If you're in Los Angeles this evening, please join me at a special screening of the documentary about the late Aaron Swartz, "The Internet's Own Boy." The film has been shortlisted for an Academy Award. After the screening, I will host a question and answer session with the film's director, Brian Knappenberger.
Read the rest
reports on how one of the world's poorest countries is tackling developmental challenges. Read the rest
Courts have appreciated that even distributed denial of service attacks can be legitimate form of public protest. Molly Sauter
on the insane U.S. law used to criminalize them and other forms of online activism.Read the rest
A hacking incident may have affected the personal data of thousands of South Koreans employed by the US military. "Gen. Curtis M. Scaparrotti, commander of U.S. Forces in South Korea, apologized Thursday for the 'possible theft' from two databases of private details of South Koreans such as names, contact information and work history," reports AP. Roughly 16,000 current and past workers and others who have sought jobs with the U.S. military in South Korea, are affected.
"An elaborate, three-year cyberespionage campaign against United States military contractors, members of Congress, diplomats, lobbyists and Washington-based journalists has been linked to hackers in Iran." The NYT's Nicole Perlroth has more
from a report released this week by the Dallas computer security firm iSight Partners
The US government may use visa restrictions to ban hackers from China from participating in the 2014 Defcon hacker conference in Las Vegas. The move is part of a larger effort by the US to combat Chinese internet espionage.
Read the rest
The Unit 61398 building in Shanghai that Washington says is the origin of attacks on American computer systems. Photograph: Carlos Barria/Reuters
From the government-controlled China Daily on the recent US charges of hacking by China: "We should encourage organizations and individuals whose rights have been infringed to stand up and sue Washington. Regarding the issue of network security, the US is such a mincing rascal that we must stop developing any illusions about it."
A map of China is seen through a magnifying glass on a computer screen showing binary digits in Singapore in this January 2, 2014 photo illustration. Picture taken January 2, 2014. REUTERS/Edgar Su.
The Justice Department this week indicted five hackers
linked to China’s People’s Liberation Army. The hackers are accused of stealing data from six US companies
, and represent a "cyberwar" escalation with China: what was a diplomatic discomfort is now a criminal matter. "But cybersecurity policy-watchers say that the arrival of the indictments in the wake of Snowden’s serial revelations could both lessen the charges’ impact and leave American officials open to parallel criminal allegations from Chinese authorities," writes Wired's Andy Greenberg
Andrew “Weev” Auernheimer, in 2012. Photo: pinguino.
Notorious hacker and troll weev was released from prison this evening. A federal appeals court today overturned his conviction in a case of significance for all security researchers.
Weev exposed a security flaw in AT&T's website and obtained the personal data of more than 100,000 iPad users. He was charged with violating the Computer Fraud and Abuse Act (CFAA), and sentenced to three and a half years in prison. Today's ruling says prosecutors did not have the right to charge him in a state where none of the alleged crimes occurred.
Read the rest
Joshua Lifton is one of the founders of Crowd Supply, a company that crowdfunds around products. They take a very different approach to preparation, funding, and follow-up than Kickstarter. Kickstarter just announced that it had crossed $1bn in pledges in its five-year lifetime. Of that, it's disbursed nearly $850m. It's on track to facilitate perhaps half a billion in 2014 alone.
The name Kickstarter may be used interchangeably with the term crowdfunding, and it is the 800 lb. gorilla in the space. (Watch out for the shipping charges on that gorilla, especially internationally.) But in its wake, hundreds of millions of dollars are being raised from all sorts of other sites which fill in important aspects of ecosystem, and Crowd Supply is one of them.
The New Disruptors: RSS | iTunes | Download this episode | Listen on Stitcher
This episode is sponsored by:
Media Temple: Web hosting for artists, designers, and Web developers since 1998. World-class support available 24x7 through phone and chat—and even Twitter. Sign up with coupon code "tnd" to get 25% off your first month of hosting.
Mailchimp helps more than five million people and businesses around the world use MailChimp to send email newsletters. They sent 70 billion messages on their behalf in 2013! They also have hats for cats and small dogs.
Read the rest
Stephen Jin-Woo Kim. Image: Stephen Kim Legal Defense Trust.
Former State Department official Stephen Kim announced today he will plead guilty to leaking classified information to Fox News journalist James Rosen and will serve 13 months in jail.
The case sparked controversy last year when it was revealed the Justice Department named Rosen a “co-conspirator” in court documents for essentially doing his job as a journalist. But a largely ignored ruling in Kim’s case may have far broader impact on how sources interact with journalists in the future.
Read the rest
Kevin Poulsen at Wired News
: "While investigating a hosting company known for sheltering child porn last year the FBI incidentally seized the entire e-mail database of a popular anonymous webmail service called TorMail. Now the FBI is tapping that vast trove of e-mail in unrelated investigations." [Threat Level]
Daniel Ellsberg. Photo: Xeni Jardin.
Pentagon Papers whistleblower (and our co-founder) Daniel Ellsberg held an expansive, seven-hour long Reddit “Ask Me Anything” session yesterday to explain why NSA whistleblower Edward Snowden will join our board of directors. He also discussed many other subjects—including NSA surveillance, President Obama’s flip-flop on whistleblowers, Nixon’s dirty tricks, and the dangers of excessive government secrecy.
Below are some of our favorite questions and answers. But make sure to read the last remarkable exchange, in which Mr. Ellsberg finds out—for the first time—that the Nixon administration had surveillance of him from before the Pentagon Papers were leaked.
Read the rest
KQED created this video of the 2013 Science Hack Day San Francisco organized by BB pal Ariel Waldman! More than 200 people -- makers, scientists, artists, designers, etc. -- spent the night at the California Academy of Sciences and hacked on a fantastically diverse and compelling assortment of prototypes, demos, and experiments. Ariel says "Here's how you can organize a Science Hack Day in your own city!"
Facebook and Microsoft have reached a agreements with the U.S. government "to release limited information about the number of surveillance requests they receive," which Reuters' Joe Menn and Gerry Shih report is a partial victory
for the companies struggling with "fallout from recent disclosures about the NSA's secret program. "
Facebook and Microsoft released some information about the scope of secret orders with which each company has complied.
Google said Friday it is "negotiating with the government and that the sticking point was whether it could only publish a combined figure for all requests," adding that this would be "a step back for users," because it "already breaks out criminal requests and National Security Letters, another type of intelligence inquiry."