Archive for the ‘Edward Snowden’ Category

Edward Snowden missing: Does tweet prove NSA Whistleblower …

GETTY

The former CIA worker fled to Moscow after leaking top secret US security documents in 2013.

But conspiracy theorists believe Snowden may be dead after his Twitter account sent out two cryptic messages.

The first told supporters Its time followed by a second containing 64 characters of code.

GETTY

It’s time

Edward Snowden

The computer geek is one of the worlds most wanted men after he revealed how much the US government and National Security Agency were spying on people all over the world.

On Wednesday, Snowden wrote on Twitter: Did you work with me? Have we talked since 2013?

Please recontact me securely.

Its time.

Excited fans took the message to mean Snowden was about to release another expose of the US government.

But then a tweet containing 64 apparently random letters and numbers was sent from the 33-year-olds Twitter account on Friday.

Both have since been deleted.

TWITTER

Some have suggested the code was the result of a dead mans switch a message set up to be automatically sent out if the account holder doesnt check in after a certain time.

Conspiracy theorists suggest the code might be the key to an encrypted file already given out to journalists who have worked with him before.

Others suggest that US or Russian agents have got to Snowden before he could release the new batch.

One associate journalist Glenn Greenwald has assured people Snowden is fine.

However, Snowden has remained eerily silent since the cryptic tweets.

See the rest here:

Edward Snowden missing: Does tweet prove NSA Whistleblower …

Fair Usage Law

August 8, 2016   Posted in: Edward Snowden  Comments Closed

Edward Snowden tweeted gibberish and people are trying to …

Encryption code or accidental tweet?

Image: Twitter / Edward Snowden

If you’re a fan of puzzles, Edward Snowden may have just ruined your Friday.

The former National Security Agency contractor turned whistleblower tweeted out a string of letters and numbers, which was either the result of him sitting on his phone or some cryptic code. Then, within minutes, he deleted it.

This isn’t a code you can crack with Google (we tried), so therefore the people of the internet started falling over themselves to work out what the hell it meant. So far, there has been little success.

Crowdsourcing has been known to solve huge problems like this before. Remember the dress? We solved that problem quickly. Marina Joyce? Yeah, armchair detectives had that worked out.

Here’s a look at the legit attempts to crack Snowden’s code. Let’s be real, he probably just left Twitter open in his pocket.

At this rate, we may never crack the code. Send help.

Have something to add to this story? Share it in the comments.

See the article here:

Edward Snowden tweeted gibberish and people are trying to …

Fair Usage Law

August 6, 2016   Posted in: Edward Snowden  Comments Closed

Edward Snowden issued a cryptic warning on Twitter – Business …

Edward Snowden, the former National Security Agency contractor turned whistleblower, issued a mysterious call for former colleagues to reconnect with him on Wednesday, tweeting “It’s time” to his more than 2million followers:

Snowden also quoted a tweet by journalist and author Barton Gellman, who said that he is seeking information on Snowden’s work in the intelligence community so he can write Snowden’s biography, and “tell it truthfully.” Gellman elaborated in an encrypted message:

I’m writing a book for Penguin Press called DARK MIRROR: Edward Snowden and the American Surveillance State. I want to hear from anyone who has first-hand information on either. It need not be some deep dark secret. I’m interested in your observations about Snowden’s work and work habits at CIA, Dell, NSA and Booz; or his time in the Army; or in computer training courses; or the surveillance programs and practices he described. Agree with him or not, I’d like to hear from you.

The tweet comes less than a week after Snowden exchanged Twitter barbs with WikiLeaks. The antisecrecy organization implied that Snowden was trying to win the favor of Democratic presidential nominee Hillary Clinton in order to regain entry into the US.

Snowden is living in exile in Russia after leaking information about the NSA’s surveillance programs in 2013. He has previously stated that his one condition for returning to the US would be the guarantee of a fair trialand the ability to argue his case before a jury againstthe charges he faces under the Espionage Act.

Read more from the original source:

Edward Snowden issued a cryptic warning on Twitter – Business …

Fair Usage Law

August 4, 2016   Posted in: Edward Snowden  Comments Closed

Edward Snowden Is Not Down With WikiLeaks’ Methods After …

July 29, 2016, 7:57 AM EDT

WikiLeaks is on a bit of a roll at the moment, most notoriously with its release of thousands of emails and even voicemail recordings from the U.S. Democratic National Committee (DNC) and the Democratic partys donors.

It has also recently released emails from Turkeys ruling party, prompting WikiLeaks blockage in that country, and tweeted out a link to an unredacted database of most female Turkish voters.

And Edward Snowden, the famous National Security Agency (NSA) whistleblower, thinks Julian Assanges whistleblowing pipeline is taking things too far.

Get Data Sheet, Fortunes technology newsletter.

Democratizing information has never been more vital, and WikiLeaks has helped, he tweeted. But their hostility to even modest curation is a mistake.

WikiLeaks lashed back, accusing Snowden of opportunism in the hope of winning a pardon from Hillary Clinton, the Democratic candidate. It also said that curation should not include censorship of ruling party cash flows.

Assanges operation has not only released the DNC emails and voicemails; it has also published a searchable database of Clintons emails from back when she was secretary of state.

Both Snowden and Assange are currently trying to avoid being sent to the U.S. to face trial over data leaks.

Assange has been holed up in Ecuadors London embassy for over three years, to avoid being extradited to Sweden for questioning over sex crime allegationshe is adamant that Sweden would then give him to the Americans.

Snowden is in Russia, where WikiLeaks editor Sarah Harrison helped him get asylum after the U.S. canceled his passport (he was trying to get from Hong Kong to South America after revealing himself as the NSA leaker).

For more on Edward Snowden, watch our video:

While WikiLeaks often does not redact personal information from the data it publishes, Snowden has been relatively assiduous about working with journalists to publish only carefully chosen snippets of the NSA leaks, often with sections blacked out.

As things stand, many security experts think Russian hackers gained access to the DNCs computer systems, apparently for a whole year, though not all agree that this means the Russian state was behind the hacks.

It is certainly the case that Russian President Vladimir Putin is not Clintons biggest fan, but the smoking gun in this particular episode has not quite materialized yet.

More here:

Edward Snowden Is Not Down With WikiLeaks’ Methods After …

Fair Usage Law

July 29, 2016   Posted in: Edward Snowden  Comments Closed

Edward Snowden and WikiLeaks clash over DNC leaks …

National Security Agency contractor turned whistle-blower Edward Snowden chided WikiLeaks on Thursday for its indiscriminate approach to leaking information, barely a week after the antisecrecy organization published 20,000 emails that were obtained in a hacking from the Democratic National Committee.

The organization possesses a “hostility to even modest curation,” Snowden wrote on Twitter.

WikiLeaks has attracted harsh criticism for failing to curate the information it leaks based on what is legitimately in the public’s interest. The organization has also made it a policy not to redact sensitive personal information that may be contained in the documents it exposes.

WikiLeaks posted a sharp rebuttal, insinuating that Snowden was trying to curry favor with Democratic presidential nominee Hillary Clinton.

The public clash is of particular interest, given Snowden’s previous collaboration with the organization. WikiLeaks came to Snowden’s aid in 2013, when he first leaked information about the NSA’s surveillance programs and sought a country in which he could request asylum.

WikiLeaks submitted multiple asylum requests on Snowden’s behalf, including to Ecuador, which granted WikiLeaks founder Julian Assange asylum at its embassy in London. A WikiLeaks researcher eventually accompanied Snowden when he fled from Hong Kong to Moscow, where he now lives in exile.

Glenn Greenwald, a journalist whom Snowden gave some of the leaked NSA documents in 2013, has also criticized WikiLeaks for failing to withhold information that might invade people’s privacy and is not a matter of public interest.

NSA contractor turned whistle-blower Edward Snowden traded Twitter jabs with WikiLeaks on Thursday. The Guardian

“Most of the information that we have withheld I’ve withheld on the grounds that it would invade people’s privacy, like emails that the NSA has collected between people, documents where they accuse people of engaging in certain bad acts without any proof,” Greenwald told Slate on Thursday, referring to the process by which he had chosen to release the NSA documents Snowden gave him.

“We’ve done a lot of withholding information in order to protect people’s privacy or reputational interests or other legitimate interests,” Greenwald added. “We tried to balance these two competing values. WikiLeaks has said, criticizing us, that they no longer believe in any form of redaction. I do not ascribe to that view.”

The latest WikiLeaks release of hacked DNC documents has prompted concerns that Russia is intervening in a US presidential election there is evidence that the DNC hack originated inside Russia and that the documents were given to WikiLeaks because of the organization’s ties to the Russian government.

The Kremlin has denied accusations that it was involved.

Snowden has previously weighed in on the incident, declaring earlier this week that the NSA is capable of tracing the stolen DNC emails back to Russia, if the country is indeed responsible.

Natasha Bertrand contributed reporting.

Go here to read the rest:

Edward Snowden and WikiLeaks clash over DNC leaks …

Fair Usage Law

July 29, 2016   Posted in: Edward Snowden  Comments Closed

WikiLeaks, NSA leaker Edward Snowden clash on Twitter …

National Security Agency whistleblower Edward Snowden and transparency website WikiLeaks are clashing over how best to handle the publication of sensitive data, in a public spat played out over Twitter.

WikiLeaks has come under increasing criticism over what it publishes, particularly following the release of what the website advertised as emails from Turkey’s ruling Justice and Development Party.

When a large numbers of emails turned out to be little more than messages from ordinary citizens, critics said WikiLeaks should have exercised better discretion to protect innocent people’s privacy.

Scroll down for video

National Security Agency leaker Edward Snowden and transparency website WikiLeaks (pictured, its founder Julian Assange) are clashing over how best to handle the publication of sensitive data, in a public spat played out over Twitter.

Snowden praised WikiLeaks on Thursday, tweeting, ‘Democratizing information has never been more vital, and @wikileaks has helped’ but then added that their ‘hostility to even modest curation is a mistake.’

WikiLeaks quickly fired back, tweeting:’Opportunism won’t earn you a pardon from Clinton & curation is not censorship of ruling party cash flows’.

The group’s tweet served as dig at Snowden’s self-imposed exile in Russia, as he avoids facing criminal charges in the United States for stealing governmental property and violating classified information laws.

Meanwhile a reporter for Mother Jones tweeted the group to ask: ‘Why release the VMs that have nothing to do with donor dinners (or maybe even the passionate supporter talking about Sanders)?’

But WikiLeaks defended its lack of curation and replied: ‘Our accuracy policy. We do not tamper with the evidentiary value of important historical archives.’

The release of a series of emails by the activist group last weekend caused discord in the party because they appeared to show favoritism within the DNC for Clinton over Sanders, who ran a close race for the nomination for the Nov. 8 election

DNC Chairwoman Debbie Wasserman Schultz resigned shortly after the hacking scandal

The release of a series of emails by the activist group last weekend caused discord in the party because they appeared to show favoritism within the DNC for Clinton over Sanders, who ran a close race for the nomination for the Nov. 8 election

DNC Chairwoman Debbie Wasserman Schultz resigned shortly after the hacking scandal. The committee is supposed to be neutral.

But the files were released in a raw form, some containing social security and credit card numbers, as well as dates of birth of DNC donors and guests.

WikiLeaks also released nearly 300,000 emails from the AK Party dating from 2010 to July 6 this year.

Obtained before the attempted coup, the date of their publication was brought forward ‘in response to the government’s post-coup purges’, WikiLeaks said on its website.

The source of the emails was not connected to the coup plotters or to a rival political party or state, WikiLeaks said.

But the leaks also contained details on thousands of women who are private Turkish citizens, although the group stressed that it did not publish that data itself.

Continue reading here:

WikiLeaks, NSA leaker Edward Snowden clash on Twitter …

Fair Usage Law

July 29, 2016   Posted in: Edward Snowden  Comments Closed

Edward Snowden weighs in on DNC leak – POLITICO

Edward Snowden said that greater disclosure could give the U.S. government a greater ability to attribute blame for the DNC hack. | AP Photo

By Caroline Kelly

07/25/16 11:40 AM EDT

Edward Snowden knows a thing or two about leaks.

The former CIA employee and government contractor weighed in on WikiLeaks publication of thousands of emails by Democratic National Committee staffers, calling for greater transparency of government intelligence capabilities.

Story Continued Below

To summarize: the US Intel Community should modernize their position on disclosure. Defensive capabilities should be aggressively public, he tweeted as one of a seven-tweet series earlier Monday morning.

Snowden, who now lives in asylum in Russia which has been widely accused of hacking the DNCs servers said more disclosure could give the U.S. government a greater ability to attribute blame for the DNC hack.

If Russia hacked the #DNC, they should be condemned for it, Snowden tweeted, citing the way the FBI presented its findings related to the Sony hack in November 2014, which the agency attributed to North Korea. Evidence that could publicly attribute responsibility for the DNC hack certainly exists at #NSA, but DNI traditionally objects to sharing, he later added.

The widespread knowledge of the formerly secret NSA data analysis program XKeyscore, which Snowed revealed in 2013, makes following exfiltrated data easy. I did this personally against Chinese ops, he tweeted. Snowden criticized the NSAs penchant for secrecy, adding, The aversion to sharing #NSA evidence is fear of revealing sources and methods of intel collection, but #XKEYSCORE is now publicly known.

Snowden argued that publicizing the consequences of insidious data hacking clear is the best national defense. Without a credible threat that USG can and will use #NSA capabilities to publicly attribute responsibility, such hacks will become common, he tweeted, adding, This is the only case in which mass surveillance has actually proven effective. Though I oppose in principle, it is a mistake to ignore.

Continue reading here:

Edward Snowden weighs in on DNC leak – POLITICO

Fair Usage Law

July 28, 2016   Posted in: Edward Snowden  Comments Closed

Edward Snowden talks film debut and dramatizing his life in …

SAN DIEGO, Calif. When former NSA contractor-turned-whistleblower Edward Snowden met with Oscar-winning director Oliver Stone to discuss a movie on his life, he never thought he would be making his own film debut.

Stone had initially interviewed Snowden to include him in DVD outtakes, Snowden said via video link late Thursday in San Diego after a screening of Stone’s “Snowden,” which stars Joseph Gordon-Levitt as the title character.

But Snowden and Stone ended up filming nine takes for a scene in which he talks about his fears stemming from his actions.

“I spoke at length just about personal values and just what it meant to me with the things that were happening since 2013,” said Snowden. “I guess he liked it. People do seem to respond to that.”

The movie, due out in September, follows the 2013 events that led Snowden, a former contractor with the National Security Agency, to expose the U.S. government’s mass surveillance programs and flee the country after the government filed espionage charges against him.

He was granted asylum in Russia later that year, and has lived there since with his girlfriend, Lindsay Mills.

“When there is enough in the public record, you don’t really get to decide whether or not the movie gets made,” Snowden said.

The film follows Snowden’s discovery of the U.S. government’s mass surveillance programs that digitally monitor unaware citizens.

It fictionalizes and condenses some events, such as how Snowden smuggled the data out of the NSA – dramatized with a Rubik’s Cube in the film – and got it to documentary filmmaker Laura Poitras and Guardian journalist Glenn Greenwald in Hong Kong.

“I admitted that I did not have a plan beyond getting straight out of there (Hong Kong), I planned to ask the world for justice and see what happened. It was kind of surprising how that worked out,” he said.

Asked by an audience member if he was happy, Snowden said: “I actually live a surprisingly free life,” working with organizations such as the American Civil Liberties Union that Gordon-Levitt donated his “Snowden” acting fee to.

“Every day, I’m working on something now that I can be proud of. I love my country, I love the things that we try to do,” he said.

“The fact that Lindsay … has been with me for ten years, is still with me, that’s something that just makes me happy every day.”

(Editing by Bernadette Baum)

See the rest here:

Edward Snowden talks film debut and dramatizing his life in …

Fair Usage Law

July 26, 2016   Posted in: Edward Snowden  Comments Closed

Edward Snowden Designs Anti-Spying iPhone Case | Inc.com

Edward Snowden – the man who leaked classified information from the National Security Agency (NSA) in 2013 and who is hailed by some as a whistleblower and condemned by others as a traitor – has co-created a conceptual iPhone case intended to prevent governments and various other parties from spying on smartphone users.

Smartphones, are of course, easily trackable – a “perfect tracking device” in Snowden’s words – and both governments and criminals can obtain all sorts of information about users (including the users’ locations) by monitoring signals emitted by phones. Such surveillance can jeopardize the safety and effectiveness of both activists and journalists; at least one journalist, Marie Colvin, is believed to have been killed in Syria after signals from her phone were used to establish her location as a target.

Of course, modern smartphones have “Airplane” modes that theoretically shut off transmissions. But such modes don’t really terminate all communications – GPS often remains on, and some other communications may also still occur. I have, for example, received text messages while sitting on the New York City subway with my phone in Airplane mode; someone looking to see where I was could send a series of texts and look for a beeping phone. Malware on a phone could also theoretically allow the phone to display that it is in Airplane mode when it is not.

Snowden and hardware hacker, Andrew Huang, co-authored a paper presenting a possible solution to this problem: they proposed a smartphone case that is connected to the phone and alerts the user when the phone is making transmissions. The case – which they dubbed the “introspection engine” — contains wires that feed into the phone via the SIM card slot and attach to various components inside the phone. The case utilizes its own computer and display; the display shows status information for phone communications (GPS, Bluetooth, WiFi, cellular service), and the case can set off an alarm if it detects an occurrence of unusual activity.

Snowden and Huang presented their paper this past Thursday at the MIT Media Lab; Snowden obviously did not attend in person; he video-conferenced in from Russia where he is currently living as a fugitive, wanted by law enforcement in the United States.

At this point, the “introspection engine” is just a concept – no prototype even exists yet -and, while the case may have value to a select small group of people, it is unlikely to become widespread.

For most people, turning off one’s smartphone is sufficient to prevent it from making transmissions. Worried about malware that fakes a power-off? Place your device in a Faraday type case that blocks transmissions; various models of such cases are sold online and there is a new high-end model with all sorts of other security features being shown at the HOPE Conference currently underway in New York. Of course, such cases are not 100% perfect – but, for, most people, they suffice – and, even in the case of journalists in rogue nations such cases might already offer sufficient protection.

Unlike Faraday cases, the proposed Snowden case doesn’t block signals – it just warns when a signal is being sent and, if an optional kill switch is added, kills the transmission – so, in highly sensitive situations, it might still pay to use the Faraday case around the phone even if the device sports an “introspection engine” type case.

Also, note that if someone wants to use the phone feature at times, but wants to ensure that the phone isn’t making unauthorized transmissions, the case itself isn’t going to do much, as it cannot detect if extra information is going out via the cellular connection when that connection is in use. What it might catch are packets being sent at irregular times or if cellular data is sent when that feature is showing on the phone as being disabled, and the user intends to use only WiFi.

Another approach might be far simpler thanthe “introspection engine” – if you are going into a place where you need to worry about transmissions, use an old non-connected organizer and camera, and use a non-smart-phone phone with a removable battery – and keep it is a Faraday Box even when it is off.

I am also not sure how much protection the Snowden case actually providesagainst government spying. Governments have the ability to track users through the wireless providers in their respective regions – they don’t need to hack cellphones and program the devices to make unauthorized transmissions in order to track people’s locations.

The “introspection engine” is certainly interesting – although I suspect that if it had been invented by someone less famous, not many people would have even taken notice. And, as it is just a theoretical object at this point, nobody can say for certain if it would even work as intended. As Snowden hopes toworkon developing a prototype, time will tell.

Continue reading here:

Edward Snowden Designs Anti-Spying iPhone Case | Inc.com

Fair Usage Law

July 26, 2016   Posted in: Edward Snowden  Comments Closed

Edward Snowden missing: Does tweet prove NSA Whistleblower …

GETTY The former CIA worker fled to Moscow after leaking top secret US security documents in 2013. But conspiracy theorists believe Snowden may be dead after his Twitter account sent out two cryptic messages. The first told supporters Its time followed by a second containing 64 characters of code. GETTY It’s time Edward Snowden The computer geek is one of the worlds most wanted men after he revealed how much the US government and National Security Agency were spying on people all over the world. On Wednesday, Snowden wrote on Twitter: Did you work with me? Have we talked since 2013? Please recontact me securely. Its time. Excited fans took the message to mean Snowden was about to release another expose of the US government. But then a tweet containing 64 apparently random letters and numbers was sent from the 33-year-olds Twitter account on Friday. Both have since been deleted. TWITTER Some have suggested the code was the result of a dead mans switch a message set up to be automatically sent out if the account holder doesnt check in after a certain time. Conspiracy theorists suggest the code might be the key to an encrypted file already given out to journalists who have worked with him before. Others suggest that US or Russian agents have got to Snowden before he could release the new batch. One associate journalist Glenn Greenwald has assured people Snowden is fine. However, Snowden has remained eerily silent since the cryptic tweets.

Fair Usage Law

August 8, 2016   Posted in: Edward Snowden  Comments Closed

Edward Snowden tweeted gibberish and people are trying to …

Encryption code or accidental tweet? Image: Twitter / Edward Snowden If you’re a fan of puzzles, Edward Snowden may have just ruined your Friday. The former National Security Agency contractor turned whistleblower tweeted out a string of letters and numbers, which was either the result of him sitting on his phone or some cryptic code. Then, within minutes, he deleted it. This isn’t a code you can crack with Google (we tried), so therefore the people of the internet started falling over themselves to work out what the hell it meant. So far, there has been little success. Crowdsourcing has been known to solve huge problems like this before. Remember the dress? We solved that problem quickly. Marina Joyce? Yeah, armchair detectives had that worked out. Here’s a look at the legit attempts to crack Snowden’s code. Let’s be real, he probably just left Twitter open in his pocket. At this rate, we may never crack the code. Send help. Have something to add to this story? Share it in the comments.

Fair Usage Law

August 6, 2016   Posted in: Edward Snowden  Comments Closed

Edward Snowden issued a cryptic warning on Twitter – Business …

Edward Snowden, the former National Security Agency contractor turned whistleblower, issued a mysterious call for former colleagues to reconnect with him on Wednesday, tweeting “It’s time” to his more than 2million followers: Snowden also quoted a tweet by journalist and author Barton Gellman, who said that he is seeking information on Snowden’s work in the intelligence community so he can write Snowden’s biography, and “tell it truthfully.” Gellman elaborated in an encrypted message: I’m writing a book for Penguin Press called DARK MIRROR: Edward Snowden and the American Surveillance State. I want to hear from anyone who has first-hand information on either. It need not be some deep dark secret. I’m interested in your observations about Snowden’s work and work habits at CIA, Dell, NSA and Booz; or his time in the Army; or in computer training courses; or the surveillance programs and practices he described. Agree with him or not, I’d like to hear from you. The tweet comes less than a week after Snowden exchanged Twitter barbs with WikiLeaks. The antisecrecy organization implied that Snowden was trying to win the favor of Democratic presidential nominee Hillary Clinton in order to regain entry into the US. Snowden is living in exile in Russia after leaking information about the NSA’s surveillance programs in 2013. He has previously stated that his one condition for returning to the US would be the guarantee of a fair trialand the ability to argue his case before a jury againstthe charges he faces under the Espionage Act.

Fair Usage Law

August 4, 2016   Posted in: Edward Snowden  Comments Closed

Edward Snowden Is Not Down With WikiLeaks’ Methods After …

July 29, 2016, 7:57 AM EDT WikiLeaks is on a bit of a roll at the moment, most notoriously with its release of thousands of emails and even voicemail recordings from the U.S. Democratic National Committee (DNC) and the Democratic partys donors. It has also recently released emails from Turkeys ruling party, prompting WikiLeaks blockage in that country, and tweeted out a link to an unredacted database of most female Turkish voters. And Edward Snowden, the famous National Security Agency (NSA) whistleblower, thinks Julian Assanges whistleblowing pipeline is taking things too far. Get Data Sheet, Fortunes technology newsletter. Democratizing information has never been more vital, and WikiLeaks has helped, he tweeted. But their hostility to even modest curation is a mistake. WikiLeaks lashed back, accusing Snowden of opportunism in the hope of winning a pardon from Hillary Clinton, the Democratic candidate. It also said that curation should not include censorship of ruling party cash flows. Assanges operation has not only released the DNC emails and voicemails; it has also published a searchable database of Clintons emails from back when she was secretary of state. Both Snowden and Assange are currently trying to avoid being sent to the U.S. to face trial over data leaks. Assange has been holed up in Ecuadors London embassy for over three years, to avoid being extradited to Sweden for questioning over sex crime allegationshe is adamant that Sweden would then give him to the Americans. Snowden is in Russia, where WikiLeaks editor Sarah Harrison helped him get asylum after the U.S. canceled his passport (he was trying to get from Hong Kong to South America after revealing himself as the NSA leaker). For more on Edward Snowden, watch our video: While WikiLeaks often does not redact personal information from the data it publishes, Snowden has been relatively assiduous about working with journalists to publish only carefully chosen snippets of the NSA leaks, often with sections blacked out. As things stand, many security experts think Russian hackers gained access to the DNCs computer systems, apparently for a whole year, though not all agree that this means the Russian state was behind the hacks. It is certainly the case that Russian President Vladimir Putin is not Clintons biggest fan, but the smoking gun in this particular episode has not quite materialized yet.

Fair Usage Law

July 29, 2016   Posted in: Edward Snowden  Comments Closed

Edward Snowden and WikiLeaks clash over DNC leaks …

National Security Agency contractor turned whistle-blower Edward Snowden chided WikiLeaks on Thursday for its indiscriminate approach to leaking information, barely a week after the antisecrecy organization published 20,000 emails that were obtained in a hacking from the Democratic National Committee. The organization possesses a “hostility to even modest curation,” Snowden wrote on Twitter. WikiLeaks has attracted harsh criticism for failing to curate the information it leaks based on what is legitimately in the public’s interest. The organization has also made it a policy not to redact sensitive personal information that may be contained in the documents it exposes. WikiLeaks posted a sharp rebuttal, insinuating that Snowden was trying to curry favor with Democratic presidential nominee Hillary Clinton. The public clash is of particular interest, given Snowden’s previous collaboration with the organization. WikiLeaks came to Snowden’s aid in 2013, when he first leaked information about the NSA’s surveillance programs and sought a country in which he could request asylum. WikiLeaks submitted multiple asylum requests on Snowden’s behalf, including to Ecuador, which granted WikiLeaks founder Julian Assange asylum at its embassy in London. A WikiLeaks researcher eventually accompanied Snowden when he fled from Hong Kong to Moscow, where he now lives in exile. Glenn Greenwald, a journalist whom Snowden gave some of the leaked NSA documents in 2013, has also criticized WikiLeaks for failing to withhold information that might invade people’s privacy and is not a matter of public interest. NSA contractor turned whistle-blower Edward Snowden traded Twitter jabs with WikiLeaks on Thursday. The Guardian “Most of the information that we have withheld I’ve withheld on the grounds that it would invade people’s privacy, like emails that the NSA has collected between people, documents where they accuse people of engaging in certain bad acts without any proof,” Greenwald told Slate on Thursday, referring to the process by which he had chosen to release the NSA documents Snowden gave him. “We’ve done a lot of withholding information in order to protect people’s privacy or reputational interests or other legitimate interests,” Greenwald added. “We tried to balance these two competing values. WikiLeaks has said, criticizing us, that they no longer believe in any form of redaction. I do not ascribe to that view.” The latest WikiLeaks release of hacked DNC documents has prompted concerns that Russia is intervening in a US presidential election there is evidence that the DNC hack originated inside Russia and that the documents were given to WikiLeaks because of the organization’s ties to the Russian government. The Kremlin has denied accusations that it was involved. Snowden has previously weighed in on the incident, declaring earlier this week that the NSA is capable of tracing the stolen DNC emails back to Russia, if the country is indeed responsible. Natasha Bertrand contributed reporting.

Fair Usage Law

July 29, 2016   Posted in: Edward Snowden  Comments Closed

WikiLeaks, NSA leaker Edward Snowden clash on Twitter …

National Security Agency whistleblower Edward Snowden and transparency website WikiLeaks are clashing over how best to handle the publication of sensitive data, in a public spat played out over Twitter. WikiLeaks has come under increasing criticism over what it publishes, particularly following the release of what the website advertised as emails from Turkey’s ruling Justice and Development Party. When a large numbers of emails turned out to be little more than messages from ordinary citizens, critics said WikiLeaks should have exercised better discretion to protect innocent people’s privacy. Scroll down for video National Security Agency leaker Edward Snowden and transparency website WikiLeaks (pictured, its founder Julian Assange) are clashing over how best to handle the publication of sensitive data, in a public spat played out over Twitter. Snowden praised WikiLeaks on Thursday, tweeting, ‘Democratizing information has never been more vital, and @wikileaks has helped’ but then added that their ‘hostility to even modest curation is a mistake.’ WikiLeaks quickly fired back, tweeting:’Opportunism won’t earn you a pardon from Clinton & curation is not censorship of ruling party cash flows’. The group’s tweet served as dig at Snowden’s self-imposed exile in Russia, as he avoids facing criminal charges in the United States for stealing governmental property and violating classified information laws. Meanwhile a reporter for Mother Jones tweeted the group to ask: ‘Why release the VMs that have nothing to do with donor dinners (or maybe even the passionate supporter talking about Sanders)?’ But WikiLeaks defended its lack of curation and replied: ‘Our accuracy policy. We do not tamper with the evidentiary value of important historical archives.’ The release of a series of emails by the activist group last weekend caused discord in the party because they appeared to show favoritism within the DNC for Clinton over Sanders, who ran a close race for the nomination for the Nov. 8 election DNC Chairwoman Debbie Wasserman Schultz resigned shortly after the hacking scandal The release of a series of emails by the activist group last weekend caused discord in the party because they appeared to show favoritism within the DNC for Clinton over Sanders, who ran a close race for the nomination for the Nov. 8 election DNC Chairwoman Debbie Wasserman Schultz resigned shortly after the hacking scandal. The committee is supposed to be neutral. But the files were released in a raw form, some containing social security and credit card numbers, as well as dates of birth of DNC donors and guests. WikiLeaks also released nearly 300,000 emails from the AK Party dating from 2010 to July 6 this year. Obtained before the attempted coup, the date of their publication was brought forward ‘in response to the government’s post-coup purges’, WikiLeaks said on its website. The source of the emails was not connected to the coup plotters or to a rival political party or state, WikiLeaks said. But the leaks also contained details on thousands of women who are private Turkish citizens, although the group stressed that it did not publish that data itself.

Fair Usage Law

July 29, 2016   Posted in: Edward Snowden  Comments Closed

Edward Snowden weighs in on DNC leak – POLITICO

Edward Snowden said that greater disclosure could give the U.S. government a greater ability to attribute blame for the DNC hack. | AP Photo By Caroline Kelly 07/25/16 11:40 AM EDT Edward Snowden knows a thing or two about leaks. The former CIA employee and government contractor weighed in on WikiLeaks publication of thousands of emails by Democratic National Committee staffers, calling for greater transparency of government intelligence capabilities. Story Continued Below To summarize: the US Intel Community should modernize their position on disclosure. Defensive capabilities should be aggressively public, he tweeted as one of a seven-tweet series earlier Monday morning. Snowden, who now lives in asylum in Russia which has been widely accused of hacking the DNCs servers said more disclosure could give the U.S. government a greater ability to attribute blame for the DNC hack. If Russia hacked the #DNC, they should be condemned for it, Snowden tweeted, citing the way the FBI presented its findings related to the Sony hack in November 2014, which the agency attributed to North Korea. Evidence that could publicly attribute responsibility for the DNC hack certainly exists at #NSA, but DNI traditionally objects to sharing, he later added. The widespread knowledge of the formerly secret NSA data analysis program XKeyscore, which Snowed revealed in 2013, makes following exfiltrated data easy. I did this personally against Chinese ops, he tweeted. Snowden criticized the NSAs penchant for secrecy, adding, The aversion to sharing #NSA evidence is fear of revealing sources and methods of intel collection, but #XKEYSCORE is now publicly known. Snowden argued that publicizing the consequences of insidious data hacking clear is the best national defense. Without a credible threat that USG can and will use #NSA capabilities to publicly attribute responsibility, such hacks will become common, he tweeted, adding, This is the only case in which mass surveillance has actually proven effective. Though I oppose in principle, it is a mistake to ignore.

Fair Usage Law

July 28, 2016   Posted in: Edward Snowden  Comments Closed

Edward Snowden talks film debut and dramatizing his life in …

SAN DIEGO, Calif. When former NSA contractor-turned-whistleblower Edward Snowden met with Oscar-winning director Oliver Stone to discuss a movie on his life, he never thought he would be making his own film debut. Stone had initially interviewed Snowden to include him in DVD outtakes, Snowden said via video link late Thursday in San Diego after a screening of Stone’s “Snowden,” which stars Joseph Gordon-Levitt as the title character. But Snowden and Stone ended up filming nine takes for a scene in which he talks about his fears stemming from his actions. “I spoke at length just about personal values and just what it meant to me with the things that were happening since 2013,” said Snowden. “I guess he liked it. People do seem to respond to that.” The movie, due out in September, follows the 2013 events that led Snowden, a former contractor with the National Security Agency, to expose the U.S. government’s mass surveillance programs and flee the country after the government filed espionage charges against him. He was granted asylum in Russia later that year, and has lived there since with his girlfriend, Lindsay Mills. “When there is enough in the public record, you don’t really get to decide whether or not the movie gets made,” Snowden said. The film follows Snowden’s discovery of the U.S. government’s mass surveillance programs that digitally monitor unaware citizens. It fictionalizes and condenses some events, such as how Snowden smuggled the data out of the NSA – dramatized with a Rubik’s Cube in the film – and got it to documentary filmmaker Laura Poitras and Guardian journalist Glenn Greenwald in Hong Kong. “I admitted that I did not have a plan beyond getting straight out of there (Hong Kong), I planned to ask the world for justice and see what happened. It was kind of surprising how that worked out,” he said. Asked by an audience member if he was happy, Snowden said: “I actually live a surprisingly free life,” working with organizations such as the American Civil Liberties Union that Gordon-Levitt donated his “Snowden” acting fee to. “Every day, I’m working on something now that I can be proud of. I love my country, I love the things that we try to do,” he said. “The fact that Lindsay … has been with me for ten years, is still with me, that’s something that just makes me happy every day.” (Editing by Bernadette Baum)

Fair Usage Law

July 26, 2016   Posted in: Edward Snowden  Comments Closed

Edward Snowden Designs Anti-Spying iPhone Case | Inc.com

Edward Snowden – the man who leaked classified information from the National Security Agency (NSA) in 2013 and who is hailed by some as a whistleblower and condemned by others as a traitor – has co-created a conceptual iPhone case intended to prevent governments and various other parties from spying on smartphone users. Smartphones, are of course, easily trackable – a “perfect tracking device” in Snowden’s words – and both governments and criminals can obtain all sorts of information about users (including the users’ locations) by monitoring signals emitted by phones. Such surveillance can jeopardize the safety and effectiveness of both activists and journalists; at least one journalist, Marie Colvin, is believed to have been killed in Syria after signals from her phone were used to establish her location as a target. Of course, modern smartphones have “Airplane” modes that theoretically shut off transmissions. But such modes don’t really terminate all communications – GPS often remains on, and some other communications may also still occur. I have, for example, received text messages while sitting on the New York City subway with my phone in Airplane mode; someone looking to see where I was could send a series of texts and look for a beeping phone. Malware on a phone could also theoretically allow the phone to display that it is in Airplane mode when it is not. Snowden and hardware hacker, Andrew Huang, co-authored a paper presenting a possible solution to this problem: they proposed a smartphone case that is connected to the phone and alerts the user when the phone is making transmissions. The case – which they dubbed the “introspection engine” — contains wires that feed into the phone via the SIM card slot and attach to various components inside the phone. The case utilizes its own computer and display; the display shows status information for phone communications (GPS, Bluetooth, WiFi, cellular service), and the case can set off an alarm if it detects an occurrence of unusual activity. Snowden and Huang presented their paper this past Thursday at the MIT Media Lab; Snowden obviously did not attend in person; he video-conferenced in from Russia where he is currently living as a fugitive, wanted by law enforcement in the United States. At this point, the “introspection engine” is just a concept – no prototype even exists yet -and, while the case may have value to a select small group of people, it is unlikely to become widespread. For most people, turning off one’s smartphone is sufficient to prevent it from making transmissions. Worried about malware that fakes a power-off? Place your device in a Faraday type case that blocks transmissions; various models of such cases are sold online and there is a new high-end model with all sorts of other security features being shown at the HOPE Conference currently underway in New York. Of course, such cases are not 100% perfect – but, for, most people, they suffice – and, even in the case of journalists in rogue nations such cases might already offer sufficient protection. Unlike Faraday cases, the proposed Snowden case doesn’t block signals – it just warns when a signal is being sent and, if an optional kill switch is added, kills the transmission – so, in highly sensitive situations, it might still pay to use the Faraday case around the phone even if the device sports an “introspection engine” type case. Also, note that if someone wants to use the phone feature at times, but wants to ensure that the phone isn’t making unauthorized transmissions, the case itself isn’t going to do much, as it cannot detect if extra information is going out via the cellular connection when that connection is in use. What it might catch are packets being sent at irregular times or if cellular data is sent when that feature is showing on the phone as being disabled, and the user intends to use only WiFi. Another approach might be far simpler thanthe “introspection engine” – if you are going into a place where you need to worry about transmissions, use an old non-connected organizer and camera, and use a non-smart-phone phone with a removable battery – and keep it is a Faraday Box even when it is off. I am also not sure how much protection the Snowden case actually providesagainst government spying. Governments have the ability to track users through the wireless providers in their respective regions – they don’t need to hack cellphones and program the devices to make unauthorized transmissions in order to track people’s locations. The “introspection engine” is certainly interesting – although I suspect that if it had been invented by someone less famous, not many people would have even taken notice. And, as it is just a theoretical object at this point, nobody can say for certain if it would even work as intended. As Snowden hopes toworkon developing a prototype, time will tell.

Fair Usage Law

July 26, 2016   Posted in: Edward Snowden  Comments Closed


Fair Use Disclaimer

"Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the government for a redress of grievances."

Under the 'fair use' rule of copyright law, an author may make limited use of another author's work without asking permission. Fair use is based on the belief that the public is entitled to freely use portions of copyrighted materials for purposes of commentary and criticism. The fair use privilege is perhaps the most significant limitation on a copyright owner's exclusive rights.

Fair use as described at 17 U.S.C. Section 107:

"Notwithstanding the provisions of section 106 and 106A, the fair use of a copyrighted work, including such use by reproduction in copies or phono-records or by any other means specified by that section, for purposes such as criticism, comment, news reporting, teaching (including multiple copies for classroom use), scholarship, or research, is not an infringement of copyright.

In determining whether the use made of a work in any particular case is a fair use the factors to be considered shall include:

  • (1) the purpose and character of the use, including whether such use is of a commercial nature or is for or nonprofit educational purposes,
  • (2) the nature of the copyrighted work,
  • (3) the amount and substantiality of the portion used in relation to the copyrighted work as a whole, and
  • (4) the effect of the use upon the potential market for or value of the copyrighted work."