
Julian Assange on His New Book, When Google Met WikiLeaks Julian Assange, the 43-year-old founder and editor-in-chief of WikiLeaks, has been living in the Ecuadorian Embassy in London since June of 2012. He occupies a single room in the building, a couple hundred square feet of space cluttered with work and life. He avoids using email and tries to interact with his staff only in person. “I have to act like Osama bin Laden now,” he writes in his recently published book, When Google Met WikiLeaks (OR Books). The book chronicles the afternoon in 2011 when he was visited by four individuals: Eric Schmidt, executive chairman of Google; Jared Cohen, director of Google Ideas; Lisa Shields, vice president of the Council on Foreign Relations; and Scott Malcomson, the communications director for the International Crisis Group. Ecuador has granted Assange asylum, but the United Kingdom will not allow Assange, who is Australian, passage to South America. But there’s a difference between leadership and direction—coercive control over something.
Web Liberty and Privacy The fifth and sixth public meetings of Google’s advisory council met in Berlin and London recently, inviting experts and the public to discuss the outcome of the recent “right to be forgotten ruling” made by the European court of Justice. Adviser Luciano Floridi explains the consultations. One of the crucial questions of our age is who may legitimately exercise what power over which kind of information. This is also one of the thorny issues raised by the ruling of the European court of justice (ECJ) against Google on the so-called “right to be forgotten”. The question is complicated because one may interpret “who”, “what power” and “which information” in many ways and end up talking at cross-purposes. In terms of power, the last three are legal entities that do not generate the personal information or its links (the two relevant types of information under discussion) but can determine how the other entities manage both. The mess concerns the first three entities.
Assange: Google Is Not What It Seems In June 2011, Julian Assange received an unusual visitor: the chairman of Google, Eric Schmidt, arrived from America at Ellingham Hall, the country house in Norfolk, England where Assange was living under house arrest. For several hours the besieged leader of the world’s most famous insurgent publishing organization and the billionaire head of the world’s largest information empire locked horns. The two men debated the political problems faced by society, and the technological solutions engendered by the global network—from the Arab Spring to Bitcoin. They outlined radically opposing perspectives: for Assange, the liberating power of the Internet is based on its freedom and statelessness. Newsweek Magazine is Back In Print In this extract from When Google Met WikiLeaks Assange describes his encounter with Schmidt and how he came to conclude that it was far from an innocent exchange of views. I was intrigued that the mountain would come to Muhammad. Some time later Jared Cohen arrived.
Lone lawyer sues Obama, alleging illegality of surveillance programs Justice Department lawyers have asked a federal court in Pittsburgh to dismiss a sweeping lawsuit brought earlier this year by a local lawyer against President Barack Obama and other top intelligence officials. In a new motion to dismiss filed on Monday, the government told the court that the Pittsburgh lawyer, Elliott Schuchardt, lacked standing to make a claim that his rights under the Fourth Amendment have been violated as a result of multiple ongoing surveillance programs. Specifically, Schuchardt argued in his June 2014 complaint that both metadata and content of his Gmail, Facebook, and Dropbox accounts were compromised under the PRISM program as revealed in the documents leaked by former National Security Agency (NSA) contractor Edward Snowden. In an e-mail to Ars on Wednesday, Marcia Berman, a senior trial counsel who authored the motion to dismiss, said, "Per department policy, attorneys do not comment to the media on litigation." As Berman wrote in the motion to dismiss:
Right to Online Privacy at Risk as Governments Engage in Mass Surveillance – Counter-terrorism Expert Human Wrongs Watch States must be transparent about the nature of their electronic mass surveillance programmes, an independent United Nations counter-terrorism expert said on 23 October 2014 as he warned about the impact such measures might have on individuals’ right to privacy. “States need to squarely confront the fact that mass surveillance programmes effectively do away with the right to online privacy altogether,” Ben Emmerson, Special Rapporteur on the promotion and protection of human rights while countering terrorism, told the General Assembly body dealing with cultural, social and humanitarian issues (Third Committee) during the presentation his latest report. “No” to the Analogy that “Sending an email is like sending a post-card” Emmerson has long emphasized the need for transparency and accountability in government intelligence gathering operations. “Individuals must have the right to seek an effective remedy for any alleged violation of their online privacy rights,” he said.
Snowden Attacks “Anything Goes” Privacy Intrusions Of British Spy Agencies In what amounts to a wake up call directed at a British public generally considered apathetic on privacy issues, NSA whistleblower Edward Snowden has warned that U.K. spy agencies are using digital technology to conduct mass population surveillance without any checks and balances at all — overreaching and encroaching on privacy rights in a way that he characterized as even worse than the U.S. National Security Agency’s inroads into citizens’ rights. Snowden was making his first (virtual) appearance in the UK since blowing the whistle on the NSA last year, speaking at the Observer Festival of Ideas event being held today in London. “We have an extraordinary large, secret and unaccountable mass surveillance system in the United States — and that’s when we have constitutional protections that prohibit even the passage of any laws that might enable those programs. “GCHQ and other British spy agencies can do anything they want. “That’s not how rights work, right,” he said.
Julian Assange: Google’s Basic Business Model ‘Same as the NSA’s’ In a conversation with “Imaginary Lines” host Chris Spannos, WikiLeaks founder and Editor-in-Chief Julian Assange discussed his new book, “When Google Met WikiLeaks,” which is based on a conversation Assange had with Google Executive Chairman Eric Schmidt. Assange’s book was published by OR Books on Sept. 18. Spannos asked Assange why he described Google as an “empire.” Assange responded: “That phrase, ‘evil empire,’ was introduced by Reagan in the 1980s to describe the Soviet empire. But of course encoded within that is that the other empire is not an evil empire. teleSUR English:
Wikileaks Publishes Updated Intellectual Property TPP Chapter Today, Thursday 16 October 2014, WikiLeaks released a second updated version of the Trans-Pacific Partnership (TPP) Intellectual Property Rights Chapter. The TPP is the world’s largest economic trade agreement that will, if it comes into force, encompass more than 40 per cent of the world’s GDP. The IP Chapter covers topics from pharmaceuticals, patent registrations and copyright issues to digital rights. Despite the wide-ranging effects on the global population, the TPP is currently being negotiated in total secrecy by 12 countries. The selective secrecy surrounding the TPP negotiations, which has let in a few cashed-up megacorps but excluded everyone else, reveals a telling fear of public scrutiny. The 77-page, 30,000-word document is a working document from the negotiations in Ho Chi Minh City, Vietnam, dated 16 May 2014, and includes negotiator’s notes and all country positions from that period in bracketed text.
Julian Assange - Google Is Not What It Seems Google Is Not What It Seems by Julian Assange Google Chairman Eric Schmidt shares a joke with Hillary Clinton during a special "fireside chat" with Google staff. In this extract from his new book When Google Met Wikileaks, WikiLeaks' publisher Julian Assange describes the special relationship between Google, Hillary Clinton and the State Department -- and what that means for the future of the internet. ric Schmidt is an influential figure, even among the parade of powerful characters with whom I have had to cross paths since I founded WikiLeaks. In some ways the higher echelons of Google seemed more distant and obscure to me than the halls of Washington. I was intrigued that the mountain would come to Muhammad. The stated reason for the visit was a book. Director of Google Ideas, and "geopolitical visionary" Jared Cohen shares his vision with US Army recruits in a lecture theatre at West Point Military Academy on 26 Feb 2014 (Instagram by Eric Schmidt) Schmidt was a good foil. Notes Ibid.
Verizon Wireless tracking on its customers by injecting UID into all HTTP requests made on the VZW network Verizon Wireless, the United State’s largest telecom operator, has moved into the mobile ad business. They have been serving ads since May 2014. Whatever Verizon does to earn revenues is nobody’s business but it seems that Verizon is tracking the customer habits to publish their ads. As per a research published by, Jonathan Mayer, a computer scientist and lawyer at Stanford, who takes consumer privacy very strongly, Verizon is using the headers in the HTTP section to track its customers and gauge their spending habits. Verizon Wireless is injecting a unique identifier (UID) into web requests, as data transits the network in each and every customer of Verizon Wireless Network (VZW). As per the law only those who have opted for CPNI can be monitored through such methods. On my phone, for example, here’s the extra HTTP header.X-UIDH: OTgxNTk2NDk0ADJVquRu5NS5+rSbBANlrp+13QL7CXLGsFHpMi4LsUHw Mayer has made a brief infographic of how he feels the header is working :
EXPERT: Here Are 4 Things Edward Snowden Gets Wildly Wrong About The NSA 3. The NSA is Watching Your Porn Ok, let’s tackle the porn question. In the Wired article, and in previous reports, it was mentioned that the NSA has used a target’s porn viewing habits to undermine or manipulate them. Does this mean the NSA is watching your porn too? However, if you were traveling to China and happened to use a [REDACTED] that the NSA had access to, it’s possible, although highly improbable, that your data would get collected along with everything else. REUTERS/Jonathan ErnstA demonstrator holds up a sign at the "Stop Watching Us: A Rally Against Mass Surveillance" march near the U.S. But once the data was imported into the NSA, your data (along with every other American, Britain, Canadian, Australian and New Zealander) would be removed as soon as it was noticed that it was traffic from an American, as the NSA does not monitor its citizens, or those of the Five Eyes countries, unless specifically sanctioned. 4. U.S.
iCloud Uploads Local Data Outside of iCloud Drive With OSX 10.10 Yosemite, Apple has moved iCloud Drive, their Dropbox competitor, to the forefront. Other features include Continuity, the ability to seamlessly switch from editing a file on one’s Mac to an iOS device. Prior to 10.10, a change was made that abolishes the save/delete “What do you want to do with this file?” I had a dozen such documents open in TextEdit, the text editor that Apple ships with OSX. Fast forward to 10.10. This was the sequence: Open text editor, create some new documents. Update, 26 October 2014: This happens for all applications (think iA Writer, Pixelmator, et c) that had saved application state. This is unacceptable. Before you comment with the location in System Preferences wherein I can disable iCloud document support for TextEdit.app: you are missing the point. Apple has taken local files on my computer not stored in iCloud and silently and without my permission uploaded them to their servers - across all applications, Apple and otherwise. What now?
The Really Dark Internet A year after the revelations by Edward Snowden, more or less everybody is aware of the astonishing extent of online surveillance. An outcome of this increased awareness is the development of various protective measures, including encryption practices, privacy protection measures as well as the development of anonymised platforms, such as Kwikdesk, an anonymous and ephemeral version of Twitter. However, other aspects of state and corporate control of social media have received less attention. In the face of rising inequality and increasing political mobilisation from the bottom, the ruling class must pro-actively defend the current power structures and a way to do this includes not only surveillance, but also deception and propaganda in social media. With surveillance a given, we must now begin to learn about strategies and tactics of deception and disinformation, coming from states, reactionary and fascist political groupings, and corporations. Pic 2.
Google worker arrested for cyberstalking Erin Allda, San Francisco Chronicle By Erin Allday Updated 7:14 pm, Saturday, October 25, 2014 A Google employee from San Jose is facing federal charges in connection with the alleged cyberstalking of a former college classmate and a threat to reveal naked pictures of her if she didn’t send him more explicit photos and videos. According to documents posted Friday on The Smoking Gun website, Nicholas Rotundo, 23, was arrested Oct. 4 after an investigation by the FBI and the University of Texas at Dallas. The alleged stalking began in June 2013 when a woman, identified in the FBI documents as a University of Texas at Dallas student, received an e-mail inviting her to join a research study on “the public’s perception of different breast types.” The sender asked that CC submit four naked photographs for the study, and in return she would receive $4,500 in compensation, according to the FBI documents. Erin Allday is a San Francisco Chronicle staff writer.