Monthly Archives: July 2015

Assange: The untold story of an epic struggle for justice

This is an updated version of John Pilger’s 2014 investigation which tells the unreported story of an unrelenting campaign, in Sweden and the US, to deny Julian Assange justice and silence WikiLeaks: a campaign now reaching a dangerous stage. The siege of Knightsbridge is both

WikiLeaks says U.S. spied on Japanese government, companies

The WikiLeaks website published documents Friday that it said shows the U.S. government spied on Japanese officials and companies. The documents include what appear to be five U.S. National Security Agency reports, four of which are marked top-secret, that provide intelligence on Japanese positions on

Germany halts treason inquiry into journalists after protests

‘For the good of media freedom’, Germany’s prosecutor general suspends investigation into reporters who said state planned to boost surveillance. A treason investigation into two journalists who reported that the German state planned to boost online surveillance has been suspended by the country’s prosecutor general

US Will Escape Consequences After NSA Caught Spying on Japanese Officials

The US National Security Agency spied on Japanese high-profile officials and businessmen, WikiLeaks revealed on Friday. According to WikiLeaks’ “Target Tokyo” release, the NSA targeted Japanese companies, senior government officials, governmental advisors and even Premier Shinzo Abe at least from September 2006 to September 2007.

Obama Administration War Against Apple and Google Just Got Uglier

The Obama administration’s central strategy against strong encryption seems to be waging war on the companies that are providing and popularizing it: most notably Apple and Google. The intimidation campaign got a boost Thursday when a blog that frequently promotes the interests of the national

WikiLeaks Reveals NSA Spied on Japanese Cabinet, Private Companies

The US National Security Agency (NSA) spied on the government and private companies in Japan, WikiLeaks revealed on Friday. WikiLeaks’ “Target Tokyo” release details at least 35 targets in Japan, including Prime Minister Shinzo Abe’s administration officials, which the NSA intercepted in 2006-2007. “The lesson

Edward Snowden’s Asylum in Russia: Facts and Details

Friday, July 31, marks two years since former National Security Agency (NSA) whistleblower Edward Snowden was granted temporary asylum in Russia. In early June 2013, Snowden leaked online classified information revealing global surveillance programs run by US intelligence services. Snowden’s revelations could cost him as

Opponents focus on defeating CISA cyberthreat info sharing bill

Opponents of a U.S. Senate bill intended to encourage businesses to share information about cyberthreats may have stalled a vote on the legislation. Recent news reports had Senate Majority Leader Mitch McConnell pushing for a vote on the Cybersecurity Information Sharing Act (CISA) before a

NSA Phone Dragnet Will Be Emptied, Feds Say, If Foes Allow It

The U.S. government says it wants to empty the National Security Agency’s databases of domestic call records that were collected in bulk, but that it can’t because surveillance foes seeking a courtroom win for privacy rights have forced their retention. The Office of the Director

German Courts Unlikely to Rule Against Gov’t in NSA Scandal

Plans by a Bundestag Commission to sue the German government over a recent spy scandal involving the US National Security Agency (NSA) will yield no results, a member of the German Bundestag from Die Linke party told Sputnik Wednesday. MOSCOW (Sputnik), Svetlana Alexandrova – Dr

Why the NSA is destroying its historic telephone surveillance data

Since Edward Snowden’s revelations in 2013, the National Security Agency, or NSA, has become a by-word for uncontrolled government surveillance, an Orwellian presence collecting information without remit or restriction. Telephone and Internet records relating to more than a billion people worldwide were intercepted, with the

Snowden Effect Driving Millions Into Crypto War and Dark Web

The revelations of mass surveillance on people’s Internet and email activity by former US intelligence agency operative Edward Snowden have caused a huge expansion of interest in cryptography and the use of software to protect personal data. Prior to the revelations by former CIA operative

German Intelligence Supervisor to Sue Merkel Amid NSA Scandal

The G10 Commission of the Bundestag in charge of supervising German intelligence services is planning to sue Merkel-led German government over a recent spy scandal involving the US National Security Agency (NSA), local media reported. The G10 Commission of the Bundestag in charge of supervising

What do you think about online privacy? Share your views

We’d like to hear your views on online privacy. Share your perspectives with GuardianWitness. Over the past few decades, we have seen enormous changes in how we think about privacy. The emergence of social networks, rise of smartphones, development of cloud computing and growth of

Senate majority whip: Cyber bill will have to wait until fall

Senate Majority Whip John Cornyn (R-Texas) on Tuesday said the upper chamber is unlikely to move on a stalled cybersecurity bill before the August recess. Senate Republican leaders, including Cornyn, had been angling to get the bill — known as the Cybersecurity Information Sharing Act

How CISA’s Countermeasures Authorization Threatens Security

The Cybersecurity Information Sharing Act (CISA, S. 754) authorizes operation of countermeasures, referred to as “defensive measures” in the legislation. These countermeasures could include deployment of hazardous software that can damage external systems, data, and devices. CISA authorizes operation of countermeasures notwithstanding any other law,

Analog resistance: Activists protest CISA by faxing Congress

Privacy activists are flooding Congress with messages of opposition to the cyber surveillance bill due to be considered by the Senate, using faxes rather than emails in order to poke fun at lawmakers’ antiquated understanding of technology and privacy. Fight for the Future, a nonprofit

Google Lets Cloud Customers Supply Encryption Keys

Users of Google Compute Engine can now provide their own keys to secure data, turning Infrastructure-as-a-Service (IaaS) into even more of a self-service affair. BYOB stands for “bring your own beer.” BYOD stands for “bring your own device.” And BYOEC stands for “bring your own