Exclusive: Read Julian Assange’s Introduction to The …

This essay by Julian Assange is taken from the introduction to The Wikileaks Files: The World According to the US Empire, a collection analyzing how Wikileaks release of US diplomatic cables impacted foreign policy.

One day, a monk and two novices found a heavy stone in their path. We will throw it away, said the novices. But before they could do so, the monk took his ax and cleaved the stone in half. After seeking his approval, the novices then threw the halves away. Why did you cleave the stone only to have us throw it away? they asked. The monk pointed to the distance the half stones had traveled. Growing excited, one of the novices took the monks ax and rushed to where one half of the stone had landed. Cleaving it, he threw the quarter, whereupon the other novice grabbed the ax from him and rushed after it. He too cleaved the stone fragment and threw it afield. The novices continued on in this fashion, laughing and gasping, until the halves were so small they traveled not at all and drifted into their eyes like dust. The novices blinked in bewilderment. Every stone has its size, said the monk.

At the time of writing, WikiLeaks has published 2,325,961 diplomatic cables and other US State Department records, comprising some two billion words. This stupendous and seemingly insurmountable body of internal state literature, which if printed would amount to some 30,000 volumes, represents something new. Like the State Department, it cannot be grasped without breaking it open and considering its parts. But to randomly pick up isolated diplomatic records that intersect with known entities and disputes, as some daily newspapers have done, is to miss the empire for its cables.

Each corpus has its size.

To obtain the right level of abstraction, one which considers the relationships between most of the cables for a region or country rather than considering cables in isolation, a more scholarly approach is needed. This approach is so natural that it seems odd that it has not been tried before.

The study of empires has long been the study of their communications. Carved into stone or inked into parchment, empires from Babylon to the Ming dynasty left records of the organizational center communicating with its peripheries. However, by the 1950s students of historical empires realized that somehow the communications medium was the empire. Its methods for organizing the inscription, transportation, indexing and storage of its communications, and for designating who was authorized to read and write them, in a real sense constituted the empire. When the methods an empire used to communicate changed, the empire also changed.

Speech has a short temporal range, but stone has a long one. Some writing methods, such as engraving into stone, suited the transmission of compressed institutional rules that needed to be safely communicated into future months and years. But these methods did not allow for rapidly unfolding events, or for official nuance or discretion: they were set in stone. To address the gaps, empires with slow writing systems still had to rely heavily on humanitys oldest and yet most ephemeral communications medium: oral conventions, speech.

Other methods, such as papyrus, were light and fast to create, but fragile. Such communications materials had the advantage of being easy to construct and transport, unifying occupied regions through rapid information flow that in turn could feed a reactive central management. Such a well-connected center could integrate the streams of intelligence coming in and swiftly project its resulting decisions outwards, albeit with resulting tendencies toward short-termism and micromanagement. While a sea, desert, or mountain could be crossed or bypassed at some expense, and energy resources discovered or stolen, the ability to project an empires desires, structure, and knowledge across space and time forms an absolute boundary to its existence.

Cultures and economies communicate using all manner of techniques across the regions and years of their existence, from the evolution of jokes shared virally between friends to the diffusion of prices across trade routes. This does not by itself make an empire. The structured attempt at managing an extended cultural and economic system using communications is the hall- mark of empire. And it is the records of these communications, never intended to be dissected, and so especially vulnerable to dissection, that form the basis for understanding the nature of the worlds sole remaining empire.

And where is this empire?

Each working day, 71,000 people across 191 countries representing twenty-seven different US government agencies wake and make their way past flags, steel fences, and armed guards into one of the 276 fortified buildings that comprise the 169 embassies and other missions of the US Department of State. They are joined in their march by representatives and operatives from twenty-seven other US government departments and agencies, including the Central Intelligence Agency, the National Security Agency, the Federal Bureau of Investigation, and the various branches of the US military.

Inside each embassy is an ambassador who is usually close to domestic US political, business or intelligence power; career diplomats who specialize in the politics, economy, and public diplomacy of their host state; managers, researchers, military attachs, spies under foreign-service cover, personnel from other US government agencies (for some embassies this goes as far as overt armed military or covert special operations forces); contractors, security personnel, technicians, locally hired translators, cleaners, and other service personnel.

Above them, radio and satellite antennas scrape the air, some reaching back home to receive or disgorge diplomatic and CIA cables, some to relay the communications of US military ships and planes, others emplaced by the National Security Agency in order to mass-intercept the mobile phones and other wireless traffic of the host population.

The US diplomatic service dates back to the revolution, but it was in the postWorld War II environment that the modern State Department came to be. Its origins coincided with the appointment of Henry Kissinger as secretary of state, in 1973. Kissingers appointment was unusual in several respects. Kissinger did not just head up the State Department; he was also concurrently appointed national security advisor, facilitating a tighter integration between the foreign relations and military and intelligence arms of the US government. While the State Department had long had a cable system, the appointment of Kissinger led to logistical changes in how cables were written, indexed, and stored. For the first time, the bulk of cables were transmitted electronically. This period of major innovation is still present in the way the department operates today.

The US Department of State is unique among the formal bureaucracies of the United States. Other agencies aspire to administrate one function or another, but the State Department represents, and even houses, all major elements of US national power. It provides cover for the CIA, buildings for the NSA mass-interception equipment, office space and communications facilities for the FBI, the military, and other government agencies, and staff to act as sales agents and political advisors for the largest US corporations.

One cannot properly understand an institution like the State Department from the outside, any more than Renaissance artists could discover how animals worked without opening them up and poking about inside. As the diplomatic apparatus of the United States, the State Department is directly involved in putting a friendly face on empire, concealing its underlying mechanics. Every year, more than $1 billion is budgeted for public diplomacy, a circumlocutory term for outward-facing propaganda. Public diplomacy explicitly aims to influence journalists and civil society, so that they serve as conduits for State Department messaging.

While national archives have produced impressive collections of internal state communications, their material is intention- ally withheld or made difficult to access for decades, until it is stripped of potency. This is inevitable, as national archives are not structured to resist the blowback (in the form of withdrawn funding or termination of officials) that timely, accessible archives of international significance would produce. What makes the revelation of secret communications potent is that we were not supposed to read them. The internal communications of the US Department of State are the logistical by-product of its activities: their publication is the vivisection of a living empire, showing what substance flowed from which state organ and when.

Diplomatic cables are not produced in order to manipulate the public, but are aimed at elements of the rest of the US state apparatus, and are therefore relatively free from the distorting influence of public relations. Reading them is a much more effective way of understanding an institution like the State Department than reading reports by journalists on the public pronouncements of Hillary Clinton, or Jen Psaki.

While in their internal communications State Department officials must match their pens to the latest DC orthodoxies should they wish to stand out in Washington for the right reasons and not the wrong ones, these elements of political correctness are themselves noteworthy and visible to outsiders who are not sufficiently indoctrinated. Many cables are deliberative or logistical, and their causal relationships across time and space with other cables and with externally documented events create a web of interpretive constraints that reliably show how the US Department of State and the agencies that inter-operate with its cable system understand their place in the world.

Only by approaching this corpus holisticallyover and above the documentation of each individual abuse, each localized atrocitydoes the true human cost of empire heave into view.

While there exists a large literature in the structural or realpolitik analysis of key institutions of US power, a range of ritualistic and even quasi-religious phenomena surrounding the national security sector in the United States suggests that these approaches alone lack explanatory power. These phenomena are familiar in the ritual of flag-folding, the veneration of orders, and elaborate genuflection to rank, but they can be seen also in the extraordinary reaction to WikiLeaks disclosures, where it is possible to observe some of their more interesting features.

When WikiLeaks publishes US government documents with classification markingsa type of national-security holy seal, if you willtwo parallel campaigns begin: first, the public campaign of downplaying, diverting attention from, and reframing any revelations that are a threat to the prestige of the national security class; and, second, an internal campaign within the national security state itself to digest what has happened. When documents carrying such seals are made public, they are transubstantiated into forbidden objects that become toxic to the state within a statethe more than 5.1 million Americans (as of 2014) with active security clearances, and those on its extended periphery who aspire to its economic or social patronage.

There is a level of hysteria and non-corporeality exhibited in this reaction to WikiLeaks disclosures that is not easily captured by traditional theories of power. Many religions and cults imbue their priestly class with additional scarcity value by keeping their religious texts secret from the public or the lower orders of the devoted. This technique also permits the priestly class to adopt different psychological strategies for different levels of indoctrination. What is laughable, hypocritical, or Machiavellian to the public or lower levels of clearance is embraced by those who have become sufficiently indoctrinated or co-opted into feeling that their economic or social advantage lies in accepting that which they would normally reject. Publicly, the US government has claimed, falsely, that anyone without a security clearance distributing classified documents is violating the Espionage Act of 1917. But the claims of the interior state within a state campaign work in the opposite direction. There, it orders the very people it publicly claims are the only ones who can legally read classified documents to refrain from reading documents WikiLeaks and associated media have published with classification markings on them, lest they be contaminated by them. While a given document can be read by cleared staff when it issues from classified government repositories, it is forbidden for the same staff to set eyes on the exact same document when it emerges from a public source. Should cleared employees of the national security state read such documents in the public domain, they are expected to self-report their contact with the newly profaned object, and destroy all traces of it.

This response is, of course, irrational. The classified cables and other documents published by WikiLeaks and associated media are completely identical to the original versions officially avail- able to those with the necessary security clearance, since this is where they originated. They are electronic copies. Not only are they indistinguishablethere is literally no difference at all between them. Not a word. Not a letter. Not a single bit.

The implication is that there is a non-physical property that inhabits documents once they receive their classification markings, and that this magical property is extinguished, not by copying the document, but by making the copy public. The now public document has, to devotees of the national security state, not merely become devoid of this magical property and reverted to a mundane object, it has been inhabited by another non- physical property: an evil one.

This kind of religious thinking has consequences. Not only is it the excuse used by the US government to block millions of people working for the state within a state from reading more than thirty different WikiLeaks domainsthe same excuse that was used to block the New York Times, Guardian, Der Spiegel, Le Monde, El Pas, and other outlets publishing WikiLeaks materials.

In fact, in 2011 the US government sent what might be called a WikiLeaks fatwa to every federal government agency, every federal government employee, and every federal government security contractor:

The recent disclosure of US Government documents by WikiLeaks has caused damage to our national security.Classified information, whether or not already posted on public websites, disclosed to the media, or otherwise in the public domain remains classified and must be treated assuch until such time it is declassified by an appropriate US government authority Contractors who inadvertently discover potentially classifiedinformation in the public domain shall report its existence immediately to their Facility Security Officers. Companies are instructed to delete the offending material by holding down the SHIFT key while pressing the DELETE key for Windows-based systems and clearing of the internet browser cache.

After being contacted by an officer of the US Department of State, Columbia Universitys School of International and Public Affairs warned its students to not post links to these documents nor make comments on social media sites such as Facebook or through Twitter. Engaging in these activities would call into question your ability to deal with confidential information, which is part of most positions with the federal government.

A swathe of government departments and other entities, including even the Library of Congress, blocked internet access to WikiLeaks. The US National Archives even blocked searches of its own database for the phrase WikiLeaks.So absurd did the taboo become that, like a dog snapping mindlessly at every- thing, eventually it found its markits own tail. By March 2012, the Pentagon had gone so far as to create an automatic filter to block any emails, including inbound emails to the Pentagon, containing the word WikiLeaks. As a result, Pentagon prosecutors preparing the case against US intelligence analyst PFC Manning, the alleged source of the Cablegate cables, found that they were not receiving important emails from either the judge or the defense.10 But the Pentagon did not remove the filter instead, chief prosecutor Major Ashden Fein told the court that a new procedure had been introduced to check the filter daily for blocked WikiLeaks-related emails. Military judge Col. Denise Lind said that special alternative email addresses would be set up for the prosecution.

While such religious hysteria seems laughable to those outside the US national security sector, it has resulted in a serious poverty of analysis of WikiLeaks publications in American international relations journals. However, scholars in disciplines as varied as law, linguistics, applied statistics, health, and economics have not been so shy. For instance, in their 2013 paper for the statistics journal Entropy, DeDeo et al.all US or UK nationalswrite that WikiLeaks Afghan War Diary is likely to become a standard set for both the analysis of human conflict and the study of empirical methods for the analysis of complex, multi-modal data.

There is even an extensive use of WikiLeaks materials, particularly cables, in courts, including domestic courts, from the United Kingdom to Pakistan, and in international tribunals from the European Court of Human Rights to the International Criminal Tribunal for the former Yugoslavia.

Set against the thousands of citations in the courts and in other academic areas, the poverty of coverage in American international relations journals appears not merely odd, but suspicious. These journals, which dominate the study of international relations globally, should be a natural home for the proper analysis of WikiLeaks two-billion-word diplomatic corpus. The US-based International Studies Quarterly (ISQ), a major international relations journal, adopted a policy against accepting manuscripts based on WikiLeaks materialeven where it consists of quotes or derived analysis. According to a forthcoming paper, Whos Afraid of WikiLeaks? Missed Opportunities in Political Science Research, the editor of ISQ stated that the journal is currently in an untenable position, and that this will remain the case until there is a change in policy from the influential International Studies Association (ISA). The ISA has over 6,500 members worldwide and is the dominant scholarly association in the field. The ISA also publishes Foreign Policy Analysis, International Political Sociology, International Interactions, International Studies Review, and International Studies Perspectives.

The ISAs 201415 president is Amitav Acharya, a professor at the School of International Service at the American University in Washington, DC. Nearly half of the fifty-six members on its governing council are professors at similar academic departments across the United States, many of which also operate as feeder schools for the US Department of State and other internationally- oriented areas of government.

That the ISA has banned the single most significant US foreign policy archive from appearing in its academic paperssomething that must otherwise work against its institutional and academic ambitionscalls into question its entire output, an output that has significantly influenced how the world has come to understand the role of the United States in the international order.

This closing of ranks within the scholar class around the interests of the Pentagon and the State Department is, in itself, worthy of analysis. The censorship of cables from international relations journals is a type of academic fraud. To quietly exclude primary sources for non-academic reasons is to lie by omission. But it points to a larger insight: the distortion of the field of international relations and related disciplines by the proximity of its academic structures to the US government. Its structures do not even have the independence of the frequently deferent New York Times, which, while it engaged in various forms of cable censor- ship, at least managed to publish over a hundred.

These journals distortion of the study of international relations and censorship of WikiLeaks are clear examples of a problem. But its identification also presents a significant opportunity: to present an analysis of international relations that has not been hobbled by the censorship of classified materials.

The response of the United States to the release of the WikiLeaks materials betrays a belief that its power resides in a disparity of information: ever more knowledge for the empire, ever less for its subjects.

In 1969, Daniel Ellsberglater famous for leaking the Pentagon Papershad a top-secret security clearance. Henry Kissinger had applied for his own top-secret clearance. Ellsberg warned him of its dangers:[I]t will become very hard for you to learn from anybody who doesnt have these clearances. Because youll be thinking as you listen to them: What would this man be telling me if he knew what I know? Would he be giving me the same advice, or would it totally change his predictions and recommendations? You will deal with a person who doesnt have those clearances only from the point of view of what you want him to believe and what impression you want him to go away with, since youll have to lie carefully to him about what you know. In effect, you will have to manipulate him. Youll give up trying to assess what he has to say. The danger is, youll become something like a moron. Youll become incapable of learning from most people in the world, no matter how much experience they may have in their particular areas that may be much greater than yours.

Freed from their classified seals, the WikiLeaks materials bridge the gulf between the morons with security clearances and nothing to learn, and us, their readers.

Image: AP

View post:
Exclusive: Read Julian Assange's Introduction to The ...

Sweden and Ecuador to begin Julian Assange talks next week

Julian Assange in August 2014. Photograph: Reuters

Sweden will begin talks with Ecuador about Julian Assange on Monday, after Stockholm moved to break the deadlock over five-year-old rape allegations against him.

Sweden initially rejected a demand by Ecuador that the two countries establish a formal agreement on judicial cooperation before Swedish prosecutors could interrogate the WikiLeaks founder in Ecuadors embassy in London, saying it did not negotiate bilateral treaties.

But this month the government agreed to talks specifically to address the stalemate over Assange, who claimed asylum in the embassy in 2012.

Two women made allegations against Assange five years ago in Stockholm, but no charges were brought because the prosecutor said she was unable to interrogate him. Assange says he had no choice but to seek asylum as Sweden declined to guarantee that he would not be extradited to the US to face espionage charges if he travelled to Stockholm.

The political intervention by Sweden marks a new development in the case. Swedish politicians have, with very few exceptions, insisted they must not interfere, saying it is a purely judicial matter.

We have agreed to what the Ecuadorians asked for, said Cecilia Riddselius, the Swedish justice ministry official responsible for the case. It was a political decision to have this discussion.

Normally ministers cannot interfere in individual cases, it is part of our legal system, this is a strict rule. At the same time, it is under the competence of the government to enter into agreements with other states. A decision was taken to actually raise it to the level of the cabinet.

Riddselius said the state secretary, Anne Linde, would open the negotiations on Monday on behalf of the justice ministry. The justice ministrys director general for international affairs, Anna-Karin Svensson, the foreign ministrys director general for legal affairs, Anders Rnquist, and Riddselius herself would also be involved. She said Ecuadors under-secretary of state Frnando Yepez Lasso would lead the talks for Ecuador.

Ecuadors embassy in Stockholm declined to comment, but said the makeup of its delegation was still being discussed.

We do not normally enter into bilateral agreements and encourage states to enter multilateral ones instead, Riddselius said. But considering this specific case and our willingness to move the case forward, we are open to discuss this. It will be a general agreement but we hope it will be applicable to the Assange case.

Sexual assault accusations against Assange, who has not been formally charged with any crime, expired this month under Swedens statute of limitations. In March Swedish prosecutors had pledged to interrogate Assange in London while the allegations were still current.

Assange condemned the incompetence of Swedish authorities in failing to meet this deadline after he consistently demanded that prosecutors interview him in London so he could protest his innocence. The outstanding rape allegation can be prosecuted until August 2020.

The UK accuses Ecuador of preventing the proper course of justice by granting Assange asylum in London and is frustrated at the mounting costs of policing the embassy.

As recently as July, Sweden turned down a request from the UN to consider a guarantee that political refugees wanted for questioning would not face extradition to a third country.

Riddselius said that in her 20 years at the justice ministry she had never encountered a bilateral agreement of the kind that would be negotiated on Monday. It is new ground, very unusual, it is something we try to avoid, she said.

The negotiations would be complex, she said, and it was impossible to say how long they might take. She said Sweden had drafted an agreement and respected Ecuadors need to examine it thoroughly and propose changes.

View original post here:
Sweden and Ecuador to begin Julian Assange talks next week

What do Edward Snowden and Elton John have in common …

This crayfish was named for Edward Snowden. Zookeys

There are a few surefire signs you've become a celebrity -- hosting "Saturday Night Live," getting one of your songs parodied by "Weird Al" Yankovic or having your privacy invaded by a TMZ reporter.

However, you're truly an icon if a scientist bestows your name upon a newly discovered species. Edward Snowden, who leaked National Security Agency documents to journalists, and music legend Elton John both received that honor when two separate scientists used their names to classify two new species of crustaceans.

Snowden was the first of the two to have his name used to classify a new crustacean, called Cherax snowden, according to a study published Monday in the journal ZooKeys. Another study published Tuesday in the same journal announced the discovery of a new amphipod called Leucothoe eltoni, named after John.

The first known specimens of the new Cherax snowden crayfish were discovered in 2006 by a collector in Indonesia who kept them for "ornamental purposes" because of their bright orange and "orange green" claw tips. Researchers didn't realize they were an unclassified species of crayfish until April of this year, when they received additional specimens from two retailers that sold freshwater invertebrates and were able to match their DNA to the specimens first acquired in 2006.

Independent researcher Christian Lukhaup, one of the researchers who discovered the crayfish, wrote in the study that he chose Snowden's name for this crustacean so he could honor "his extraordinary achievements in defense of justice and freedom." He also explained to The Washington Post that he felt Snowden was more worthy of such an honor than, say, Justin Bieber or the Sham-Wow guy.

"We have so many species named after other famous people who probably don't do so much for humanity," Lukhaup told the Post. "I wanted to show support for Edward Snowden. I think what he did is something very special."

Sir Elton John got the scientific naming honor thanks to this amphipod. James Thomas

The amphipod named after John can be found in coral reefs near Indonesia and the Philippines and also near the Hawaiian Islands, possibly when some of them hitched a ride on a US Navy transport from the Philippines to Pearl Harbor in 1992. The amphipod lives inside other reef invertebrates but without damaging its host.

James Darwin Thomas, a professor at the Halmos College of Natural Sciences and Oceanography at Nova Southeastern University in Ft. Lauderdale, Florida, says he had two reasons for using John's name to classify his amphipod.

"I named the species in honor of Sir Elton John because I have listened to his music in my lab during my entire scientific career," Thomas said in a statement released by the scientific journal publisher Pensoft Publishers. "So, when this unusual crustacean with a greatly enlarged appendage appeared under my microscope after a day of collecting, an image of the shoes Elton John wore as the Pinball Wizard came to mind."

Naming a new species of an animal isn't always intended to be an honor. NPR science writer and "Radiolab" host Robert Krulwich wrote a story in 2008 about how animal species get their names and noted that some species were named as a form of criticism, such as the worm species Khruschevia Ridicula named by a scientist who despised the Communist Party and a species of weed, Siegesbeckia, named by famed botanist Carl Linneaus as a way to get back at one of his critics.

There's probably a slime mold or leech species out there named after some scientist's ex.

Follow this link:
What do Edward Snowden and Elton John have in common ...

Stop the government from putting Chelsea Manning in …

Below is an actual list of the "charges" that were sent to Chelsea (emphasis added). Even if everything the prison claims is 100% true, there's no way this would justify putting anyone in indefinite solitary confinement.

UPDATE: Chelsea has posted the official charging documents on her twitter here and here.

Here's the list of books and magazines that were taken from Chelsea and not returned: Vanity Fair issue with Caitlyn Jenner on the cover, Advocate, OUT Magazine, Cosmopolitan issue with an interview of Chelsea, Transgender Studies Quarterly, novel about trans issues "A Safe Girl to Love," book "Hacker, Hoaxer, Whistleblower, Spy -- The Many Faces of Anonymous," book "I Am Malala," 5 books by Robert Dorkin, legal documents including the Senate Torture Report, book: "Hidden Qualities that Make Us Influential."

None of these books or magazines should be considered contraband, nor do they pose a danger to anyone. It's terrifying that the U.S. government would target a prisoner so unfairly with so little justification.

Longterm solitary confinement is a form of torture. No one deserves this cruel and unusual psychological punishment, especially not a whistleblower like Chelsea Manning who many people believe should not be in prison in the first place.

Read more from the original source:
Stop the government from putting Chelsea Manning in ...

Theres a new crayfish species and its named after Edward …

German researcher Christian Lukhaup is a pretty big Edward Snowden fan. So he decided to name a newspecies of crayfish after the former National Security Agencycontractor.

TheCherax snowden, whichdoesn't bear any particular resemblance to Snowden, lives in freshwater tributary creeks inWest Papau, Indonesia.Lukhaup and two other researchers described the crayfish in an article published Monday by the journal ZooKeys.

Lukhaup has named other species before, including earlier this year when he described the brightly coloredCherax pulcher in ZooKeys. In his latest paper,Lukhaup explained the new crayfish name, writingthat Snowden is an "American freedom fighter" and "the name is used as a noun in apposition."

[The newest crayfish species looks like a Lisa Frank creation]

Thetypical naming convention follows a genus-species construction, per International Code of Zoological Nomenclature guidelines, andresearchers who describe species to science for the first time have free rein on naming rights.

"After describing a couple new species, I thought about naming one after Edward Snowden because he really impressed me," Lukhaup, an independent researcher, told The Post. "We have so many species named after other famous people who probably don't do so much for humanity.I wanted to show support for Edward Snowden. I think what he did is something very special."

[A list of the well-known politicians who have defended Edward Snowden]

In 2013, Snowdenleaked top-secret document caches to three journalists (including a Washington Post reporter), which led toa series of articles revealingthe scope of the NSA's surveillance program. Snowden is a controversial figure in the United States, where some have called for leniency and lauded him as a hero, while others have cast him as a criminal who put American security at risk.

But he enjoys wide supportin Germany, where a Dresden square was named after the former contractor in June. Now, he gets his own crayfish.

[The global cult of Edward Snowden keeps growing]

"A crayfish is a powerful species; it's protected by a very hard shell, plus it has two very effectivechelae, the pincers, and even if they are tiny, [they]can hurt a lot,"Lukhaup said. "A crayfish lives under a rock. It has to hide from his enemies and he comes out in the night and he hunts, and he is protected by a shell."

Lukhaup first got his hands on one of the Cherax snowdens back in 2006, thanks to a collector fromKepala Burung who had some for "ornamental purposes." But it wasn't until thisyear when researchers acquired more specimens from an online German store selling freshwater invertebrates and a wholesale distributor in Indonesia. The researchers extracted DNA from muscle tissueas part of the process to learn more about the species.

Male specimens of snowden-the-crayfishexamined by Lukhaup measure nearly three to four inches in total length, while afemale specimen measures about three inches in total length. Their pincers are various shades of green with orange tips.

[Edward Snowden, after months of NSA revelations, says his missions accomplished]

Researchers write that large numbers of thesnowden crayfish are collected for the global aquarium trade and to feed local populations.

"According to local collectors, the populations of the species have been decreasing in the last few years," the study authors write. "Clearly, the continued collecting of these crayfish for the trade is not a sustainable practice, and if the popularity of the species continues, a conservation management plan will have to be developed, potentially including a captive breeding program."

Lukhaup said that pollution also puts the animals at risk, and that responsible exporting for the aquarium trade could actually be good for the species as "people will get interested and then hopefully protect them."

READ MORE:

The newest species of catfish is named after Greedo from Star Wars

This massive stingray might be the largest freshwater fish ever caught

The surprises still hidden in our oceans: A ruby red seadragon

Elahe Izadi is a general assignment national reporter for The Washington Post.

View post:
Theres a new crayfish species and its named after Edward ...

Snowden’s Window for a Plea Deal Is Closing – Bloomberg View

The window for former National Security Agency contractor Edward Snowden to reach a plea agreement with the U.S. Justice Department is closing quickly.

That's what senior U.S. intelligence and law enforcement officials tell us about the man whose leaks they call the worst in U.S. history. These officials say any momentum for these negotiations is gone; his lawyers have not even had conversations about such a deal for nearly a year with the U.S. attorney prosecuting the case. The officials say the chance that Snowden will be offered a plea deal in exchange for cooperation is now close to non-existent.

QuickTake USA's Big Brother

There are three main reasons. The U.S. intelligence community today believes it knows more about what Snowden took than it did in 2014. Back then, the intelligence assessments assumed that every piece of data Snowden's Web crawler programs scanned was also copied and downloaded to files he later took. U.S. intelligence officials tell us that a more accurate picture has emerged of what Snowden actually took, as opposed to what he just scanned.

Another reason Snowden's value to the U.S. governmenthas diminished is that most intelligence officials assume that whatever Snowden gave to journalists is also by now in the possession of the Chinese and Russian governments.

"Many people in government believe that the journalists who received Snowden's material are not capable of protecting it from a competent and committed state level adversary service," Ben Wittes, a national security law specialist at the Brookings Institution and an editor of the national security law blog Lawfare, told us. "Even if Snowden did not give the material to others, they argue it would have been ripe for the picking."

Finally, U.S. officials have asserted -- though without providing evidence to support the claim -- that state and terrorist adversaries have improved their methods of evading U.S. surveillance as a result of the Snowden leaks. In February, Mike Rogers, the NSA director, told a Washington think tank that the U.S. lost spying capabilities as a result of Snowden's disclosures.

All told, the value of Snowden's help -- to gauge and counter damage from the leaks -- has diminished considerably.

That's not to say there were not some holdouts. Just last month, the departing attorney general, Eric Holder, told Michael Isikoff that a "possibility exists" for a Snowden plea deal. Holder and President Obama in January 2014 publicly offered to at least discuss such the terms under which Snowden could return home.

Back then, Snowden's defense lawyers retained the services of Plato Cacheris, a lawyer renowned for negotiating plea agreements with individuals charged under the Espionage Act.

But neither side is posturing for a deal now. U.S. law enforcement officials tell us that Holder's successor, Loretta Lynch, has shown no interest in striking a plea bargain for Snowden. She said as much last month at the Aspen Security Dialogue in Colorado. When we asked her whether she would entertain such a bargain for Snowden, Lynch said: "His status is what it has always been: He's a federal fugitive. And if he chooses to come back, or if he is brought back, he will be accorded all the due process of every defendant in our criminal justice system."

That prospect doesn't sound too tempting to Snowden's team. One of his lawyers, Ben Wizner, who is also an attorney with the American Civil Liberties Union, told us: "Why would Edward Snowden plead guilty to felonies, give up his civil rights and walk into a prison when he is able from his place of exile to live a meaningful life and to participate in a rich and fulfilling debate he helped shape?"

And there is something to this. The New York Times in May produced a short video that showed how Snowden was able to address events all over the world from Moscow. Stories based on Snowden documents continue to drive the national security news cycle, the latest being a New York Times investigation on the willingness of AT&T to cooperate with the NSA's dragnet surveillance. Already his leaks have led Congress to end the government's bulk collection of telephone metadata and instead require the U.S. government to access such data from the telecom companies, which will be trusted with storing it.

And so far Snowden has been able to do this without experiencing isolation from his friends and family. The final scene of a 2014 documentary about Snowden, "Citizen Four," shows the former contractor in the kitchen of his Moscow apartment with his girlfriend, Lindsay Mills. This fact prompted Glenn Greenwald, a custodian of Snowden's documents and his fiercest defender in the press, to assert his source was able to defy the U.S. government and still "build a happy, healthy and fulfilling life for himself."

That is certainly the hope for Snowden and his many supporters. But with the prospect of a plea bargain diminishing, this hope is really a bet on Vladimir Putin. For two years the Russian president has renewed Snowden's temporary visa to stay in Russia, where he leads a rich digital life.That could continue so long as Snowden remains in Putin's good favor.

This column does not necessarily reflect the opinion of the editorial board or Bloomberg LP and its owners.

To contact the authors on this story: Eli Lake at elake1@bloomberg.net Josh Rogin at joshrogin@bloomberg.net

To contact the editor on this story: Philip Gray at philipgray@bloomberg.net

Read the original:
Snowden's Window for a Plea Deal Is Closing - Bloomberg View

Introduction to Modern Cryptography, Second Edition …

Review

Praise for the First Edition:

"This book is a comprehensive, rigorous introduction to what the authors name modern cryptography. a novel approach to how cryptography is taught, replacing the older, construction-based approach. The concepts are clearly stated, both in an intuitive fashion and formally. I would heartily recommend this book to anyone who is interested in cryptography. The exercises are challenging and interesting, and can benefit readers of all academic levels." IACR Book Reviews, January 2010

"Over the past 30 years, cryptography has been transformed from a mysterious art into a mathematically rigorous science. The textbook by Jonathan Katz and Yehuda Lindell finally makes this modern approach to cryptography accessible to a broad audience. Readers of this text will learn how to think precisely about the security of protocols against arbitrary attacks, a skill that will remain relevant and useful regardless of how technology and cryptography standards change. The book uses just enough formalism to maintain precision and rigor without obscuring the development of ideas. It manages to convey both the theory's conceptual beauty and its relevance to practice. I plan to use it every time I teach an undergraduate course in cryptography." Salil Vadhan, Harvard University, Cambridge, Massachusetts, USA

"The greatest attribute is the fact that the material is presented in such a unified way. This is not just a collection of topics from cryptography thrown together at random. One topic leads effortlessly to the next. As such, this is a virtually indispensable resource for modern cryptography." Donald L. Vestal, South Dakota State University, Brookings, USA, from MAA Online, July 2008

" an excellent introduction to the theoretical background of cryptography. It would be a fine textbook for an advanced undergraduate (or graduate) course in theoretical computer science for students who have already seen the rudiments of cryptography. It will be a valuable reference for researchers in the field." Steven D. Galbraith, Mathematical Reviews, 2009

"The book is highly recommended as a textbook in cryptography courses at graduate or advanced undergraduate levels. covers, in a splendid way, the main notions of current cryptography from the point of view of information-theoretical security. This corresponds indeed to a modern cryptography approach." Guillermo Morales-Luna, Zentralblatt MATH, Vol. 1143

Jonathan Katz is a professor of computer science at the University of Maryland, and director of the Maryland Cybersecurity Center. He has published over 100 articles on cryptography, and serves as an editor of the Journal of Cryptology, the premier journal of the field. Prof. Katz has been invited to give introductory lectures on cryptography for audiences in academia, industry, and government, as well as an on-line cryptography course through Coursera.

Yehuda Lindell is a professor of computer science at Bar-Ilan University. He has published more than 90 articles on cryptography and four books, and has considerable industry experience in deploying cryptographic schemes. Professor Lindell lectures widely in both academic and industry venues on both theoretical and applied cryptography, and has been recognized with two prestigious grants from the European Research Council.

Read the rest here:
Introduction to Modern Cryptography, Second Edition ...

BGP Hijacking for Cryptocurrency Profit | Dell SecureWorks

Date Hijacked pool Network AS owner Feb 03, 2014 Middlecoin 54.214.242.0/24 (AS16509 Amazon.com Inc., US) Feb 04, 2014 BTCGuild 198.245.63.0/24 (AS16276 OVH SAS, FR) HashCows 37.187.9.0/24 (AS16276 OVH SAS, FR) LiteGuardian 142.4.211.0/24 (AS16276 OVH SAS, FR) Middlecoin 54.197.251.0/24 (AS14618 Amazon.com Inc., US) Middlecoin 54.214.242.0/24 (AS16509 Amazon.com Inc., US) Multipool 162.243.226.0/24 (AS62567 Digital Ocean Inc., US) Feb 05, 2014 HashCows 37.187.9.0/24 (AS16276 OVH SAS, FR) Middlecoin 54.197.251.0/24 (AS14618 Amazon.com Inc., US) Middlecoin 54.214.242.0/24 (AS16509 Amazon.com Inc., US) Multipool 162.243.142.0/24 (AS14061 Digital Ocean Inc., US) Multipool 162.243.226.0/24 (AS62567 Digital Ocean Inc., US) Feb 06, 2014 BTCGuild 198.245.63.0/24 (AS16276 OVH SAS, FR) HashCows 37.187.9.0/24 (AS16276 OVH SAS, FR) Middlecoin 54.197.251.0/24 (AS14618 Amazon.com Inc., US) Middlecoin 54.214.242.0/24 (AS16509 Amazon.com Inc., US) Multipool 162.243.142.0/24 (AS14061 Digital Ocean Inc., US) Multipool 162.243.226.0/24 (AS62567 Digital Ocean Inc., US) Feb 07, 2014 Middlecoin 54.197.251.0/24 (AS14618 Amazon.com Inc., US) Middlecoin 54.214.242.0/24 (AS16509 Amazon.com Inc., US) Multipool 146.185.179.0/24 (AS46652 ServerStack Inc., US) Multipool 162.243.142.0/24 (AS14061 Digital Ocean Inc., US) Multipool 162.243.226.0/24 (AS62567 Digital Ocean Inc., US) Unknown 54.203.244.0/24 (AS16509 Amazon.com Inc., US) Feb 08, 2014 Middlecoin 54.197.251.0/24 (AS14618 Amazon.com Inc., US) Middlecoin 54.214.242.0/24 (AS16509 Amazon.com Inc., US) Multipool 146.185.179.0/24 (AS46652 ServerStack Inc., US) Multipool 162.243.142.0/24 (AS14061 Digital Ocean Inc., US) Multipool 162.243.226.0/24 (AS62567 Digital Ocean Inc., US) Unknown 54.203.244.0/24 (AS16509 Amazon.com Inc., US) Mar 22, 2014 Clevermining 107.170.227.0/24 (AS14061 Digital Ocean Inc., US) Clevermining 107.170.47.0/24 (AS62567 Digital Ocean Inc., US) CloudMines 192.99.18.0/24 (AS16276 OVH SAS, FR) Coinshift 54.213.177.0/24 (AS16509 Amazon.com Inc., US) Coinshift 54.84.236.0/24 (AS14618 Amazon.com Inc., US) GHash.IO 46.229.169.0/24 (AS39572 AdvancedHosters Ltd., UA) HashCows 37.187.9.0/24 (AS16276 OVH SAS, FR) Hashfaster 142.4.195.0/24 (AS16276 OVH SAS, FR) Hashfaster 192.99.20.0/24 (AS16276 OVH SAS, FR) Middlecoin 54.194.173.0/24 (AS16509 Amazon.com Inc., US) Middlecoin 54.197.251.0/24 (AS14618 Amazon.com Inc., US) Middlecoin 54.214.242.0/24 (AS16509 Amazon.com Inc., US) Multipool 108.61.49.0/24 (AS20473 Choopa LLC, US) Multipool 146.185.179.0/24 (AS46652 ServerStack Inc., US) Multipool 162.243.142.0/24 (AS14061 Digital Ocean Inc., US) Multipool 162.243.226.0/24 (AS62567 Digital Ocean Inc., US) Multipool 50.117.92.0/24 (AS18779 EGIHosting, US) NoBrainerCrypto 107.170.244.0/24 (AS14061 Digital Ocean Inc., US) Nut2Pools 198.27.75.0/24 (AS16276 OVH SAS, FR) WafflePool 162.243.89.0/24 (AS62567 Digital Ocean Inc., US) WafflePool 192.241.211.0/24 (AS14061 Digital Ocean Inc., US) WafflePool 95.85.61.0/24 (AS200130 Digital Ocean Inc., EU) Mar 23, 2014 Clevermining 107.170.227.0/24 (AS14061 Digital Ocean Inc., US) Clevermining 107.170.47.0/24 (AS62567 Digital Ocean Inc., US) CloudMines 192.99.18.0/24 (AS16276 OVH SAS, FR) Coinshift 54.213.177.0/24 (AS16509 Amazon.com Inc., US) Coinshift 54.84.236.0/24 (AS14618 Amazon.com Inc., US) GHash.IO 46.229.169.0/24 (AS39572 AdvancedHosters Ltd., UA) HashCows 37.187.9.0/24 (AS16276 OVH SAS, FR) Hashfaster 142.4.195.0/24 (AS16276 OVH SAS, FR) Hashfaster 192.99.20.0/24 (AS16276 OVH SAS, FR) Middlecoin 54.194.173.0/24 (AS16509 Amazon.com Inc., US) Middlecoin 54.197.251.0/24 (AS14618 Amazon.com Inc., US) Middlecoin 54.214.242.0/24 (AS16509 Amazon.com Inc., US) Multipool 108.61.49.0/24 (AS20473 Choopa LLC, US) Multipool 146.185.179.0/24 (AS46652 ServerStack Inc., US) Multipool 162.243.142.0/24 (AS14061 Digital Ocean Inc., US) Multipool 162.243.226.0/24 (AS62567 Digital Ocean Inc., US) Multipool 50.117.92.0/24 (AS18779 EGIHosting, US) NoBrainerCrypto 107.170.244.0/24 (AS14061 Digital Ocean Inc., US) Nut2Pools 198.27.75.0/24 (AS16276 OVH SAS, FR) WafflePool 162.243.89.0/24 (AS62567 Digital Ocean Inc., US) WafflePool 192.241.211.0/24 (AS14061 Digital Ocean Inc., US) WafflePool 95.85.61.0/24 (AS200130 Digital Ocean Inc., EU) Mar 29, 2014 Clevermining 107.170.227.0/24 (AS14061 Digital Ocean Inc., US) Clevermining 107.170.47.0/24 (AS62567 Digital Ocean Inc., US) CloudMines 192.99.18.0/24 (AS16276 OVH SAS, FR) Coinshift 54.213.177.0/24 (AS16509 Amazon.com Inc., US) Coinshift 54.84.236.0/24 (AS14618 Amazon.com Inc., US) GHash.IO 46.229.169.0/24 (AS39572 AdvancedHosters Ltd., UA) HashCows 37.187.9.0/24 (AS16276 OVH SAS, FR) Hashfaster 142.4.195.0/24 (AS16276 OVH SAS, FR) Hashfaster 192.99.20.0/24 (AS16276 OVH SAS, FR) LiteGuardian 142.4.211.0/24 (AS16276 OVH SAS, FR) LiteGuardian 188.165.198.0/24 (AS16276 OVH SAS, FR) Middlecoin 54.194.173.0/24 (AS16509 Amazon.com Inc., US) Middlecoin 54.197.251.0/24 (AS14618 Amazon.com Inc., US) Middlecoin 54.214.242.0/24 (AS16509 Amazon.com Inc., US) Multipool 108.61.49.0/24 (AS20473 Choopa LLC, US) Multipool 146.185.179.0/24 (AS46652 ServerStack Inc., US) Multipool 162.243.142.0/24 (AS14061 Digital Ocean Inc., US) Multipool 162.243.226.0/24 (AS62567 Digital Ocean Inc., US) Multipool 50.117.92.0/24 (AS18779 EGIHosting, US) NoBrainerCrypto 107.170.244.0/24 (AS14061 Digital Ocean Inc., US) Nut2Pools 198.27.75.0/24 (AS16276 OVH SAS, FR) WafflePool 162.243.89.0/24 (AS62567 Digital Ocean Inc., US) WafflePool 192.241.211.0/24 (AS14061 Digital Ocean Inc., US) WafflePool 192.99.35.0/24 (AS16276 OVH SAS, FR) WafflePool 95.85.61.0/24 (AS200130 Digital Ocean Inc., EU) Apr 04, 2014 Clevermining 107.170.227.0/24 (AS14061 Digital Ocean Inc., US) Clevermining 107.170.47.0/24 (AS62567 Digital Ocean Inc., US) CloudMines 192.99.18.0/24 (AS16276 OVH SAS, FR) Coinshift 54.213.177.0/24 (AS16509 Amazon.com Inc., US) Coinshift 54.84.236.0/24 (AS14618 Amazon.com Inc., US) GHash.IO 46.229.169.0/24 (AS39572 AdvancedHosters Ltd., UA) HashCows 37.187.9.0/24 (AS16276 OVH SAS, FR) Hashfaster 142.4.195.0/24 (AS16276 OVH SAS, FR) Hashfaster 192.99.20.0/24 (AS16276 OVH SAS, FR) LiteGuardian 142.4.211.0/24 (AS16276 OVH SAS, FR) LiteGuardian 188.165.198.0/24 (AS16276 OVH SAS, FR) Middlecoin 54.194.173.0/24 (AS16509 Amazon.com Inc., US) Middlecoin 54.197.251.0/24 (AS14618 Amazon.com Inc., US) Middlecoin 54.214.242.0/24 (AS16509 Amazon.com Inc., US) Multipool 108.61.49.0/24 (AS20473 Choopa LLC, US) Multipool 146.185.179.0/24 (AS46652 ServerStack Inc., US) Multipool 162.243.142.0/24 (AS14061 Digital Ocean Inc., US) Multipool 162.243.226.0/24 (AS62567 Digital Ocean Inc., US) Multipool 50.117.92.0/24 (AS18779 EGIHosting, US) NoBrainerCrypto 107.170.244.0/24 (AS14061 Digital Ocean Inc., US) Nut2Pools 198.27.75.0/24 (AS16276 OVH SAS, FR) WafflePool 192.241.211.0/24 (AS14061 Digital Ocean Inc., US) WafflePool 192.99.35.0/24 (AS16276 OVH SAS, FR) WafflePool 95.85.61.0/24 (AS200130 Digital Ocean Inc., EU) Apr 08, 2014 Clevermining 107.170.227.0/24 (AS14061 Digital Ocean Inc., US) Clevermining 107.170.47.0/24 (AS62567 Digital Ocean Inc., US) CloudMines 192.99.18.0/24 (AS16276 OVH SAS, FR) Coinshift 54.213.177.0/24 (AS16509 Amazon.com Inc., US) Coinshift 54.84.236.0/24 (AS14618 Amazon.com Inc., US) GHash.IO 46.229.169.0/24 (AS39572 AdvancedHosters Ltd., UA) HashCows 37.187.9.0/24 (AS16276 OVH SAS, FR) Hashfaster 142.4.195.0/24 (AS16276 OVH SAS, FR) Hashfaster 192.99.20.0/24 (AS16276 OVH SAS, FR) LiteGuardian 142.4.211.0/24 (AS16276 OVH SAS, FR) LiteGuardian 188.165.198.0/24 (AS16276 OVH SAS, FR) Middlecoin 54.194.173.0/24 (AS16509 Amazon.com Inc., US) Middlecoin 54.197.251.0/24 (AS14618 Amazon.com Inc., US) Middlecoin 54.214.242.0/24 (AS16509 Amazon.com Inc., US) Multipool 108.61.49.0/24 (AS20473 Choopa LLC, US) Multipool 146.185.179.0/24 (AS46652 ServerStack Inc., US) Multipool 162.243.142.0/24 (AS14061 Digital Ocean Inc., US) Multipool 162.243.226.0/24 (AS62567 Digital Ocean Inc., US) Multipool 50.117.92.0/24 (AS18779 EGIHosting, US) NoBrainerCrypto 107.170.244.0/24 (AS14061 Digital Ocean Inc., US) Nut2Pools 198.27.75.0/24 (AS16276 OVH SAS, FR) WafflePool 192.241.211.0/24 (AS14061 Digital Ocean Inc., US) WafflePool 192.99.35.0/24 (AS16276 OVH SAS, FR) WafflePool 95.85.61.0/24 (AS200130 Digital Ocean Inc., EU) Apr 11, 2014 Clevermining 107.170.227.0/24 (AS14061 Digital Ocean Inc., US) Clevermining 107.170.47.0/24 (AS62567 Digital Ocean Inc., US) CloudMines 192.99.18.0/24 (AS16276 OVH SAS, FR) Coinshift 54.213.177.0/24 (AS16509 Amazon.com Inc., US) Coinshift 54.84.236.0/24 (AS14618 Amazon.com Inc., US) GHash.IO 46.229.169.0/24 (AS39572 AdvancedHosters Ltd., UA) HashCows 37.187.9.0/24 (AS16276 OVH SAS, FR) Hashfaster 142.4.195.0/24 (AS16276 OVH SAS, FR) Hashfaster 192.99.20.0/24 (AS16276 OVH SAS, FR) LiteGuardian 142.4.211.0/24 (AS16276 OVH SAS, FR) LiteGuardian 188.165.198.0/24 (AS16276 OVH SAS, FR) Middlecoin 54.194.173.0/24 (AS16509 Amazon.com Inc., US) Middlecoin 54.197.251.0/24 (AS14618 Amazon.com Inc., US) Middlecoin 54.214.242.0/24 (AS16509 Amazon.com Inc., US) Multipool 108.61.49.0/24 (AS20473 Choopa LLC, US) Multipool 146.185.179.0/24 (AS46652 ServerStack Inc., US) Multipool 162.243.142.0/24 (AS14061 Digital Ocean Inc., US) Multipool 162.243.226.0/24 (AS62567 Digital Ocean Inc., US) Multipool 50.117.92.0/24 (AS18779 EGIHosting, US) NoBrainerCrypto 107.170.244.0/24 (AS14061 Digital Ocean Inc., US) Nut2Pools 198.27.75.0/24 (AS16276 OVH SAS, FR) WafflePool 192.241.211.0/24 (AS14061 Digital Ocean Inc., US) WafflePool 192.99.35.0/24 (AS16276 OVH SAS, FR) WafflePool 95.85.61.0/24 (AS200130 Digital Ocean Inc., EU) Apr 24, 2014 Clevermining 107.170.227.0/24 (AS14061 Digital Ocean Inc., US) Clevermining 107.170.47.0/24 (AS62567 Digital Ocean Inc., US) CloudMines 192.99.18.0/24 (AS16276 OVH SAS, FR) Coinshift 54.213.177.0/24 (AS16509 Amazon.com Inc., US) Coinshift 54.84.236.0/24 (AS14618 Amazon.com Inc., US) GHash.IO 46.229.169.0/24 (AS39572 AdvancedHosters Ltd., UA) HashCows 37.187.9.0/24 (AS16276 OVH SAS, FR) Hashfaster 142.4.195.0/24 (AS16276 OVH SAS, FR) Hashfaster 192.99.20.0/24 (AS16276 OVH SAS, FR) LiteGuardian 142.4.211.0/24 (AS16276 OVH SAS, FR) LiteGuardian 188.165.198.0/24 (AS16276 OVH SAS, FR) Middlecoin 54.194.173.0/24 (AS16509 Amazon.com Inc., US) Middlecoin 54.197.251.0/24 (AS14618 Amazon.com Inc., US) Middlecoin 54.214.242.0/24 (AS16509 Amazon.com Inc., US) Multipool 108.61.49.0/24 (AS20473 Choopa LLC, US) Multipool 146.185.179.0/24 (AS46652 ServerStack Inc., US) Multipool 162.243.142.0/24 (AS14061 Digital Ocean Inc., US) Multipool 162.243.226.0/24 (AS62567 Digital Ocean Inc., US) Multipool 50.117.92.0/24 (AS18779 EGIHosting, US) NoBrainerCrypto 107.170.244.0/24 (AS14061 Digital Ocean Inc., US) Nut2Pools 198.27.75.0/24 (AS16276 OVH SAS, FR) WafflePool 192.241.211.0/24 (AS14061 Digital Ocean Inc., US) WafflePool 192.99.35.0/24 (AS16276 OVH SAS, FR) WafflePool 95.85.61.0/24 (AS200130 Digital Ocean Inc., EU) Apr 25, 2014 BTCGuild 192.198.107.0/24 (AS55286 B2 Net Solutions Inc., US) BTCGuild 198.245.63.0/24 (AS16276 OVH SAS, FR) BTCGuild 54.246.170.0/24 (AS16509 Amazon.com Inc., US) Eclipse 69.197.61.0/24 (AS25761 Staminus Communications, US) Eclipse 72.20.58.0/24 (AS25761 Staminus Communications, US) Eligius 192.241.205.0/24 (AS14061 Digital Ocean Inc., US) GHash.IO 46.229.169.0/24 (AS39572 AdvancedHosters Ltd., UA) GHash.IO 88.150.205.0/24 (AS35662 Redstation Limited, GB) Slush 54.195.36.0/24 (AS16509 Amazon.com Inc., US) Slush 54.225.68.0/24 (AS14618 Amazon.com Inc., US) Slush 95.211.52.0/24 (AS16265 LeaseWeb B.V., NL) Apr 26, 2014 BTCGuild 192.198.107.0/24 (AS55286 B2 Net Solutions Inc., US) BTCGuild 198.245.63.0/24 (AS16276 OVH SAS, FR) BTCGuild 54.246.170.0/24 (AS16509 Amazon.com Inc., US) Eclipse 69.197.61.0/24 (AS25761 Staminus Communications, US) Eclipse 72.20.58.0/24 (AS25761 Staminus Communications, US) Eligius 192.241.205.0/24 (AS14061 Digital Ocean Inc., US) GHash.IO 46.229.169.0/24 (AS39572 AdvancedHosters Ltd., UA) GHash.IO 88.150.205.0/24 (AS35662 Redstation Limited, GB) Slush 54.195.36.0/24 (AS16509 Amazon.com Inc., US) Slush 54.225.68.0/24 (AS14618 Amazon.com Inc., US) Slush 95.211.52.0/24 (AS16265 LeaseWeb B.V., NL) May 02, 2014 BTCGuild 192.198.107.0/24 (AS55286 B2 Net Solutions Inc., US) BTCGuild 198.245.63.0/24 (AS16276 OVH SAS, FR) BTCGuild 54.246.170.0/24 (AS16509 Amazon.com Inc., US) Eclipse 69.197.61.0/24 (AS25761 Staminus Communications, US) Eclipse 72.20.58.0/24 (AS25761 Staminus Communications, US) Eligius 192.241.205.0/24 (AS14061 Digital Ocean Inc., US) GHash.IO 46.229.169.0/24 (AS39572 AdvancedHosters Ltd., UA) GHash.IO 88.150.205.0/24 (AS35662 Redstation Limited, GB) Slush 54.195.36.0/24 (AS16509 Amazon.com Inc., US) Slush 54.225.68.0/24 (AS14618 Amazon.com Inc., US) Slush 95.211.52.0/24 (AS16265 LeaseWeb B.V., NL) May 04, 2014 BTCGuild 192.198.107.0/24 (AS55286 B2 Net Solutions Inc., US) BTCGuild 198.245.63.0/24 (AS16276 OVH SAS, FR) BTCGuild 54.246.170.0/24 (AS16509 Amazon.com Inc., US) Clevermining 107.170.227.0/24 (AS14061 Digital Ocean Inc., US) Clevermining 107.170.47.0/24 (AS62567 Digital Ocean Inc., US) CloudMines 192.99.18.0/24 (AS16276 OVH SAS, FR) Coinshift 54.213.177.0/24 (AS16509 Amazon.com Inc., US) Coinshift 54.84.236.0/24 (AS14618 Amazon.com Inc., US) Dogecoinr 198.251.81.0/24 (AS53667 FranTech Solutions, US) Eclipse 69.197.61.0/24 (AS25761 Staminus Communications, US) Eclipse 72.20.58.0/24 (AS25761 Staminus Communications, US) Eligius 192.241.205.0/24 (AS14061 Digital Ocean Inc., US) GHash.IO 46.229.169.0/24 (AS39572 AdvancedHosters Ltd., UA) GHash.IO 88.150.205.0/24 (AS35662 Redstation Limited, GB) HashCows 37.187.9.0/24 (AS16276 OVH SAS, FR) Hashfaster 142.4.195.0/24 (AS16276 OVH SAS, FR) Hashfaster 192.99.20.0/24 (AS16276 OVH SAS, FR) LiteGuardian 142.4.211.0/24 (AS16276 OVH SAS, FR) LiteGuardian 188.165.198.0/24 (AS16276 OVH SAS, FR) Middlecoin 54.194.173.0/24 (AS16509 Amazon.com Inc., US) Middlecoin 54.197.251.0/24 (AS14618 Amazon.com Inc., US) Middlecoin 54.214.242.0/24 (AS16509 Amazon.com Inc., US) Multipool 108.61.49.0/24 (AS20473 Choopa LLC, US) Multipool 146.185.179.0/24 (AS46652 ServerStack Inc., US) Multipool 162.243.142.0/24 (AS14061 Digital Ocean Inc., US) Multipool 162.243.226.0/24 (AS62567 Digital Ocean Inc., US) Multipool 50.117.92.0/24 (AS18779 EGIHosting, US) NoBrainerCrypto 107.170.244.0/24 (AS14061 Digital Ocean Inc., US) Nut2Pools 198.27.75.0/24 (AS16276 OVH SAS, FR) Slush 54.195.36.0/24 (AS16509 Amazon.com Inc., US) Slush 54.225.68.0/24 (AS14618 Amazon.com Inc., US) Slush 95.211.52.0/24 (AS16265 LeaseWeb B.V., NL) WafflePool 192.241.211.0/24 (AS14061 Digital Ocean Inc., US) WafflePool 192.99.35.0/24 (AS16276 OVH SAS, FR) WafflePool 95.85.61.0/24 (AS200130 Digital Ocean Inc., EU) May 06, 2014 Clevermining 107.170.227.0/24 (AS14061 Digital Ocean Inc., US) Clevermining 107.170.47.0/24 (AS62567 Digital Ocean Inc., US) CloudMines 192.99.18.0/24 (AS16276 OVH SAS, FR) Coinshift 54.213.177.0/24 (AS16509 Amazon.com Inc., US) Coinshift 54.84.236.0/24 (AS14618 Amazon.com Inc., US) Dogecoinr 198.251.81.0/24 (AS53667 FranTech Solutions, US) GHash.IO 46.229.169.0/24 (AS39572 AdvancedHosters Ltd., UA) HashCows 37.187.9.0/24 (AS16276 OVH SAS, FR) Hashfaster 142.4.195.0/24 (AS16276 OVH SAS, FR) Hashfaster 192.99.20.0/24 (AS16276 OVH SAS, FR) LiteGuardian 142.4.211.0/24 (AS16276 OVH SAS, FR) LiteGuardian 188.165.198.0/24 (AS16276 OVH SAS, FR) Middlecoin 54.194.173.0/24 (AS16509 Amazon.com Inc., US) Middlecoin 54.197.251.0/24 (AS14618 Amazon.com Inc., US) Middlecoin 54.214.242.0/24 (AS16509 Amazon.com Inc., US) Multipool 108.61.49.0/24 (AS20473 Choopa LLC, US) Multipool 146.185.179.0/24 (AS46652 ServerStack Inc., US) Multipool 162.243.142.0/24 (AS14061 Digital Ocean Inc., US) Multipool 162.243.226.0/24 (AS62567 Digital Ocean Inc., US) Multipool 50.117.92.0/24 (AS18779 EGIHosting, US) NoBrainerCrypto 107.170.244.0/24 (AS14061 Digital Ocean Inc., US) Nut2Pools 198.27.75.0/24 (AS16276 OVH SAS, FR) WafflePool 192.241.211.0/24 (AS14061 Digital Ocean Inc., US) WafflePool 192.99.35.0/24 (AS16276 OVH SAS, FR) WafflePool 95.85.61.0/24 (AS200130 Digital Ocean Inc., EU) May 07, 2014 BTCGuild 198.245.63.0/24 (AS16276 OVH SAS, FR) BTCGuild 54.246.170.0/24 (AS16509 Amazon.com Inc., US) Eclipse 69.197.61.0/24 (AS25761 Staminus Communications, US) Eclipse 72.20.58.0/24 (AS25761 Staminus Communications, US) F2Pool 112.124.13.0/24 (AS37963 Hangzhou Alibaba Advertising Co. Ltd., CN) F2Pool 114.215.103.0/24 (AS37963 Hangzhou Alibaba Advertising Co. Ltd., CN) F2Pool 115.28.152.0/24 (AS37963 Hangzhou Alibaba Advertising Co. Ltd., CN) F2Pool 115.28.153.0/24 (AS37963 Hangzhou Alibaba Advertising Co. Ltd., CN) F2Pool 115.28.63.0/24 (AS37963 Hangzhou Alibaba Advertising Co. Ltd., CN) May 09, 2014 BTCGuild 192.198.107.0/24 (AS55286 B2 Net Solutions Inc., US) BTCGuild 198.245.63.0/24 (AS16276 OVH SAS, FR) BTCGuild 54.246.170.0/24 (AS16509 Amazon.com Inc., US) BitMinter 192.31.187.0/24 (AS32421 Black Lotus Communications, US) Clevermining 107.170.227.0/24 (AS14061 Digital Ocean Inc., US) Clevermining 107.170.47.0/24 (AS62567 Digital Ocean Inc., US) CloudMines 192.99.18.0/24 (AS16276 OVH SAS, FR) Coinshift 54.213.177.0/24 (AS16509 Amazon.com Inc., US) Coinshift 54.84.236.0/24 (AS14618 Amazon.com Inc., US) Dogecoinr 198.251.81.0/24 (AS53667 FranTech Solutions, US) Eclipse 69.197.61.0/24 (AS25761 Staminus Communications, US) Eclipse 72.20.58.0/24 (AS25761 Staminus Communications, US) GHash.IO 46.229.169.0/24 (AS39572 AdvancedHosters Ltd., UA) GHash.IO 88.208.18.0/24 (AS39572 AdvancedHosters Ltd., UA) GHash.IO 88.208.33.0/24 (AS39572 AdvancedHosters Ltd., UA) HashCows 37.187.9.0/24 (AS16276 OVH SAS, FR) Hashfaster 142.4.195.0/24 (AS16276 OVH SAS, FR) Hashfaster 192.99.20.0/24 (AS16276 OVH SAS, FR) LiteGuardian 142.4.211.0/24 (AS16276 OVH SAS, FR) LiteGuardian 188.165.198.0/24 (AS16276 OVH SAS, FR) Middlecoin 54.194.173.0/24 (AS16509 Amazon.com Inc., US) Middlecoin 54.197.251.0/24 (AS14618 Amazon.com Inc., US) Middlecoin 54.214.242.0/24 (AS16509 Amazon.com Inc., US) Multipool 108.61.49.0/24 (AS20473 Choopa LLC, US) Multipool 146.185.179.0/24 (AS46652 ServerStack Inc., US) Multipool 162.243.142.0/24 (AS14061 Digital Ocean Inc., US) Multipool 162.243.226.0/24 (AS62567 Digital Ocean Inc., US) Multipool 50.117.92.0/24 (AS18779 EGIHosting, US) NoBrainerCrypto 107.170.244.0/24 (AS14061 Digital Ocean Inc., US) Nut2Pools 198.27.75.0/24 (AS16276 OVH SAS, FR) Slush 54.195.36.0/24 (AS16509 Amazon.com Inc., US) Slush 54.225.68.0/24 (AS14618 Amazon.com Inc., US) Slush 95.211.52.0/24 (AS16265 LeaseWeb B.V., NL) WafflePool 192.241.211.0/24 (AS14061 Digital Ocean Inc., US) WafflePool 192.99.35.0/24 (AS16276 OVH SAS, FR) WafflePool 95.85.61.0/24 (AS200130 Digital Ocean Inc., EU) May 10, 2014 BTCGuild 192.198.107.0/24 (AS55286 B2 Net Solutions Inc., US) BTCGuild 198.245.63.0/24 (AS16276 OVH SAS, FR) BTCGuild 54.246.170.0/24 (AS16509 Amazon.com Inc., US) BitMinter 192.31.187.0/24 (AS32421 Black Lotus Communications, US) Eclipse 69.197.61.0/24 (AS25761 Staminus Communications, US) Eclipse 72.20.58.0/24 (AS25761 Staminus Communications, US) Eligius 192.241.205.0/24 (AS14061 Digital Ocean Inc., US) GHash.IO 46.229.169.0/24 (AS39572 AdvancedHosters Ltd., UA) GHash.IO 88.208.18.0/24 (AS39572 AdvancedHosters Ltd., UA) GHash.IO 88.208.33.0/24 (AS39572 AdvancedHosters Ltd., UA) Slush 54.195.36.0/24 (AS16509 Amazon.com Inc., US) Slush 54.225.68.0/24 (AS14618 Amazon.com Inc., US) Slush 95.211.52.0/24 (AS16265 LeaseWeb B.V., NL) May 13, 2014 50BTC 144.76.102.0/24 (AS24940 Hetzner Online AG, DE) 50BTC 5.9.38.0/24 (AS24940 Hetzner Online AG, DE) BTCGuild 192.198.107.0/24 (AS55286 B2 Net Solutions Inc., US) BTCGuild 198.245.63.0/24 (AS16276 OVH SAS, FR) BTCGuild 54.246.170.0/24 (AS16509 Amazon.com Inc., US) BitMinter 192.31.187.0/24 (AS32421 Black Lotus Communications, US) Eclipse 69.197.61.0/24 (AS25761 Staminus Communications, US) Eclipse 72.20.58.0/24 (AS25761 Staminus Communications, US) GHash.IO 46.229.169.0/24 (AS39572 AdvancedHosters Ltd., UA) GHash.IO 88.208.18.0/24 (AS39572 AdvancedHosters Ltd., UA) GHash.IO 88.208.33.0/24 (AS39572 AdvancedHosters Ltd., UA) PolMine 31.186.87.0/24 (AS57367 DevonStudio Sp. z o.o., PL) Slush 54.195.36.0/24 (AS16509 Amazon.com Inc., US) Slush 54.225.68.0/24 (AS14618 Amazon.com Inc., US) Slush 95.211.52.0/24 (AS16265 LeaseWeb B.V., NL)

Visit link:
BGP Hijacking for Cryptocurrency Profit | Dell SecureWorks

Chelsea Manning guilty of prison misconduct – UPI.com

FORT LEAVENWORTH, Kan., Aug. 18 (UPI) -- Chelsea Manning, the former U.S. Army private serving 35 years in prison for leaking government documents, said she was found guilty on four charges of prison misconduct, though she was spared the possible sentence of solitary confinement.

Manning tweeted about the results of her hearing with the prison board Tuesday, saying she was found guilty on all four charges. Manning was charged with disrespect, disorderly conduct, prohibited property and medicine misuse by officials of the United States Disciplinary Barracks, the maximum-security military prison in Fort Leavenworth, Kan., where she is serving time for charges including violating the Espionage Act.

"I was found guilty of all 4 charges @ today's board; I am receiving 21 days of restrictions on recreation--no gym, library or outdoors," she wrote.

Books and magazines were found in Manning's cell, prompting the charge of prohibited property.

Books recovered include I Am Malala by Malala Yousafzai and Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous by Gabriella Coleman. Magazines confiscated include the Vanity Fair "Call me Caitlyn" issue with Caitlyn Jenner on the cover and a Cosmopolitan with an interview of Manning.

The medicine misuse charge was imposed for an expired tube of toothpaste.

Manning said the disciplinary action will likely add years to her sentence when it comes time for parole hearings.

Related UPI Stories

Go here to see the original:
Chelsea Manning guilty of prison misconduct - UPI.com

Surveillance State: NSA Spying and more Global Issues

Author and Page information

At the start of June 2013, a large number of documents detailing surveillance by intelligence agencies such as the USs NSA and UKs GCHQ started to be revealed, based on information supplied by NSA whistle blower, Edward Snowden.

These leaks revealed a massive surveillance program that included interception of email and other Internet communications and phone call tapping. Some of it appears illegal, while other revelations show the US spying on friendly nations during various international summits.

Unsurprisingly, there has been a lot of furor. While some countries are no doubt using this to win some diplomatic points, there has been increased tensions between the US and other regions around the world.

Much of the US surveillance programs came from the aftermath of the 9-11 terrorist attacks on the US in 2001. Concerns about a crackdown on civil rights in the wake of the so-called war on terror have been expressed for a long time, and these revelations seem to be confirming some of those fears.

Given the widespread collection of information, apparently from central servers of major Internet companies and from other core servers that form part of the Internet backbone, activities of millions (if not billions) of citizens have been caught up in a dragnet style surveillance problem called PRISM, even when the communication has nothing to do with terrorism.

What impacts would such secretive mass surveillance have on democracy?

One of the major concerns in the US has been how members of the US Congress themselves were not aware at how vast the activities were. Glenn Greenwald, the Guardian journalist that published the documents from Edward Snowden wrote a follow-up article a week after the initial revelations. He noted Democratic Representative Loretta Sanchezs comments said after Congress was given a classified briefing by NSA officials on the agencys previously secret surveillance activities that what was revealed was just the tip of the iceberg and that it is broader than most people even realize. She added that most of them in that session were astounded to learn some of this.

Greenwald continued to reflect on the gravity of what she said:

as a member of Congress, she had no idea how invasive and vast the NSAs surveillance activities are. Sen. Jon Tester, who is a member of the Homeland Security Committee, said the same thing, quite frankly, it helps people like me become aware of a situation that I wasnt aware of before because I dont sit on that Intelligence Committee.

How can anyone think that its remotely healthy in a democracy to have the NSA building a massive spying apparatus about which even members of Congress, including Senators on the Homeland Security Committee, are totally ignorant and find astounding when they learn of them? How can anyone claim with a straight face that there is robust oversight when even members of the Senate Intelligence Committee are so constrained in their ability to act that they are reduced to issuing vague, impotent warnings to the public about what they call radical secret law enabling domestic spying that would stun Americans to learn about it, but are barred to disclose what it is theyre so alarmed by? What kind of person would think that it would be preferable to remain in the dark totally ignorant about them?

Glenn Greenwald, On Prism, partisanship and propaganda , The Guardian, June 14, 2013

And even the original author of the controversial Patriot Act, has argued that the current metadata collection is unbounded in scope. He added that the vast majority of records collected have nothing to do with investigating terrorism, and asked, How can every call that every American makes or receives be relevant to a specific investigation?

Greenwald also makes an interesting observation about partisanship and describes how in 2006 the Democrats were very clearly opposed to this kind of secret surveillance that Republicans had spear-headed in the aftermatch of the 9-11 terrorist attacks. And he contrasts that with how defensive Democrats have been this time round. He also points to this interesting YouTube video that summarizes this (though read the article, too!)

Back to top

Defenders of these programs have often argued that if you have nothing to hide then you should not worry about this invasion of privacy.

Cory Doctorow, writing in The Guardian, responded as to why you should care:

Were bad at privacy because the consequences of privacy disclosures are separated by a lot of time and space from the disclosures themselves it happens so far away from the disclosure that we cant learn from it.

You should care about privacy because privacy isnt secrecy. I know what you do in the toilet, but that doesnt mean you dont want to close the door when you go in the stall.

You should care about privacy because if the data says youve done something wrong, then the person reading the data will interpret everything else you do through that light.

You should care about surveillance because you know people who can be compromised through disclosure: people who are gay and in the closet; people with terminal illnesses; people who are related to someone infamous for some awful crime. Those people are your friends, your neighbors, maybe your kids: they deserve a life thats as free from hassle as you are with your lucky, skeleton-free closet.

You should care about surveillance because once the system for surveillance is built into the networks and the phones, bad guys (or dirty cops) can use it to attack you.

As for Hague: if the innocent have nothing to fear from disclosure, then why did his own government demand an unprecedented system of secret courts in which evidence of UK intelligence complicity in illegal kidnapping and torture can be heard? Privacy, it appears, is totally essential for the powerful and completely worthless for the rest of us.

Cory Doctorow, The NSAs Prism: why we should care, The Guardian, June 14, 2013 (Emphasis added)

And, John Naughton, writing in The Observer, adds:

Citizens who had done nothing wrong, declared Uncle Hague, had nothing to fear from comprehensive surveillance.

Oh yeah? As Stephen Fry observed in an exasperated tweet: William Hagues view seems to be we can hide a camera & bug in your room & if youve got nothing to hide, whats the worry? Hells teeth!

Hells teeth indeed. I can think of thousands of people who have nothing to hide, but who would have good reasons to worry about intrusive surveillance. Journalists seeking to protect their sources, for example; NHS whistleblowers; people seeking online help for personal psychological torments; frightened teenagers seeking advice on contraception or abortion; estranged wives of abusive husbands; asylum seekers and dissident refugees; and so on.

In a way, Hagues smug, patronising tone was the least troubling aspect of the NSA/GCHQ story. More worrying was the unexplained contradiction between claims in the Prism PowerPoint slides that the NSA routinely collects data from Microsoft, Google, Yahoo, PalTalk, YouTube, Skype, AOL and Apple, and the companies frantic denials that this was the case.

John Naughton, The NSA has us snared in its trap and theres no way out, The Observer, June 15, 2013

The other thing Hague overlooks is how the UKs GCHQ used very deceptive means to intercept communications during important G20 summits to understand the private positions of other governments, including regimes friendly with the UK. This included setting up fake Internet cafes, installing spyware such as keyloggers, and intercepting emails.

It has often been thought that all governments would like to (or do) perform some form of spying and espionage during international meetings, and it is sometimes in the national interest to do so (or at least can be argued that way).

In addition, as the journal Foreign Policy revealed, the US spied on its own citizens as far back as the Vietnam war, including spying on two of its own sitting senior senators and prominent figures such as Martin Luther King, boxer Muhammad Ali, and others. This wasnt with congressional oversight, but at the White Houses behest; an abuse of power, as the journal also noted.

But it has been rarely possible to prove such suspicions, until now. Another important example was the US and UKs efforts to justify the invasion of Iraq in 2003, and the various UN meetings about Iraq-related resolutions, where the US and UK were thought to be spying on friends and others.

Finally, the if you have nothing to hide argument misses a fundamental point; having such vasts amount of data, potentially unnecessarily when collected via a dragnet style system, is awaiting abuse. The NSA and others currently claim they are not abusing their roles (but we have already heard them lie to Congress, so they are already facing public trust issues which is hard for a secretive organization anyway), but with all this data, it is the potential to abuse it (internally, or through hacks, etc) that is the privacy concern here. Secrecy (especially in a democracy) by-passes checks and balances. In the case of the US, who strongly claim there is legal and judicial oversight in these things, it is still done in secrecy; it is not clear how much personal data of ordinary citizens (of the US and rest of the world) is caught in this.

Back to top

Another aspect of the US/NSA spying story was the involvement of Internet giants such as Apple, Facebook, Google, Microsoft, and Twitter.

It was claimed that the NSA had some kind of backdoor or direct access to the vasts amount of data these companies have on their users, which the Internet titans vigorously denied. In some ways, these denials appear to be spin as companies have to comply with legal surveillance requests and the information may not technically be shared via backdoors.

On the other hand, companies are not legally allowed to acknowledge certain types of intelligence requests so legally there can be vasts amounts of data sharing but the secrecy surrounding it means it is not clear how much privacy invasion is legitimate or not.

But at the very least it emerged there were possibly thousands of requests for virtually all data for various users they would target. And that the NSA were able to capture a vast amount of Internet data.

Edward Snowden told the Hong Kong-based South China Post that there had been more than 61,000 hacking operations globally, with hundreds of targets in Hong Kong and on the [Chinese] mainland. We hack network backboneslike huge Internet routers, basicallythat give us access to the communications of hundreds of thousands of computers without having to hack every single one, Snowden added.

And some companies are only too willing to sell to the US government to support these activities. For example, Inter Press Service notes a Californian company offering US government agencies software to intercept signals on undersea cables that can be used to analyze all sorts of popular Internet services, such as Gmail, Yahoo! Mail, Facebook, Twitter, etc.

Back to top

It is interesting to note that a few months earlier the US was resisting what seemed like international efforts to put the stewardship of the Internet in the hands of the United Nations rather than being a decentralized system (though with the US having final say over the changes to certain aspects of the core, or root, Internet servers).

At the time, much of the technology community and others argued that the US is a good defender of the Internet (and helped create it in the first place), and that putting it into the hands of the UN was really the agenda of nations like Russia, China and others with questionable records on human rights. Examples such as surveillance and censorship were given as reasons to not trust other governments. And forums and blogs were filled with the usual over-simplistic UN-bashing that the US is often known for.

The US, by comparison, (probably rightly) argued that the current decentralized system works well. Internet giants such as Google also weighed in along similar lines, as did various Internet freedom activist organizations and individuals.

Unfortunately, even with the current system, governments unfortunately can sensor large portions of the Internet if they want to. But as the recent spying episode has revealed as well, this is perhaps another reason for the US not wanting to relinquish control of such a globally valuable resource. Being able to tap into some of the core Internet servers, many of which are based in the US or US-friendly nations, gives it an advantage of other countries and entities.

In other words, if even within the current system countries like China and Russia can censor and monitor the Internet why do they care about wanting more control? Larry Geller gives an example:

No doubt wrongdoers completely understand that they mustnt plot their activities using Gmail. They know that if their cell phones are powered on, someone in the US knows where they are. So they avoid using the systems that the NSA is tracking. Those whose data does get recorded and analyzed are overwhelmingly ordinary citizensof this and other countries. The NSA computers are filled with ordinary peoples data, including details of their love-lives, their financial transactions, and which movies theyve ordered tickets to see.

The recent leaks by Edward Snowden may revive pressure to move to more local control of data flows to prevent US spying. Do other countries care whether we record their citizens private data? Perhaps not so much. But Putin may care that his own phone calls are on file someplace in Utah.

Larry Geller, NSA spying may revive opposition to US control over the Internet, Disappeared News, June 11, 2013

Back to top

Some of the scandal in the US has been that the surveillance by NSA has included American citizens. Lost in that concern is the privacy of non-US citizens. It almost appears that mainstream US media are not too worried about that. But citizens around the world are rightly out-raged.

It is not like the US-based services (such as those from Google, Yahoo, Microsoft, Apple, Facebook, and others) are easily replaceable. Not only do people around the world rely on these services, but those companies rely on people around the world using their services too.

Being global services, the idea of nation states and citizen rights have not really evolved quickly enough to cater for the changes being brought about by the Internet. (It has similarly been argued that the way corporations are pushing for a neoliberal form of globalization, nation states are struggling to cope with that, too, so there is perhaps a real issue of democracy and peoples rights in a new world that is fundamentally at stake.)

Back to top

I think the main thing I want to emphasize is I dont have an interest and the people at the NSA dont have an interest in doing anything other than making sure that we can prevent a terrorist attack We do not have an interest in doing anything other than that. And weve tried to set up a system to make sure that these programs are not abused.

US President Barack Obama, President Obama Holds a Press Conference, Whitehouse.gov, August 9, 2013

Breaking UN protocol at a General Assembly meeting of all members states Brazil strongly criticized the US for illegally infiltrating its communications network, intercepting phone calls, and breaking into the Brazilian Mission to the United Nations. President Dilma Rousseff dismissed the US argument that such activities were to counter terrorism. Instead, she argued, corporate information often of high economic and even strategic value was at the center of espionage activities.

Reports also surfaced of the US spying on the United Nations and various European countries, including the office of the European Union at the UN. The US had managed to crack the UNs internal video teleconferencing system, as part of its surveillance of the world body.

Leading technology web site, Ars Technica, also adds that the NSA also runs a bugging program in more than 80 embassies and consulates around the world, under a program called the Special Collection Service, an intensive program that has little or nothing to do with warding off terrorists, according to Der Spiegel.

Back to top

When Edward Snowden made his revelations he hoped the focus would be on the issues, not on him or his plight. But as many have known for many years, the US mainstream media is rarely able to do reporting of serious issues; sensationalism and focusing on individuals are easier to do compared to tackling core issues which can hold power to account (be it government, corporate or otherwise).

In a Q&A session with The Guardian, he noted that Unfortunately, the mainstream media now seems far more interested in what I said when I was 17 or what my girlfriend looks like rather than, say, the largest program of suspicionless surveillance in human history.

In the US, much of the focus had become about whether he was a traitor or not; he felt there was no chance of a fair trial in the US because the US had openly accused and judged him of treason. In response to questions about whether he was a traitor he added

US officials say this every time theres a public discussion that could limit their authority. US officials also provide misleading or directly false assertions about the value of these programs, as they did just recently with the Zazi case, which court documents clearly show was not unveiled by PRISM.

Journalists should ask a specific question: since these programs began operation shortly after September 11th, how many terrorist attacks were prevented SOLELY by information derived from this suspicionless surveillance that could not be gained via any other source? Then ask how many individual communications were ingested to achieve that, and ask yourself if it was worth it. Bathtub falls and police officers kill more Americans than terrorism, yet we've been asked to sacrifice our most sacred rights for fear of falling victim to it.

Its important to bear in mind Im being called a traitor by men like former vice president Dick Cheney. This is a man who gave us the warrantless wiretapping scheme as a kind of atrocity warm-up on the way to deceitfully engineering a conflict that has killed over 4,400 and maimed nearly 32,000 Americans, as well as leaving over 100,000 Iraqis dead. Being called a traitor by Dick Cheney is the highest honor you can give an American.

Glen Greenwald, Edward Snowden: NSA whistleblower answers reader questions, The Guardian, June 17, 2013

When asked how the treatment of other whistleblowers influenced him, he had a profound challenge for President Obama:

Binney, Drake, Kiriakou, and Manning are all examples of how overly-harsh responses to public-interest whistle-blowing only escalate the scale, scope, and skill involved in future disclosures. Citizens with a conscience are not going to ignore wrong-doing simply because theyll be destroyed for it: the conscience forbids it. Instead, these draconian responses simply build better whistleblowers. If the Obama administration responds with an even harsher hand against me, they can be assured that theyll soon find themselves facing an equally harsh public response.

This disclosure provides Obama an opportunity to appeal for a return to sanity, constitutional policy, and the rule of law rather than men. He still has plenty of time to go down in history as the President who looked into the abyss and stepped back, rather than leaping forward into it. I would advise he personally call for a special committee to review these interception programs, repudiate the dangerous State Secrets privilege, and, upon preparing to leave office, begin a tradition for all Presidents forthwith to demonstrate their respect for the law by appointing a special investigator to review the policies of their years in office for any wrongdoing. There can be no faith in government if our highest offices are excused from scrutiny they should be setting the example of transparency.

Glen Greenwald, Edward Snowden: NSA whistleblower answers reader questions, The Guardian, June 17, 2013

Back to top

Chris Pyle, a former military instructor exposed the CIA and Armys monitoring of millions of Americans engaged in lawful political activity in the 1970s. His revelations ultimately leading to a series of laws aimed at curbing government abuses.

He was recently interviewed by the excellent Democracy Now! about the recent NSA revelations and echoed concerns raised by others; about lack of knowledge and oversight by Congress and that the secrecy is out of control.

But he also adds that privatization of surveillance (70% percent of the intelligence budget of the United States today goes to private contractors, Democracy Now! notes) is resulting in a lack of accountability and importantly a way for governments to shirk their legal responsibilities; the Fourth Amendment of the Constitution, which protects us from unreasonable searches and seizures, only binds the government, doesnt bind corporations. Thats a serious problem, he notes.

Back to top

This web site will probably not be able to keep up with new revelations as they are published. However, there are a number of sites that are worth following on this issue. In addition, the IPS news feed that this site carries will also cover this.

Here are a number of web sites that have further information and can cover this story as it happens far quicker than this web site can:

Below is a list of stories from Inter Press Service related to this issue.

Tuesday, May 12, 2015

NEW DELHI, May 12 (IPS) - "I was brutally raped thrice by my husband. He kept me under surveillance in his Dubai house while I suffered from severe malnutrition and depression. When I tried to flee from this hellhole, he confiscated my passport, deprived me of money and beat me up," recalls Anna Marie Lopes, 28, a rape survivor who after six years of torture, finally managed to board a flight to New Delhi from the United Arab Emirates in 2012.

Thursday, February 05, 2015

UNITED NATIONS, Feb 05 (IPS) - The United Nations, which is the legal guardian of scores of human rights treaties banning torture, unlawful imprisonment, degrading treatment of prisoners of war and enforced disappearances, is troubled that an increasing number of countries are justifying violations of U.N. conventions on grounds of fighting terrorism in conflict zones.

Tuesday, August 05, 2014

KOUOPTOMO, Cameroon, Aug 05 (IPS) - Issah Mounde Nsangou combs his 6.5-hectare Kouoptomo coffee plantation in Cameroon's West Region, pulling up unwanted weeds and clipping off parasitic plants. For the 50-year-old farmer, the health of his coffee plants are of prime importance.

Sunday, June 01, 2014

MEXICO CITY, Jun 01 (IPS) - A lack of controls, regulation and transparency marks the monitoring and surveillance of electronic communication in Mexico, one year after the revelations of cyberespionage shook the world.

Monday, March 03, 2014

TAIPEI, Mar 03 (IPS) - Taiwan's national legislature has taken a small but important step to curb rampant government surveillance of citizens and politicians through revisions of the Communication Security and Surveillance Act and the criminal code.

Friday, January 17, 2014

WASHINGTON, Jan 17 (IPS) - In a highly anticipated speechon Friday, President Barack Obama introduced a series of reforms that will place new limits and safeguards on U.S. intelligence gathering, including additional protections for foreign nationals overseas.

Tuesday, October 29, 2013

WASHINGTON, Oct 29 (IPS) - As the first formal probe by an international rights body into allegations of U.S. mass surveillance began here Monday, privacy advocates from throughout the Americas accused Washington of violating international covenants and endangering civil society.

Monday, October 28, 2013

UNITED NATIONS, Oct 28 (IPS) - When the 193-member General Assembly adopts a resolution next month censuring the illegal electronic surveillance of governments and world leaders by the U.S. National Security Agency (NSA), the U.N.'s highest policy-making body will spare the United States from public condemnation despite its culpability in widespread wiretapping.

Friday, October 25, 2013

Read more:
Surveillance State: NSA Spying and more Global Issues