times request for comment about Snowden, a former contractor for the agency who has been granted asylum in Russia to avoid espionage and theft charges in the U.S. related to his 2013 leaks. But Twitter's interim chief executive, Jack Dorsey, responded to Snowdens first tweet:

Dorsey's welcome is not an outlier. Although Snowden is officially a wanted man in the eyes of the U.S. Justice Department, his voice has been repeatedly amplified by America's most esteemed mass-media institutions.

After the Guardian and the Washington Post published a series of stories about NSA's surveillance practices based on Snowden's disclosures, judges awarded both outlets Pulitzer prizes.

After documentarian Laura Poitras created a film about Snowden's leaks, "Citizenfour," the Academy of Motion Picture Arts and Sciences gave her an Oscar for best documentary. Snowden's story will also be featured in a major Hollywood movie, "Snowden," starring Joseph Gordon-Levitt and directed by Oliver Stone.

Twitter, one of Silicon Valley's most popular social-media companies, accommodated Snowden's wish to join Twitter by clearing out an old account that had claimed the @Snowden handle but had not tweeted for three years, according to The Intercept.

A Twitter spokesman did not immediately respond to an interview request from The Times seeking more information about the company's decision to give Snowden the blue "verified" checkmark given to public figures and celebrities.

NEWSLETTER:Get the day's top headlines from Times Editor Davan Maharaj >>

Twitter's policies forbid users from using the service "for any unlawful purposes or in furtherance of illegal activities," which implies the company believes that Snowden using its service while avoiding prosecution doesn't constitute a crime. (U.S. Army whistleblower Chelsea Manning also has a verified Twitter account, which is reportedly remotely operated by supporters who relay Manning's messages from prison.)

Snowden himself noted that the government would likely be interested in his presence on Twitter with an allusion to Ft. Meade, Md., the home of the NSA.

Snowden's choice to join Twitter was also notable for security reasons, given that he has shown how the NSA's broad collection of Americans' personal information was made possible by cooperation with the tech and communications companies that often hold that information.

Twitter's terms of service note that the company may collect a user's "IP address, browser type, operating system, the referring web page, pages visited, location, your mobile carrier, device information (including device and application IDs), search terms, and cookie information."

In a recent interview with Fusion, Snowden noted that he was worried about joining social-media services for security reasons.

"Exploit codes [could be embedded] into the transactions Im receiving from a legitimate service and compromise the security of my devices. Ive been working for a long time on improving that and creating set-ups that are more robust and survivable when you do get owned," Snowden told Fusion, adding: "How do you limit the damage? How do you recover in the wake of a compromise? Ive made a lot of strides in that and am looking forward to, hopefully, participating [on social networks] in a more open and active manner in the near future."

One of the tipping points appears to be a recent interview that Snowden conducted with celebrity astrophysicist Neil DeGrasse Tyson.

"I tried to find you on Twitter, and I couldn't find your handle ... you kind of need a Twitter handle, so like, @Snowden, maybe, is this something you might do?" Tyson asked Snowden.

"That sounds good, I think we gotta make it happen," Snowden replied, laughing. "You and I will be Twitter buds ... your followers will be the Internet, me and the NSA, it'll be great."

And sure enough, one of Snowden's first tweets was directed at Tyson, with a nod toward the recent discovery of water on Mars.

Follow @MattDPearce for national news

ALSO:

NSA leaker Edward Snowden seeks return to U.S., on his terms

Edward Snowden schools John Oliver in the art of password-making

'Citizenfour' on Edward Snowden records a gripping moment in history

See the original post:
Edward Snowden joins Twitter, immediately gets more followers ...