background preloader

In English

Facebook Twitter

WikiLeaks publishes 'unprecedented' secret Australian court suppression order. Julian Assange: 'The Australian government is not just gagging the press, it is blindfolding the public.' Photo: AFP Social media users could be charged for sharing report WikiLeaks has struck again, releasing the text of a secret court order that cannot be published in Australia. The anti-secrecy group has this morning published a Victorian Supreme Court suppression order that WikiLeaks publisher Julian Assange describes as “unprecedented” in scope.

The suppression order is itself suppressed. No Australian media organisation can legally publish the document or its contents. Advertisement In a statement provided to Fairfax Media, Assange said it was “completely egregious to block the public's right to know and suppress the media in any instance, and especially in cases of international corruption involving politicians and subsidiaries of a public organisation”. "The Australian government is not just gagging the press, it is blindfolding the Australian public," Assange said. A.HRC.27.37_en.pdf. US Military Admits Spending Millions to Study Manipulation of Social Media Washington's Blog. Blacklisted: The Secret Government Rulebook For Labeling You a TerroristThe Intercept. The Obama administration has quietly approved a substantial expansion of the terrorist watchlist system, authorizing a secret process that requires neither “concrete facts” nor “irrefutable evidence” to designate an American or foreigner as a terrorist, according to a key government document obtained by The Intercept.

The “March 2013 Watchlisting Guidance,” a 166-page document issued last year by the National Counterterrorism Center, spells out the government’s secret rules for putting individuals on its main terrorist database, as well as the no fly list and the selectee list, which triggers enhanced screening at airports and border crossings. The new guidelines allow individuals to be designated as representatives of terror organizations without any evidence they are actually connected to such organizations, and it gives a single White House official the unilateral authority to place entire “categories” of people the government is tracking onto the no fly and selectee lists. The NSA Wants You to Trust Tor, Should You? In the ongoing drizzle of Snowden revelations the public has witnessed a litany of calls for the widespread adoption of online anonymity tools.

One such technology is Tor, which employs a network of Internet relays to hinder the process of attribution. Though advocates at the Electronic Frontier Foundation openly claim that “Tor still works[i]” skepticism is warranted. In fact anyone risking incarceration (or worse) in the face of a highly leveraged intelligence outfit like the NSA would be ill-advised to put all of their eggs in the Tor basket. This is an unpleasant reality which certain privacy advocates have been soft-pedaling. The NSA Wants You To Use Tor Tor proponents often make a big deal of the fact that the NSA admits in its own internal documents that “Tor Stinks,” as it makes surveillance more work-intensive[ii].

What these proponents fail to acknowledge is that the spies at the NSA also worry that Internet users will abandon Tor: “[A] Critical mass of targets use Tor. Notes. [HOPE X] Welcome to Hackers On Planet Earth! [HOPE X] Olsen Room Video Stream. [HOPE X] Streaming Live! Edward Snowden urges professionals to encrypt client communications | World news. Loaded: 0% Progress: 0% The NSA whistleblower, Edward Snowden, has urged lawyers, journalists, doctors, accountants, priests and others with a duty to protect confidentiality to upgrade security in the wake of the spy surveillance revelations.

Snowden said professionals were failing in their obligations to their clients, sources, patients and parishioners in what he described as a new and challenging world. "What last year's revelations showed us was irrefutable evidence that unencrypted communications on the internet are no longer safe. Any communications should be encrypted by default," he said. The response of professional bodies has so far been patchy. A minister at the Home Office in London, James Brokenshire, said during a Commons debate about a new surveillance bill on Tuesday that a code of practice to protect legal professional privilege and others requiring professional secrecy was under review.

During the seven hours of interview, Snowden: Edward Snowden: 'If I end up in chains in Guantánamo I can live with that' - video interview. Meet the Muslim-American Leaders the FBI and NSA Have Been Spying On - The InterceptThe Intercept. The National Security Agency and FBI have covertly monitored the emails of prominent Muslim-Americans—including a political candidate and several civil rights activists, academics, and lawyers—under secretive procedures intended to target terrorists and foreign spies. According to documents provided by NSA whistleblower Edward Snowden, the list of Americans monitored by their own government includes: • Faisal Gill, a longtime Republican Party operative and one-time candidate for public office who held a top-secret security clearance and served in the Department of Homeland Security under President George W.

Bush; • Asim Ghafoor, a prominent attorney who has represented clients in terrorism-related cases; • Hooshang Amirahmadi, an Iranian-American professor of international relations at Rutgers University; • Agha Saeed, a former political science professor at California State University who champions Muslim civil liberties and Palestinian rights; Faisal Gill Asim Ghafoor.

JTRIG Tools and Techniques. In NSA-intercepted data, those not targeted far outnumber the foreigners who are. Ordinary Internet users, American and non-American alike, far outnumber legally targeted foreigners in the communications intercepted by the National Security Agency from U.S. digital networks, according to a four-month investigation by The Washington Post. Nine of 10 account holders found in a large cache of intercepted conversations, which former NSA contractor Edward Snowden provided in full to The Post, were not the intended surveillance targets but were caught in a net the agency had cast for somebody else. Many of them were Americans. Nearly half of the surveillance files, a strikingly high proportion, contained names, e-mail addresses or other details that the NSA marked as belonging to U.S. citizens or residents. NSA analysts masked, or “minimized,” more than 65,000 such references to protect Americans’ privacy, but The Post found nearly 900 additional e-mail addresses, unmasked in the files, that could be strongly linked to U.S. citizens or U.S.residents.

“The operational data?” NSA Targets the Privacy-Conscious for Surveillance. Jake Appelbaum et. al, are reporting on XKEYSCORE selection rules that target users -- and people who just visit the websites of -- Tor, Tails, and other sites. This isn't just metadata; this is "full take" content that's stored forever. This code demonstrates the ease with which an XKeyscore rule can analyze the full content of intercepted connections. The fingerprint first checks every message using the "email_address" function to see if the message is to or from "bridges@torproject.org". Next, if the address matched, it uses the "email_body" function to search the full content of the email for a particular piece of text - in this case, " It's hard to tell how extensive this is. Whatever the case, this is very disturbing. EDITED TO ADD (7/3): The BoingBoing story says that this was first published on Tagesschau.

And, since Cory said it, I do not believe that this came from the Snowden documents. EDITED TO ADD (7/3): More news stories. NSA targets the privacy-conscious (Seite 1)| Das Erste - Panorama - Meldungen. NSA targets the privacy-conscious von J. Appelbaum, A. Gibson, J. Goetz, V. The investigation discloses the following: Two servers in Germany - in Berlin and Nuremberg - are under surveillance by the NSA. Disclosure Three authors of this investigation have personal and professional ties to the Tor Project, an American company mentioned within the following investigation. It is a small server that looks like any of the other dozens in the same row. Yet despite these efforts, one of the servers is targeted by the NSA.

The IP address 212.212.245.170 is explicitly specified in the rules of the powerful and invasive spy software program XKeyscore. After a year of NSA revelations based on documents that focus on program names and high-level Powerpoint presentations, NDR and WDR are revealing NSA source code that shows how these programs function and how they are implemented in Germany and around the world. Xkeyscorerules100.