Edward Snowden | euronews

The NSA, or National Security Agency, is one of 15 intelligence agencies in the US and is responsible for protecting and encrypting confidential government communications. It is also in charge of the collection, encoding and transmission of all types of electronic messages coming from foreign countries. According to the agencys website the missions they carry out are consistent with U.S. laws and the protection of privacy and civil liberties

The NSA was created by former president Harry Truman at the height of the Cold War in 1952. It was born out of the reorganisation of the military agency AFSA (Armed Forces Security Agency) which combined Navy and Air Force encoding techniques. For several years it remained a secret agency, to the point that American journalists nicknamed it No Such Agency.

The NSAs exact figures and turnover are classified but the latest estimations by the CSBA, an American NGO concerned with defense strategies and military questions, attribute the NSA with a budget of 10 billion dollars.

PRISM is the programme that enables the NSA to gather and carry out research using data or rather, metadata - issued by nine Internet companies that are used daily by millions of people the world over: Microsoft; Google; Yahoo!; Facebook; Youtube; Skype; AOL; Apple; and PalTalk. The NSA does not so much examine the site, as survey each sites content: who is talking to whom; from when; where; using which software; on which theme; IP addresses visited, etc. Authorised by federal judges responsible for overseeing the use of the Foreign Intelligence Surveillance Act (FISA), the collection of this type of data does not require a mandate.

NSA employees working on specific targets dont only use PRISM. One of the documents provided by Edward Snowden and published in the Washington Post draws attention to Upstream, a programme which gathers data from wire tapping: both inside fibre optic wires and other information infrastructure.

One of the principal research practices used by PRISM and Upstream is the use of a simplified version of the theory of six degrees of separation. According to The Guardian, this has been reduced to two degrees. This means the NSA are authorised to study the data of somebody who is conversing with another person who is in contact with one of their targets.

During an assignment, the NSA must only survey communication coming from abroad and an analysts choice to add another target must be founded on reasonable belief. Analysts are required to be 51 percent certain that the target is a foreign citizen who is outside of the USA at the time the information is collected. This definition is sufficiently vague to cause a debate.

Edward Snowden is a 30-year-old American IT engineer who lived in Hawa before taking refuge in Hong Kong in May, followed by Russia in June. He worked at the Central Intelligence Agency (CIA), then left to work at the NSA in 2009. There, he worked for different NSA subcontractors such as Dell and Booz Allen Hamilton.

In a Guardian interview from his hideout in Hong Kong, Snowden explained that his decision to reveal the information was neither a sudden decision, nor one designed to harm the US, claiming that America is a fundamentally good country. Furthermore, he claimed to have held on to the information, without divulging it, from 2008 until now, in the hope that the Obama administration would correct the excesses of government. But the Obama administration has allegedly continued in the same vein.

Read more:
Edward Snowden | euronews

US Army says Chelsea Manning must keep her hair cut to …

By Kiri Blakeley For Dailymail.com

Published: 18:27 EST, 19 September 2015 | Updated: 20:41 EST, 19 September 2015

175 shares

24

View comments

Army whistleblower Chelsea Manning must continue to wear her hair like a man, says the Army, according to Manning.

'Bad news for me,' Manning, 27, tweeted on Friday. 'Military continues to make me cut my hair to male standards - I'm going to fit in court.' Manning is able to tweet through third parties.

The former intelligence analyst, who was born Bradley Manning, is serving a 35-year sentence at the United States Disciplinary Barracks at Ft. Leavenworth, Kansas, for providing almost 750,000 sensitive documents related to the U.S. wars in Iraq and Afghanistan to WikiLeaks.

Scroll down for video

Transgender imprisoned soldier Chelsea Manning (above) wants to grow long hair to fit her female identity, but the Army hasn't so far allowed it

Manning broke the news to her followers on Twitter (above) that the Army would continue to make her wear her hair like a man

The above portrait was done by artist Alicia Neal in cooperation with Chelsea, commissioned by the Chelsea Manning Support Network, and titled 'How Chelsea Sees Herself'

Manning, who is transgender, was born male but identifies as female. She was recently spared solitary confinement when she was caught with the Vanity Fair issue with another famous transgender woman in the cover, Caitlyn Jenner.

The military has agreed to allow Manning access to hormone therapy, speech therapy and cosmetics, but ruled on Friday that Manning must continue to cut her hair to 'military standards.'

'Even though the military agrees that allowing Chelsea to grow her hair is a critical part of her treatment plan, they continue to deny her basic human and constitutional rights,' ACLU attorney Chase Strangio said in a statement, according to the Huffington Post.

Manning (above, as Bradley) said two days after her sentence that she wanted to live like a female

In April, Strangio told Cosmopolitan magazine: 'Her fight continues because the government is needlessly prohibiting her from growing her hair, which will continue to cause her significant anxiety.'

In August, Manning lost recreational rights when she was caught with Vanity Fair and an issue of Cosmopolitan that contained an interview with her.

Manning told Cosmo that it is 'painful and awkward' to be forbidden from letting her hair grow. 'I am torn up,' she said. I get through each day okay, but at night, when I'm alone in my room, I finally burn out and crash.'

Manning also recently gave an interview to Paper magazine, in which she said she does not consider herself a 'radical.'

'I believe that we are just at the very beginning of a new epoch,' she told the magazine.

'I think that with ubiquitous and total access to highly connected information technology... we are slowly beginning to blur the lines between the concepts that have seemed so separate for generations, such as the relationships between gender, sexuality, art and work.'

Original post:
US Army says Chelsea Manning must keep her hair cut to ...

NSA whistleblower Edward Snowden says aliens could be …

By Sarah Griffiths for MailOnline and Ellie Zolfagharifard For Dailymail.com

Published: 05:47 EST, 21 September 2015 | Updated: 06:27 EST, 21 September 2015

436 shares

152

View comments

Many of us believe in aliens and that they may be trying to communicate across the universe.

But what if we are unable to decode their messages?

NSA whistleblower Edward Snowden told Neil deGrasse Tyson he thinks aliens encrypt their communications and we dont have the ability to detect or decode them.

NSA whistleblower Edward Snowden (stock image) says aliens could be trying to contact us on Earth, but we may never detect them because their messages are likely encrypted so we unable to spot them

Snowden was a guest on the astrophysicists StarTalk podcast and spoke via video link from Moscow.

He said: If you look at encrypted communication, if they are properly encrypted, there is no real way to tell that they are encrypted.

Snowden explained that if aliens exist and they are intelligent, they will already be encrypting their communications, meaning humans may miss out on detecting them, let alone decoding their content

Snowden said:When we think about everything we're hearing through our satellites (stock image) and everything that they're hearing from our civilisation ... all of their communications are encrypted by default so what we are hearing ... is indistinguishable to us from cosmic microwave background radiation

You can't distinguish a properly encrypted communication from random behaviour.

Snowden was a guest on Neil deGrasse Tyson's StarTalk podcast and spoke via video link from Moscow. A file image of the astrophysicist is shown

He explained that if aliens exist and they are intelligent, they will already be encrypting their communications, but this means, if you have an alien civilisation trying to listen for other civilisations, or our civilisation trying to listen to other aliens, there's only one small period in the development of their society when all of their communications will be set at the most primitive and unprotected means.

He pointed out that perfectly encrypted messages wouldnt be detected by a security agency looking for such communications, and would instead seem like background noise.

Therefore aliens may be communicating but humans are deaf to any messages being broadcast.

When we think about everything we're hearing through our satellites and everything that they're hearing from our civilisation - if there are indeed aliens out there - all of their communications are encrypted by default so what we are hearing that's actually an alien television show or a phone call or a message between their planet and their own GPS constellation (or whatever it happens to be), is indistinguishable to us from cosmic microwave background radiation, he said.

Tyson said: You're assuming they [aliens] have the same security issues that we have here on Earth, to which Snowden replied: Maybe they're a little more enlightened'.

Snowden is not the only person who believes aliens may be trying to make contact with us, but we are unable to hear them.

Dr Nathalie Cabro (pictured right), who is leading the hunt for alien life at the Seti Institute has previously said we could be oblivious to their messages from aliens, because humanity is not yet able to pick up the signals. Pictured on the left is the Parkes Radio Telescope that has picked up strange radio bursts from space

Dr Nathalie Cabrol, who is leading the hunt for alien life at the Seti Institute in California, told MailOnline that while in our lifetime we'll find simple alien organisms close to Earth and a replica of our planet in another galaxy, detecting intelligent life may not be as easy because of our limited view of the universe.

'If there is a civilisation out there that is only 1,000 years older than we are, who knows what type of technology, or what type of process, theyve put into communicating with others,' she said.

'Were just scratching the surface here. Were looking at the universe from our own standpoint.

'We tend to ask questions in the way we do. But what kind of thought process an alien civilisation may have, we really dont know.'

Dr Nathalie Cabrol was recently appointed as the lead for the Seti Institute multidisciplinary research programmes into the search for life beyond Earth. She currently heads the Institutes Carl Sagan Centre for the Study of Life in the Universe and is confident we will detect alien organisms close to Earth in our lifetime

In their hunt for alien life, astronomers have so far focused on looking for Earth-like planets around smaller, cooler suns.

But these exoplanets - despite having a chance of holding water - are believed to be locked in a rotation around their sun which causes only one side of their surface face the star.

Now astronomers claim that such exoplanets actually rotate around their stars, and spin at such a speed that they exhibit a day-night cycle similar to Earth increasing the chance of finding alien life.

Planets with potential oceans could have a climate that is much more similar to Earth's than previously expected,' said Jrmy Leconte, a postdoctoral fellow at the Canadian Institute for Theoretical Astrophysics (CITA) at the University of Toronto.

'If we are correct, there is no permanent, cold night side on exoplanets causing water to remain trapped in a gigantic ice sheet,' he said.

'Whether this new understanding of exoplanets' climate increases the ability of these planets to develop life remains an open question.'

Currently, the search for ET is based on picking up optical and radio signals.

For instance, earlier this year, scientists picked up a series of mysterious pulsing signals coming from outside our solar system.

Known as Fast Radio Bursts (FRBs), just 10 of these signals have been discovered to date.

Dr Cabrol says searching for radio signals is just one of the ways we may be able to pick up alien life.

'We are hoping that ET has done the same thing as us, but there are other ways,' she said.

'Some people have talked about ET technology, sending vessels or robots in space.

'We have to rely a bit on our imagination right now to figure out what ET will be doing, and not being afraid to develop new research avenues as well.'

One of the ways we may be able to spot alien civilisations is through the destruction of their own planet, she says.

'Seti is, at this moment in time, about radio astronomy, and optical. But its also about what a civilisation does to its environment as it grows older.

'We are somewhat advanced, but we are a teenage civilisation. We are playing with toys and technologies but we dont know the rules very well yet.

Her views echo that of former astronaut, John Grunsfeld, who earlier this year said if aliens are out there, they already know we exist.

He said an advanced alien civilisation may spot humans from afar from the changes we've made to Earth's environment.

Former astronaut, John Grunsfeld (pictured), says that an advanced alien civilisation may spot humans from afar from the changes we've made to Earth's environment. 'We put atmospheric signatures that guarantee someone with a large telescope 20 light years away could detect us,' he claims

'We put atmospheric signatures that guarantee someone with a large telescope 20 light years away could detect us,' said Grunsfeld at the Astrobiology Science Conference in Chicago.

'If there is life out there, intelligent life, they'll know we're here.'

In April, Nasa's chief scientist Ellen Stofan said we could find evidence of extraterrestrial life in 20 to 30 years.

'We know where to look, we know how to look, and in most cases we have the technology.'

Jeffery Newmark, interim director of heliophysics at the agency, added: 'It's definitely not an if, it's a when.'

Stofan added: 'We are not talking about little green men.We are talking about little microbes.'

The rest is here:
NSA whistleblower Edward Snowden says aliens could be ...

Edward Snowden held a secret chat with the actor …

Many actors in biographical movies will interview the real people they're portraying to get a feel for their mannerisms and values. However, Joseph Gordon-Leavitt is going the extra mile to make sure that he's correctly representing NSA whistleblower Edward Snowden in Oliver Stone's upcoming movie. The star has revealed to The Guardian that he held a secret, four-hour meeting with Snowden in Russia to understand the fugitive. How secret? Gordon-Leavitt was not only advised to avoid recording the conversation, but (for a while) to avoid even acknowledging that it took place -- not surprising when the US likely wants to watch Snowden's every move.

Gordon-Leavitt isn't saying a lot about what happened during the chat, but he believes that Snowden acted out of a genuine concern that American mass surveillance was going too far. There's no guarantee that the sit-down will lead to a truly accurate movie, of course. You've probably seen at least a few "based on a true story" dramas that take a lot of poetic license, some of them from Stone himself (see the controversy over JFK's conpsiracy-laden plot). Still, it hints that the movie producers are making at least some effort to faithfully depict Snowden and the motivations behind his leaks.

[Image credit: Michael Buckner/Getty Images for Motion Picture & Television Fund]

Follow this link:
Edward Snowden held a secret chat with the actor ...

WikiLeaks Case: Pvt. Bradley Mannings’s Alleged Role in …

In his Army dress greens, Pvt. Bradley Manning looks like most of his fellow soldiers; but beneath the uniform, many suspect, is a man who may be responsible for the leaking of over 90,000 secret military reports to the whistleblower website WikiLeaks.

Manning was stationed at a base 40 miles east of Baghdad, at Forward Operating Base Hammer. Manning, who enlisted in the Army in 2007, was working as an Army intelligence analyst, pouring through classified information. What he saw with his clearance level, it is believed, left him disillusioned with U.S. foreign policy.

Manning allegedly asked Lamo, "If you had unprecedented access to classified networks 14 hours a day, seven days a week for eight plus months, what would you do?"

Authorities believe Manning had already done plenty.

Manning allegedly said that he had discovered "incredible, awful things that belonged in the public domain and not on some server stored in a dark room in Washington, D.C."

The young soldier wrote of how he downloaded the classified information.

"I would come in with music on a CD-RW labeled with something like 'Lady Gaga'," he told Lamo.

While pretending to sing along to Lady Gaga's hit "Telephone," Manning would actually be erasing the music from the CD and recording intelligence onto it instead.

Lamo says weak computer security let the disgruntled soldier copy confidential military reports that would soon be part of one of the greatest leaks of government information in 40 years.

ABC News talked with Lamo, the hacker on the other end of the online conversations with Manning.

"Yes, that is how he would do it," Lamo said. "Faking he was listening to Gaga."

During all of this, Manning also wrote to Lamo of feeling socially isolated and at times, getting in trouble with his supervisors as he questioned the course of the wars in Iraq and Afghanistan.

Lamo said he grew increasingly alarmed. When Manning claimed to have a quarter million classified embassy cables, Lamo went to the FBI fearing that the soldier's leaks could put lives at risk.

"Had I not acted, I would have always wondered, had I gotten someone killed," Lamo said.

Manning was arrested in May of this year and is being held in Kuwait. He has been charged with releasing classified information.

Wikileaks founder Julian Assangeto refuses to confirm Manning's involvment in the massive leak.

See the original post:
WikiLeaks Case: Pvt. Bradley Mannings's Alleged Role in ...

Edward Snowden: we may never spot space aliens thanks to …

Former intelligence contractor Edward Snowden says encryption could get in the way of any communication with aliens. Photograph: Frederick Florin/AFP/Getty Images

Related: Joseph Gordon-Levitt: Snowden is a patriot

The US government whistleblower Edward Snowden believes encryption might make it difficult or even impossible to distinguish signals from alien species from cosmic background radiation.

On Friday night, Snowden appeared from Moscow on the astrophysicist and science communicator Neil deGrasse Tysons StarTalk podcast, via a robot video link called a beam remote presence system.

In 2013, after leaking documents on National Security Agency surveillance to media outlets including the Guardian, and under threat of US prosecution under the Espionage Act, Snowden sought asylum in Russia.

In a candid interview with Tyson, Snowden said he signed up for the US army following the terrorist attacks of 11 September 2001.

It took a very long time for me to develop any kind of skepticism at all even to the most over-extended claims of the extension of programs or policies [by the US security services], he said.

The conversation turned to the possibility that data encryption might be making it harder to intercept communications from aliens.

Related: The Edward Snowden story - from inside the Guardian

If you look at encrypted communication, if they are properly encrypted, there is no real way to tell that they are encrypted, Snowden said. You cant distinguish a properly encrypted communication from random behaviour.

Therefore, Snowden continued, as human and alien societies get more sophisticated and move from open communications to encrypted communication, the signals being broadcast will quickly stop looking like recognisable signals.

So if you have an an alien civilization trying to listen for other civilizations, he said, or our civilization trying to listen for aliens, theres only one small period in the development of their society when all their communication will be sent via the most primitive and most unprotected means.

After that, Snowden said, alien messages would be so encrypted that it would render them unrecognisable, indistinguishable to us from cosmic microwave background radiation. In that case, humanity would not even realise it had received such communications.

Only, Tyson replied jovially, if they have the same security problems as us.

Original post:
Edward Snowden: we may never spot space aliens thanks to ...

encryption – WIRED

Slide: 1 / of 2 .

Caption: Original illustration: Getty

Slide: 2 / of 2 .

Caption: A screenshot from an early demo of miniLock.

Encryption is hard. When NSA leaker Edward Snowden wanted to communicate with journalist Glenn Greenwald via encrypted email, Greenwald couldnt figure out the venerable crypto program PGP even after Snowden made a 12-minute tutorial video.

Nadim Kobeissi wants to bulldoze that steep learning curve. At theHOPE hacker conference in New York later this month hell release a beta version of an all-purpose file encryption program called miniLock, a free and open-source browser plugin designed to let even Luddites encrypt and decrypt files with practically uncrackable cryptographic protection in seconds.

The tagline is that this is file encryption that does more with less, says Kobeissi, a 23-year old coder, activist and security consultant. Its super simple, approachable, and its almost impossible to be confused using it.

Kobeissis creation, which he says is in an experimental phase and shouldnt yet be used for high security files, may in fact be the easiest encryption software of its kind. In an early version of the Google Chrome plugin tested by WIRED, we were able to drag and drop a file into the program in seconds, scrambling the data such that no one but the intended recipientin theory not even law enforcement or intelligence agenciescould unscramble and read it. MiniLock can be used to encrypt anything from video email attachments to photos stored on a USB drive, or to encrypt files for secure storage on Dropbox or Google Drive.

Like the older PGP, miniLock offers so-called public key encryption. In public key encryption systems, users have two cryptographic keys, a public key and a private one. They share the public key with anyone who wants to securely send them files; anything encrypted with that public key can only be decrypted with their private key, which the user guards closely.

Kobeissis version of public key encryption hides nearly all of that complexity. Theres no need to even register or log inevery time miniLock launches, the user enters only a passphrase, though miniLock requires a strong one with as many as 30 characters or a lot of symbols and numbers. From that passphrase, the program derives a public key, which it calls a miniLock ID, and a private key, which the user never sees and is erased when the program closes. Both are the same every time the user enters the passphrase. That trick of generating the same keys again in every session means anyone can use the program on any computer without worrying about safely storing or moving a sensitive private key.

No logins, and no private keys to manage. Both are eliminated. Thats whats special, says Kobeissi. Users can have their identity for sending and receiving files on any computer that has miniLock installed, without needing to have an account like a web service does, and without needing to manage key files like PGP.

In fact, miniLock uses a flavor of encryption that had barely been developed when PGP became popular in the 1990s: elliptic curve cryptography. Kobeissi says that crypto toolset allows for tricks that havent been possible before; PGPs public keys, which users have to share with anyone who wants to send them encrypted files, often fill close to a page with random text. MiniLock IDs are only 44 characters, small enough that they can fit in a tweet with room to spare. And elliptic curve crypto makes possible miniLocks feature of deriving the users keys from his or her passphrase every time its entered rather than storing them. Kobeissi says hes saving the full technical explanation of miniLocks elliptic curve feats for his HOPE conference talk.

Despite all those clever features, miniLock may not get a warm welcome from the crypto community. Kobeissis best-known previous creation is Cryptocat, a secure chat program that, like miniLock, made encryption so easy that a five-year-old could use it. But it also suffered from several serious security flaws that led many in the security community to dismiss it as useless or worse, a trap offering vulnerable users an illusion of privacy.

But the flaws that made Cryptocat into the security communitys whipping boy have been fixed, Kobeissi points out. Today the program been downloaded close to 750,000 times, and in a security ranking of chat programs by the German security firm PSW Group last month it tied for first place.

Despite Cryptocats early flaws, miniLock shouldnt be dismissed, says Matthew Green, a cryptography professor at Johns Hopkins University who highlighted previous bugs in Cryptocat and has now also reviewed Kobeissis design spec for miniLock. Nadim gets a lot of crap, Green says. But slighting him over things he did years ago is getting to be pretty unfair.

Green is cautiously optimistic about miniLocks security. I wouldnt go out and encrypt NSA documents with it right now, he says. But it has a nice and simple cryptographic design, with not a lot of places for it to go wrongThis is one that I actually think will take some review, but could be pretty secure.

Kobeissi says hes also learned lessons from Cryptocats failures: miniLock wont initially be released in the Chrome Web Store. Instead, hes making its code available on GitHub for review, and has taken special pains to document how it works in detail for any auditors. This isnt my first rodeo, he says. [MiniLocks] openness is designed to show sound programming practice, studied cryptographic design decisions, and to make it easy to evaluate miniLock for potential bugs.

If miniLock becomes the first truly idiot-proof public key encryption program, it could bring sophisticated encryption to a broad new audience. PGP sucks, Johns Hopkins Green says. The ability for regular people to encrypt files is actually a valuable thing[Kobeissi] has stripped away the complexity and made this thing that does what we need it to do.

Continued here:
encryption - WIRED

The late Boris Nemtsov, Edward Snowden among candidates …

Published September 11, 2015

Parliament members holds posters while European Commission President Jean-Claude Juncker delivers his State of the Union address at the European Parliament in Strasbourg, eastern France, Wednesday, Sept.9, 2015. Juncker called on EU countries to agree by next week to share 160,000 refugees, warning that Greece, Italy and Hungary can no longer cope alone. (AP Photo/Christian Lutz)(The Associated Press)

BRUSSELS Assassinated Russian opposition leader Boris Nemtsov and leaker Edward Snowden are among the candidates later this month for the European Union's top human rights prize.

Nemtsov, a former deputy prime minister turned critic of Russian President Vladimir Putin, was assassinated Feb. 27, 2015, near the Kremlin.

With Russia relations already at a low, the EU legislature said that Nadezhda Savchenko, a Ukrainian pilot currently held in Russia, will also be among the eight candidates presented on Sep. 28 for the Sakharov Prize.

The nominees also include Snowden, the U.S. intelligence leaker who also was among the candidates two years ago.

Previous winners include Nobel Peace Prize laureates Aung San Suu Kyi and Nelson Mandela.

The rest is here:
The late Boris Nemtsov, Edward Snowden among candidates ...

Kristin Lauter – Microsoft Research

Research Manager, Cryptography group

Kristin Lauter is a Principal Researcher andResearch Manager fortheCryptography group at Microsoft Research. She directs the group's research activities in theoretical and applied cryptography and in the related math fields of number theory and algebraic geometry. Her personal research interests include algorithmic number theory, elliptic curve, pairing-based, and lattice-based cryptography, homomorphic encryption, and cloud security and privacy, including privacy for healthcare.

Lauteris currently serving as President of the Association for Women in Mathematics, and on the Council of the American Mathematical Society. She was selected to be a Fellow of the American Mathematical Society in 2014. She is on the Editorial Board forthe Journal of Mathematical Cryptology, Journal of Algebra and Its Applications, and International Journal of Information and Coding Theory. She was a co-founder of the Women In Numbers Network, a research collaboration community for women in number theory, and she serves on the Scientific Advisory Board for BIRS, the Banff International Research Station. Lauter is also an Affiliate Professor in the Department of Mathematics at the University of Washington.She received her BA, MS, and PhD, all in mathematics, from the University of Chicago, in 1990, 1991, and 1996, respectively. She was T.H. Hildebrandt Assistant Professor of Mathematics at the University of Michigan (1996-1999), and a Visiting Scholar at Max Planck Institut fur Mathematik in Bonn, Germany (1997), and at Institut de Mathematiques Luminy in France (1999). In 2008, Lauter, together with her coauthors, was awarded the Selfridge Prize in Computational Number Theory.

Originally posted here:
Kristin Lauter - Microsoft Research

Did Wikileaks founder Julian Assange just defend Hillary …

Hillary Clinton ( AFP PHOTO/NICHOLAS KAMM) and Julian Assange (John Stillwell/Pool Photo via AP)

Hillary Clinton, embattled by the ongoing questions around her e-mailing practices, has received a little compassion from an unlikely source.

Julian Assange, the man who has made it his lifes mission to expose government secrets, suggested Wednesday that Clintons e-mail scandal wouldnt be much of a scandal if the U.S. government wasnt so classify-happy.

Speaking from his room (described to us a converted storage area with a makeshift shower) in the Ecuadorian embassy in London, where he has political asylum over fears hed otherwise be extradited to the U.S, the Wikileaks founder sort of defended Clinton during an interview with New York Public Radio.

People just get into the habit of [classifying things]. Thats something thats happened to a degree with this Hillary Clinton e-mail scandal. Im more or less with Hillary on that.Theres obsessive overclassification, Assange said, according to an early transcript. Its basically because you can get into real trouble as Hillary is seeing for under-classifying. So everyone thinks: Well what trouble can I get in for overclassifying? And if I write top secret on something or secret then maybe people will bother to read it because the classification level means the material is important.

Meanwhile, Clinton, who cant seem to strike the right tone of contrition over her use of a private e-mail for her work-related correspondence as secretary of state and the exchange of classified materials, could use a few more defenders though its doubtfulshell rush to tout Assanges support.

Remember, of course, that it was while Clinton was secretary of state that Assange released confidential diplomatic cables. At the time, in 2010, she called his actions an attack on the international community.

Well, Clinton, whose polls numbers are weakening, cant be too choosy about where she finds new support.

Colby Itkowitz is a national reporter for In The Loop.

Original post:
Did Wikileaks founder Julian Assange just defend Hillary ...