Deliberate leaking is a time-honored government tactic that Trump doesn't understand

Governments have "official" unofficial leaking policies, releasing tons of confidential material to the press without any attribution or public acknowledgement: they leak stuff to maintain good press relations, to test out ideas, to hurt their in-government rivals, or to let information be generally known without having to answer difficult questions about it (for example, letting the press report on "secret" drone strike in Yemen without a press-conference where embarrassing questions about civilian casualties might come up). Read the rest

Trump vs Leakers: the infographic

A handy guide from Chartlike Charts, whose return from its hiatus is both welcome and overdue. Read the rest

It's very hard to maintain an anonymous Twitter account that can withstand government-level attempts to de-anonymize it

It's one thing to set up an "anonymous" Twitter Hulk account whose anonymity your friends and colleagues can't pierce, because the combination of your care not to tweet identifying details, the stilted Hulk syntax, and your friends' inability to surveil the global internet and compel phone companies to give up their caller records suffice for that purpose. Read the rest

What does U.S. law say about White House staffers leaking Trump dirt to the press?

“Until Trump can remedy his problem of credibility and faith, the truth will find a way.”

Read the rest

"Do you go camping or play paintball?" and 47 other questions from the FBI's secret terrorist-detection questionnaire

The Intercept "obtained a copy" of the FBI's 48-question, 2015 "Indicators of Mobilization to Violence" protocol, a list of 48 questions that FBI investigators can use to determine if a subject is at risk for committing terrorist acts. Read the rest

Leaked FBI manual reveals agency targets innocents as informants, blackmails them into cooperating, can deport them afterwards

Today, The Intercept has published a minimally redacted version of a 2015 edition of the FBI's Confidential Human Source Policy Guide, along with a series of in-depth articles reporting on the document (including the FBI's confirmation of a conspiracy by white supremacists to infiltrate law enforcement agencies). Among the most explosive revelations are the ways in which the FBI coerces domestic and foreign informants. Read the rest

Barcelona government officially endorses Tor-based whistleblower platform

Xnet, a wonderful Spanish activist group, has created the Anti-Corruption Complaint Box, a whistleblowing platform for the city of Barcelona that allows people to file anonymous claims in a Globalleaks repository, with their anonymity protected by Tor. Read the rest

The first-ever close analysis of leaked astroturf comments from China's "50c party" reveal Beijing's cybercontrol strategy

The Harvard Institute for Quantitative Science team that published 2016's analysis of the Chinese government's '50c Party', who flood social media with government-approved comments has published a new paper, How the Chinese Government Fabricates Social Media Posts for Strategic Distraction, not Engaged Argument, in which they reveal their painstaking analysis of a huge trove of leaked emails between 50c Party members and their government handlers. Read the rest

Political leaks disrupt Ecuadoran election

Opponents of Ecuadoran president Rafael Correa -- himself a prolific and shrewd social media campaigner -- have had their social media accounts hacked and used to dump embarrassing transcripts purporting to show their party in disarray and romantic scandals in their personal lives. Read the rest

Real-world whistleblowing vs Malcolm Gladwell's bizarre theory of whistleblowing

Malcolm Gladwell has an article in this month's New Yorker that dismisses Edward Snowden's claims to legitimacy and legal protection, while elevating Daniel Ellsberg's Pentagon Papers breach to an act of heroism; Gladwell sets out criteria for legitimate whistleblowing that treats Snowden as a "radicalized hacker" and Ellsberg as a "good leaker," and says that Snowden should have gone through official channels, rather than disclosing to journalists. Read the rest

In Africa, British spies target allied leaders, executives, and telcoms engineers

Le Monde has published a new collection of documents from the whistleblower Edward Snowden, showing that the British spy agency GCHQ targeted the leaders of allied countries in Africa, as well as business executives and employees of telecommunications companies, whose accounts were a means to gaining access to communications infrastructure across the continent. Read the rest

Projecting leaked NSA docs on the side of AT&T's windowless NYC spy-center

Earlier this month, Henrik Moltke helped report the extent to which the massive, windowless, bombproof AT&T tower at 33 Thomas Street was implicated in illegal NSA surveillance of US and international communications, revealing that the tower was almost certainly the site referred to as TITANPOINTE in Snowden docs. Read the rest

The Shadow Brokers dump more intel from the NSA's elite Equation Group

In August, anonymous hacker(s) dumped a cache of cyberweapons that appeared to originate with The Equation Group, an elite, NSA-affiliated hacking squad. Read the rest

Leaked Kremlin memos reveal plan to destabilize Ukraine

The Kiberkhunta hacker group has dumped 2,000 messages from Putin aide Vladislav Surkov's email, including two documents related to the Kremlin's plans to consolidate their annexation of Ukraine: "Priority Action Plan to Destabilize the Social-Political Situation in Ukraine," and "Concrete Action Plan on the Promotion of the Federal Status of Zakarpattia Oblast." Read the rest

Tax-funded NZ company sold mass surveillance tech to torturers and GCHQ

A whistleblower has provided The Intercept with leaked documents about Endace, an obscure New Zealand company based in Auckland, revealing that the company -- which received millions in government funding -- developed the mass surveillance equipment used by the UK spy agency to engage in illegal mass surveillance on fiber-optic lines that traverse the UK, and that Endace's customer list also includes a who's-who of telcoms companies, spy agencies, and the Moroccan secret police, who make a practice of spying on people, then kidnapping and torturing them. Read the rest

WikiLeaks reveals President Barack Obama's personal email address

The stolen emails recently published by WikiLeaks reveal that President Barack Obama's email address during the presidential transition at the end of the 2008 campaign was bobama@ameritech.net.

Read the rest

Ecuadoran Embassy confirms it changed its wifi password to lock out Assange

The Ecuadoran Embassy in London has confirmed Wikileaks' accusation that it terminated Julian Assange's access to its wifi network because it disapproved of Assange and Wikileaks' "intervention in the affairs of other states" by publishing material pertaining to the impending US election. Read the rest

More posts