Pirated copies of two O'Reilly books on hacking, Hacking: The Next Generation and Inside Cyber Warfare: Mapping the Cyber Underworld were hosted on Sony's internal servers. Read the rest
A new Wikileaks-published leak from the secretive Trans Pacific Partnership (TPP) treaty reveals a January 2015 draft "Investment Chapter" of the agreement, where the investor-state dispute settlement (ISDS) mechanisms are set out. They allow companies to repeal nations' environmental, health and labor laws. Read the rest
The company says that it fought the warrants and their gag orders, and the reason they weren't able to follow Twitter's suit by disclosing the warrants' existence was that prosecutors were furious over the public backlash when Twitter got to disclose. Read the rest
Al Billings writes, "Jacob Appelbaum discusses the fallacy of Americans thinking that they won't be targeted, passive and active surveillance methods, AI and human analyst systems working together, satellite networks, deep packet inspection & injection, military contractors getting special access to surveillance programs, proprietary vs open source software, OTR messaging, hoarding exploits for self-gain." Read the rest
Mostly lost in the past week's media gossip around NYT executive editor Jill Abramson's ouster, and Dean Baquet's promotion to her role: Baquet is the former LA Times editor who killed the biggest NSA leak pre-Edward Snowden.
Censorship invites abuse. In China, the widespread practice of Internet censorship means that lots of people are authorized to hand down censorship orders and lots more people naturally turn to censorship when something on the Internet bugs them. This week, Chinese authorities prosecuted an "Internet policeman" who took payments from companies in return for censoring unfavorable remarks about them on social media. He's accused of censoring more than 2,500 posts in return for over $300K in payments. He also collaborated with another official to censor critical remarks about government officials. It seems unlikely that Gu, the Internet policeman who was arrested, and Liu, his collaborator, were the only two censors-for-hire in the Chinese system.
Lest you think that this problem is uniquely Chinese, consider that when Wikileaks leaked the Great Firewall of Australia's blacklist, we learned that more the half the sites on the list didn't meet the censorship criteria. And when the Danish and Swedish blacklists were analyzed, it emerged that more than 98 percent of the sites blocked did not meet the official criteria for censorship. And in the UK, the national firewall once blocked all of Wikipedia.
Two of my friends contributed afterwords to my novel Homeland: Aaron Swartz and Jacob Appelbaum. In this outtake from the independently produced Homeland audiobook (which you can get for the next week exclusively through the Humble Ebook Bundle), Jake reads his afterword at The Hellish Vortex Studio in Berlin, where he is in exile after several harrowing adventures at the US border. Hellish Vortex is run by Alec Empire, founding member of Atari Teenage Riot. Alec recorded this clip (MP3), and also mixed an alternate version.
Originally Jake had intended for his afterword to be anonymous (I didn't understand this at the time, and there was no harm done!). In keeping with this, Alec mixed this vocoder edition (MP3), that is pretty awesome.
From O'Hagan's account of their first meeting, in which they discussed the sort of book Assange originally wished to write--part memoir, part manifesto:
The Intercept today published documents leaked by whistleblower Edward Snowden which show that the NSA and Britain's GCHQ targeted WikiLeaks with an array of surveillance tactics and spied on supporters.
From the report by Glenn Greenwald and Ryan Gallagher:
The efforts – detailed in documents provided previously by NSA whistleblower Edward Snowden – included a broad campaign of international pressure aimed not only at WikiLeaks founder Julian Assange, but at what the U.S. government calls “the human network that supports WikiLeaks.” The documents also contain internal discussions about targeting the file-sharing site Pirate Bay and hacktivist collectives such as Anonymous.