Tuesday, 14 December 2010

STATEMENT FROM AUSTRALIAN NEWSPAPER EDITORS, TELEVISION AND RADIO DIRECTORS AND ONLINE MEDIA EDITORS

Dear Prime Minister,

The leaking of 250,000 confidential American diplomatic cables is the most astonishing leak of official information in recent history, and its full implications are yet to emerge. But some things are clear. In essence, WikiLeaks, an organisation that aims to expose official secrets, is doing what the media have always done: bringing to light material that governments would prefer to keep secret.

In this case, WikiLeaks, founded by Australian Julian Assange, worked with five major newspapers around the world, which published and analysed the embassy cables. Diplomatic correspondence relating to Australia has begun to be published here.

The volume of the leaks is unprecedented, yet the leaking and publication of diplomatic correspondence is not new. We, as editors and news directors of major media organisations, believe the reaction of the US and Australian governments to date has been deeply troubling. We will strongly resist any attempts to make the publication of these or similar documents illegal. Any such action would impact not only on WikiLeaks, but every media organisation in the world that aims to inform the public about decisions made on their behalf. WikiLeaks, just four years old, is part of the media and deserves our support.

Already, the chairman of the US Senate homeland security committee, Joe Lieberman, is suggesting The New York Times should face investigation for publishing some of the documents. The newspaper told its readers that it had ‘‘taken care to exclude, in its articles and in supplementary material, in print and online, information that would endanger confidential informants or compromise national security.’’ Such an approach is responsible — we do not support the publication of material that threatens national security or anything which would put individual lives in danger. Those judgements are never easy, but there has been no evidence to date that the WikiLeaks material has done either.

There is no evidence, either, that Julian Assange and WikiLeaks have broken any Australian law. The Australian government is investigating whether Mr Assange has committed an offence, and the Prime Minister has condemned WikiLeaks’ actions as ‘‘illegal’’. So far, it has been able to point to no Australian law that has been breached.

To prosecute a media organisation for publishing a leak would be unprecedented in the US, breaching the First Amendment protecting a free press. In Australia, it would seriously curtail Australian media organisations reporting on subjects the government decides are against its interests.

WikiLeaks has no doubt made errors. But many of its revelations have been significant. It has given citizens an insight into US thinking about some of the most complex foreign policy issues of our age, including North Korea, Iran and China.

It is the media’s duty to responsibly report such material if it comes into their possession. To aggressively attempt to shut WikiLeaks down, to threaten to prosecute those who publish official leaks, and to pressure companies to cease doing commercial business with WikiLeaks, is a serious threat to democracy, which relies on a free and fearless press.

Yours faithfully

Clinton Maynard, news director, 2UE 
David Penberthy, editor-in-chief, news.com.au
Eric Beecher, chairman, Crikey, Smart Company, Business Spectator, The Eureka Report
Gay Alcorn, editor, The Sunday Age
Garry Bailey, editor, The Mercury (Hobart)  
Garry Linnell, editor, The Daily Telegraph
Ian Ferguson, director of news and programs, Sky News Australia/New Zealand
Jim Carroll, network director of news and public affairs, Ten Network
Julian Ricci, editor, Northern Territory News
Kate Torney, director of news, ABC
Mark Calvert, director of news and current affairs, Nine Network
Melvin Mansell, editor, The Advertiser (Adelaide)
Megan Lloyd, editor, Sunday Mail  (Adelaide)
Michael Crutcher, editor, The Courier Mail,  
Mike van Niekerk, editor in chief, Fairfax online
Paul Cutler, news director, SBS
Paul Ramadge, editor-in-chief, The Age
Peter Fray, editor-in-chief, The Sydney Morning Herald
Peter Meakin, director of news and public affairs, Seven Network
Rick Feneley, editor, The Sun-Herald
Rob Curtain, news director, 3AW
Rod Quinn, editor, The Canberra Times
Sam Weir, editor, The Sunday Times  
Scott Thompson, The Sunday Mail (Queensland)  
Simon Pristel, editor, Herald Sun
Tory Maguire, editor, The Punch
Walkley Advisory Board
Gay Alcorn
Mike Carlton
Helen Dalley
John Donegan
Peter Meakin
Laurie Oakes
Jeni O'Dowd
Alan Kennedy
Malcolm Schmidtke
Fenella Souter

Monday, 13 December 2010

Families encouraged by ‘open’ disclosure in hidden Hillsborough files project


The hidden Hillsborough disaster files are likely to be released as one all-encompassing dossier.
A panel of experts are currently wading through thousands of previously-unseen documents on the 1989 tragedy.
No timescale has been confirmed for the process although it is thought the committee are working towards a release date in 2012.
So far the families of the 96 Reds fans killed on the Leppings Lane terrace have been encouraged by updates from the panel, headed by the Bishop of Liverpool.

This week they were assured the committee are yet to encounter any confidential papers or be barred any access to particular information.
There are some fears among relatives, who have fought a 21 year campaign for justice, that the two year project could leave them disappointed with suggestions the Government could mark some files as completely restricted.
But that concern now looks it may be unfounded.
A third of the files have been digitised as three archivists and three researchers study the information...
 Continue reading
Luke Traynor @'Liverpool Echo'

You can't avoid settlements

Just the peasants!!!


NewsHour NewsHour More than 1,958 people on the Gawker list used the word "password" as their password. http://ow.ly/3o3Xs

FACT mix 210: Bjørn Torske



Keen readers will remember the Norwegian producer’s wonderful 2007 album Feil Knapp featuring in our 100 Best Albums of the 2000s, but he was a cult hero in the house scene of his native Norway and among the disco cognoscenti of the wider world long before that album’s release.
Torske hails from Tromsø,which is just north of the arctic circle and widely regarded as Norway’s capital of electronic music, having given us the likes of Biosphere, Royksopp and Mental Overdrive in recent years. His first techno-oriented productions in the early 1990s were picked up for release by Crammed Discs in Belgium and Holland’s legendary Djax-Up-Beats, and later by Reinforced, the London imprint run by 4Hero’s Marc and Dego.
After a stint touring as live synth player for Biosphere, and the release of an album on Djax, Torske took a break from production. Sporadic single releases found their way out into the world, but it wasn’t until 1999 that Torske returned in earnest. He began releasing 12″s through SVEK and Tellé Records, the latter also putting out his Trøbbel LP. Around this time Torske and his partner in crime, the late Erot, fashioned their own distinctive micro-genre, “skrangle-house” (literal translation: rattle house), essentially just a freeform, disco and dub-inflected but resoundingly dancefloor-friendly approach to house inspired by the UK’s Idjut Boys. Erot and Bjørn’s track ‘Søppelmann’ became the signature skrangle-house tune, and helped inspire a whole new generation of Norwegian producers, including Todd Terje, Prins Thomas and Lindstrøm.
Nonetheless, Torske remained an elusive character. When FACT interviewed Prins Thomas in 2007, we asked him who he’d most like to sign if money grew on trees. He replied: “If I could lure him our of his cave for a second, I wouldn’t mind getting some new stuff from Bjorn Torske.” Soon after, Smalltown Supersound unleashed Feil Knapp, easily the most kaleidoscopic and accomplished Torske LP to date. Rooted in disco-tinged house and techno, but with shades of dub, broken beat, Balearica, jazz, avant-electronics, krautrock and ambient, it’s just an impeccably composed and produced work, complex musical ideas conveyed with an easy-going charm.
Torske has just released his fourth album, Kokning. Its title refers to a kind of meal preparation peculiar to Norway: that of putting potatoes on to boil, going out to sea to catch a fish and then returning home to finish cooking. Not sure how that relates to the music, but we like it…Kokning is more rooted in acoustic sound than the heavily programmed Feil Knapp; even its crunchy rhythm tracks are derived from Torske’s experiments recording different sounds, instruments and textured objects in rooms of varying size and acoustics.
We’re absolutely delighted to have this legendary producer helming a FACT mix. His selection is diverse and discerning as you’d expect, with a clear emphasis on genuine musicality. The mix is anchored in classic On-U-Sound, with tracks from African Head Charge, Paul Haig, Creation Rebel and New Age Steppers figuring prominently alongside more frigid post-punk classics from Section 25 and The Durutti Column. There’s room too for the entrancing krautrock spiritualism of Popol Vuh, the expansive live techno of the Moritz Von Oswald Trio and a number of curios as new to us as they doubtless are to many of you. With the nights getting longer and the days getting colder, we strongly suggest you put some potatoes on to boil and give it a whirl.


(Available for three weeks)

Tracklist:
Popol Vuh – Aguirre  (Ohr/Soul Jazz)
KLF – Dream time in Lake Jackson  (KLF Communications)
Yello – Homer hossa  (Vertigo)
Creation Rebel & New age steppers – Last sane dream (Cherry Red/ON-U Sound)
Paul Haig – Mad horses (Disques Crepuscule)
Moritz von Oswald trio – Vertical ascent 1 (Honest Jons)
Section 25 – Looking from a hilltop (Eskimo)
Crimea X – Varvara (Hell Yeah!)
Yolanda – Afro rat (Sex Tags Amfibia)
Hank Crawford – Sugar free (Strut)
Don Ray – My desire (Polydor)
Don Ellis – Devil made me write this piece (MPS/BASF)
Sergio Mendes & Brasil ’77 – Promise of a fisherman (A&M)
Gucci sound system – Acarpenter (joakim remix) (DFA)
A. Paul – tribute (Genesis)
Renegade Soundwave – Space gladiator dub (Mute)
Ajello – Android street (Ajello do the job)
Rune Lindbæk pres. Kanakas – Crosby (Luna Flicks)
Durutti Column – requiem for a father (Factory)
Chants et percussions des Maldives – Baburu Lava (Ocora/Radio France)
African head charge – Hole in the roof (On-U Sound)
Dinosaur L – Go bang (Walter Gibbons mix) (Sleeping Bag/Traffic)
Bjørn Torske – Høst (DJ Sotofett Støydubb) (Unreleased)

The Implications for Business and Government of Wikileaks and Geek War 1

Thanx Stan!

Image and video hosting by TinyPic

Must see!

Poster of the year too!

New Zealand Pike River mine blast firm in receivership

Iran not a rogue state: Australia

Gawker Media hacked, apparently in retaliation for 4Chan jibes

MORE

WikiLeaks cables: MI5 offered files on Finucane killing to inquiry

Patrick Finucane
WikiLeaks cables reveal US diplomats feared that 'elements of the security-legal establishments' in Britain beyond MI5 were resisting an inquiry into the murder of Patrick Finucane. Photograph: Reuters  

MI5 has said that it is prepared to hand over sensitive files on one of the most high-profile murders during the Northern Ireland Troubles carried out by loyalist gunmen working with members of the British security forces.
The offer in the case of the Pat Finucane, the well-known civil rights and defence lawyer murdered in front of his wife and three young children in 1989, is contained in confidential US embassy cables passed to WikiLeaks.
Supporters of Finucane welcomed the revelation of the offer last night as "highly significant" and believe it could pave the way for a fresh inquiry into the killing that would be acceptable to the family.
Owen Paterson, the Northern Ireland secretary, has told Finucane's widow that he will decide early next year whether to hold a hearing that could shine a new light on collusion between gunmen from the Ulster Freedom Fighters and members of the security forces. A refusal to hold such a hearing, which Paterson has questioned in the past, would prevent an examination of the MI5 files.
Finucane's supporters spoke out last night after leaked US embassy cables, published by WikiLeaks, showed that: • Bertie Ahern, the Irish prime minister between 1997 and 2008, told US diplomats that "everyone knows the UK was involved" in the murder.
• US diplomats feared that "elements of the security-legal establishments" in Britain beyond MI5 were fighting hard to resist an inquiry.
• Brian Cowen, the current Irish prime minister, warned that a failure to hold an inquiry could be a "deal breaker"...
Continue reading
Nicholas Watt & Owen Bowcott @'The Guardian'
WikiLeaks wikileaks Sinn Fein leaders knew of IRA bank heist plans | http://is.gd/iDHVG

What Do We Learn about Julian Assange From His Alleged OKCupid Profile?

The folks at Reddit have uncovered what appears to be WikiLeaks founder Julian Assange's OKCupid dating profile. The uber-private Assange would never be an online dater, you say! But, the last time this user accessed the profile was way back in 2006, when Julian Assange wasn't the cable-dumping anti-hero he is today. Back then, he was just a danger-loving lonely boy. So, if this profile is The Real Him - and the pictures of him and the fake name "HarryHarrison" seem to suggest that it is - then what do we learn about the enigma of Julian Assange by examining the face he wanted to show the world? Or, at least, the face he showed the world he hoped to sleep with?
He is straight. Well, we could have guessed this much, already.
He is 87% slutty. Okay, we could have guessed that too. People never change. Anyway, he confirms it in his "self-summary:" "Want a regular, down to earth guy? Keep moving. I am not the droid you're looking for. Passionate and often pig headed activist intellectual seeks siren for love affair." And in the "Test" section, he came back "87% dominating, 87% slut." But also "Strong Democrat." On the "I'm Really Good At" section, he wrote "A gentleman never tells." So he's also kind of cheesy and gross.
He likes tough, dangerous girls. "I like women from countries that have sustained political turmoil," he wrote. "Western culture seems to forge women that are valueless and inane. OK. Not only women!"
Despite the fangirls, he gets lonely: "Although I am pretty intellectually and physically pugnacious I am very protective of women and children," he wrote. And while he said, "I have asian teengirl stalkers," he ceded: "I could adapt to anything except the loss of female company and carbon." (And carbon. Ha.)
But, mostly, the Julian Assange on OkCupid seems like any pretentious outcast looking for love on the Internet, if more arrogant and vaguely misogynist. It's clear, however, that even back in '06, he was pretty sure that he was heading toward serious international intrigue, as he was also seeking a siren for "occasional international conspiracy." How did he spend his time? "Changing the world through passion, inspiration and trickery," and "directing a consuming, dangerous human rights project which is, as you might expect, male dominated." As for the user name: "Harry Harrison is a scifi writer that was popular in the '70s and '80s for his Stainless Steel Rat character," reports a commenter at Reddit. "The SSR was an intergalactic criminal mastermind with a conscious who was too smart to get caught." So, Julian Assange: Still not really that much like us.
Mike Vilensky @'NY Mag'

Bruce Sterling: The Hacker Crackdown - Law and Disorder on the Electronic Frontier (1992)

Contents

Preface to the Electronic Release of The Hacker Crackdown
Chronology of the Hacker Crackdown
Introduction

Part 1: Crashing the System

Part 2: The Digital Underground 

Part 3: Law and Order  

Part 4: The Civil Libertarians

Electronic Afterword to The Hacker Crackdown

Via

Pentagon Whistleblower Daniel Ellsberg: Julian Assange is Not a Terrorist

No plan to move against Cheney, says Clinton

WikiLeaks wikileaks Indoleaks - a WikiLeaks-style site that launched in Indonesia on Friday - has already published many sensitive docs | http://goo.gl/p4THl

Netanyahu must stop celebrating victory and listen to U.S.

The net will win against deception

Illustration:Andrew Dyson
Governments had better get used to WikiLeaks and realise that feeding the public misleading drivel has become much harder.
Nations need secrets. They are fundamental to the preservation of national security. Democracy demands openness and governments dealing frankly and honestly with the people to whom they are accountable. If the point of national security is to preserve our open democratic society, we must start with a presumption of openness and ask what tests a document must meet to warrant the protection of a national security classification.
Obvious subject matter includes sensitive military technologies, the design and performance of military equipment, technical means of intelligence collection, human intelligence sources, intelligence priorities, defence science programs and priorities, the readiness state of elements of the Australian Defence Force and information about military operations. Release of any such material would enable a potential adversary to put counter-measures in place and/or improve the performance of their own forces.
Material falling into these categories would be classified ''top secret'', ''secret'', ''confidential'' or ''restricted'' according to the consequences for national security if it were to be made public, ranging from ''exceptionally grave'' to not much.
In my younger days one of the attributes that would attract a ''confidential'' classification was that the information, if known, ''could cause administrative embarrassment''. In these days of freedom-of-information laws, a document could not as a matter of law be withheld on the grounds the information would cause administrative embarrassment - a point to be borne in mind in considering many of the WikiLeaks revelations.
Within this framework a security classification would apply to many diplomatic communications, but it cannot be justified by a desire to protect the exchange of scuttlebutt, or self-aggrandisement such as Kevin Rudd big-noting himself by referring to the French and German efforts in Afghanistan as ''organising folk-dancing festivals''.
Nor should national security classifications be used to conceal the real assessments and motives of the governments we elect.
Some striking examples of this have come to light in the past couple of days. One relates to the Chinese response to provocative and unnecessary commentary about China in the 2009 Defence white paper, which I understand was inserted at the behest of then prime minister Rudd. The Australian public was told from the defence minister down that China had no particular problems with this content. Now the WikiLeaks material reveals that in fact the paper's principal author was ''dressed down'' by the deputy director of foreign affairs in the Chinese Defence Ministry. No national security purpose was served by misleading the Australian public in this way.
Other leaks show that Rudd was less than frank about his attitude to US deployment of ballistic missile defences, publicly opposed but privately telling the US we were on board.
Perhaps the most serious case relates to the prospects for the war in Afghanistan. The stock line from Western governments is that they are optimistic, things are going well, perhaps not quite as well as we would like, but we are making progress. What we find from WikiLeaks is that the real assessment, no doubt shared by all our NATO allies, is quite different. In October 2008 Rudd told visiting US congressmen that the national security establishment in Australia was very pessimistic about the long-term prognosis for Afghanistan, a pessimism evident in a December 2009 cable reporting the views of Australia's special representative for Afghanistan and Pakistan, former defence secretary Ric Smith, who referred to the ''train wreck'' the Australian Federal Police has to deal with in working with the Afghan National Police.
This deceptiveness is unconscionable. The situation it suggests is that all Western governments involved know the outlook in Afghanistan is bleak, but none is prepared to confess this to the public. They all cling on, feeding us their bromides, hoping that when the war is lost it will be on someone else's watch. Meanwhile, they attend the funerals, praise the fallen and comfort the families.
Such deceptiveness is not confined to the Rudd and Gillard governments. The Howard government was committed to the US invasion of Iraq by July 2002. Yet John Howard insisted right up to the eve of the March 2003 invasion that no decision had been taken on our participation.
This particular game is up - governments will sooner or later be outed when they say one thing to foreign governments and another to their public. The world is witnessing something like a collision between galaxies; the hot, swirling mass of secret diplomatic correspondence has come into collision with the rapidly changing and supremely adaptable mass of the internet. The latter will devour the former, and governments had better get used to that. The leaks are technology-driven, occurring because they can.
The consequences will not be confined to the foreign policy arena. In the hubris of power and their desire to stay in office solely for the purpose of being in office, modern governments routinely mislead us in two ways. They feed us an endless stream of misleading drivel manufactured by spin doctors, and they withhold information about their real agenda and other inconvenient truths the public has a right to know about. This is now much harder to sustain.
Julian Assange will no doubt pay a heavy price for his role in this inevitable development, but in the long sweep of history he will be seen more as hero than as villain.
Paul Barratt is a former intelligence analyst and a former secretary to the Australian Defence Department.

Frost over the World - WikiLeaks and Julian Assange

Tax protest turns Vodafone's smile upside down

Anonymous isn't: LOIC leaks internet address of user

Researchers at the University of Twente in the Netherlands report that the LOIC (Low Orbit Ion Cannon) software used in pro-Wikileaks Anonymous attacks discloses the identity of the user.
If hacktivists use this tool directly from their own machines, instead of via anonymization networks such as Tor, the Internet address of the attacker is included in every Internet message being transmitted. In the tools no sophisticated techniques are used, such as IP-spoofing, in which the source address of others is used, or reflected attacks, in which attacks go via third party systems. The current attack technique can therefore be compared to overwhelming someone with letters, but putting your address at the back of the envelope. In addition, hacktivists may not be aware that international data retention laws require that commercial Internet providers store data regarding Internet usage for at least 6 months. This means that hacktivists can still be traced easily after the attacks are over.
Here's a PDF with details on the report. Attacks by "Anonymous" WikiLeaks proponents not anonymous utwente.nl (via Slashdot)
Xeni Jardin @'Boing Boing'

Hacker Magazine condemns Anon's DDoS attacks

2600 Magazine, a quarterly journal for the hacker community that has published since 1984, is speaking out against numerous media reports that hackers are responsible for a spate of attacks on numerous e-commerce corporations as part of the ongoing Wikileaks controversy.
Denial of service attacks against PayPal, Amazon, Visa, Mastercard, and other corporations and entities have been underway for the last few days, as widely reported in the mainstream media. Each of these targets had previously taken some sort of action against the whistleblower website wikileaks.org and its affiliates. The media reports almost invariably refer to "hackers" as being behind these actions. While there is great sympathy in the hacker world for what Wikileaks is doing, this type of activity is no better than the strong-arm tactics we are fighting against.
These attacks, in addition to being a misguided effort that doesn't accomplish very much at all, are incredibly simple to launch and require no technical or hacker skills. While writing such programs requires a good degree of ingenuity and knowledge of security weaknesses, this doesn't mean that everyone who runs them possesses the same degree of proficiency, nor should we necessarily believe people who claim to be doing this on behalf of the hacker community.
What the above named corporations have done to Wikileaks is inexcusable and constitutes a different sort of denial of service attack, one that is designed to eliminate an organization, an individual, or an idea. We find it inexplicable that donations can easily be made to hate groups and all sorts of convicted criminals through these same services, yet somehow a website that publishes leaked information - and which has never been charged or convicted of a crime - is considered unacceptable. We believe it's not the place of credit card companies or banks to judge the morality or potential threat level of anyone, let alone those who are following in the long tradition of journalists and free speech advocates worldwide.
The assault on Wikileaks must not be overshadowed by the recent denial of service attacks and these certainly must not be allowed to be associated with the hacker community. This will play right into the hands of those who wish to paint us all as threats and clamp down on freedom of speech and impose all kinds of new restrictions on the Internet, not to mention the fact that the exact same types of attacks can be used on "us" as well as "them." (Interestingly, it was only a week ago that "hackers" were blamed for denial of service attacks on Wikileaks itself. That tactic was ineffectual then as well.) Most importantly, these attacks are turning attention away from what is going on with Wikileaks. This fight is not about a bunch of people attacking websites, yet that is what is in the headlines now. It certainly does not help Wikileaks to be associated with such immature and boorish activities any more than it helps the hacker community. From what we have been hearing over the past 24 hours, this is a viewpoint shared by a great many of us. By uniting our voices, speaking out against this sort of action, and correcting every media account we see and hear that associates hackers with these attacks, we stand a good chance of educating the public, rather than enflaming their fears and assumptions.
There are a number of positive steps people - both inside and outside of the hacker community - can take to support Wikileaks and help spread information. Boycotts of companies that are trying to shut Wikileaks down can be very effective and will not win them any sympathy, as the current attacks on their websites are unfortunately doing. Mirroring Wikileaks is another excellent method of keeping the flow of information free. Communicating with friends, family, classes, workplaces, etc. is not only a way of getting the word out, but will also help to sharpen your skills in standing up for what you believe in. This is never accomplished when all one tries to do is silence one's opponent. That has not been, and never should be, the hacker way of dealing with a problem.
2600 Magazine has been publishing news, tutorials, and commentary by, about, and for the hacker community since 1984. We were sued in 2000 by the Motion Picture Association of America for linking to a website containing source code enabling Linux machines to play DVDs and thus became the first test case of the Digital Millennium Copyright Act. In a similar vein, we are supporting Wikileaks by linking to their existing website through wikileaks.2600.com. We've already changed where this address points to twice as Wikileaks sites have been taken down, and will continue to ensure that this link always manages to get to wherever Wikileaks happens to be. We hope people follow that link and support the existence of Wikileaks through whatever method is being publicized on their site.

###

CONTACT:
2600 MAGAZINE: THE HACKER QUARTERLY
webmaster@2600.com
Emmanuel Goldstein, Editor
Emmanuel@goldste.in
www.2600.com
+1 631 751 2600

WikiLeaks backlash: The first global cyber war has begun, claim hackers

He is one of the newest recruits to Operation Payback. In a London bedroom, the 24-year-old computer hacker is preparing his weaponry for this week's battles in an evolving cyberwar. He is a self-styled defender of free speech, his weapon a laptop and his enemy the US corporations responsible for attacking the website WikiLeaks.
He had seen the flyers that began springing up on the web in mid-September. In chatrooms, on discussion boards and inboxes from Manchester to New York to Sydney the grinning face of a Guy Fawkes mask had appeared with a call to arms. Across the world a battalion of hackers was being summoned.
"Greetings, fellow anons," it said beneath the headline Operation Payback. Alongside were a series of software programs dubbed "our weapons of choice" and a stark message: people needed to show their "hatred".
Like most international conflicts, last week's internet war began over a relatively modest squabble, escalating in days into a global fight.
Before WikiLeaks, Operation Payback's initial target was America's recording industry, chosen for its prosecutions of music file downloaders. From those humble origins, Payback's anti-censorship, anti-copyright, freedom of speech manifesto would go viral, last week pitting an amorphous army of online hackers against the US government and some of the biggest corporations in the world.
Charles Dodd, a consultant to US government agencies on internet security, said: "[The hackers] attack from the shadows and they have no fear of retaliation. There are no rules of engagement in this kind of emerging warfare."
The battle now centres on Washington's fierce attempts to close down WikiLeaks and shut off the supply of confidential US government cables. By Thursday, the hacktivists were routinely attacking those who had targeted WikiLeaks, among them icons of the corporate world, credit card firms and some of the largest online companies. It seemed to be the first sustained clash between the established order and the organic, grassroots culture of the net.
But the clash has cast the spotlight wider, on the net's power to act as a thorn not only in the side of authoritarian regimes but western democracies, on our right to information and the responsibility of holding secrets. It has also asked profound questions over the role of the net itself. One blogger dubbed it the "first world information war".
At the heart of the conflict is the WikiLeaks founder, the enigmatic figure of Julian Assange – lionised by some as the Ned Kelly of the digital age for his continued defiance of a superpower, condemned by his US detractors as a threat to national security.
Calls for Assange to be extradited to the US to face charges of espionage will return this week. The counteroffensive by Operation Payback is likely to escalate.
The targets include the world's biggest online retailer, Amazon – already assaulted once for its decision to stop hosting WikiLeaks-related material – Washington, Scotland Yard and the websites of senior US politicians. There is talk of infecting Facebook, which last week removed a page used by pro-WikiLeaks hackers, with a virus that spreads from profile to profile causing it to crash. No one seems certain where the febrile cyber conflict will lead, only that it has just begun...
 Continue reading
Mark Townsend, Paul Harris in New York, Alex Duval Smith in Johannesburg, Dan Sabbagh, Josh Halliday @'The Guardian'

Incompetent (Australian) BitTorrent Researchers Strike Again

I almost cried this morning.
Last summer we debunked a study by the University of Ballarat’s Internet Commerce Security Laboratory (ICSL). Carefully we spelled out the many obvious mistakes that were made, both in data collection and the research design in general. In addition, we contacted the lead researcher, offering our help.
Several news outlets who published the story were kind enough to acknowledge our critique, but the researchers themselves went silent and didn’t respond directly to the errors we pointed out. Today, the same researchers are again making headlines, and it seems that they haven’t learned a thing.
In a replication of the study they conducted earlier this year, the researchers have studied what’s being downloaded on BitTorrent. Among other things they want to find out which files are popular on BitTorrent at the moment, and how many of these are infringing.
But there’s a problem. Again.
In common with those behind last year’s study, the researchers have no clue what they are doing. Mistake after mistake has been made, as we will point out below. The worst part is that some media outlets appear to be taking this research seriously, while it’s in fact a disgrace for anyone who works in academia.
In large parts the methodology is the same as last time, so we won’t report all the painful mistakes that were pointed out before. Instead, will will just sum up some of the new findings, and point out why these are clearly wrong.

1. Most downloaded files

The data collected for the new study was gathered in July 2010, and the researchers used the number of active seeders at the time to determine what files are ‘most downloaded’. One would assume that such a list would be dominated by new titles, but according to the Australian researchers this is not the case.
In their top 10 most downloaded (read ‘seeded’) movies, we find the following titles that have been available for years:
Wanted (2008)
Hancock (2008)
Juno (2007)
Step Brothers (2008)
Gladiator (2000)
Toy Story (1995)

At TorrentFreak we have years of experience at tracking BitTorrent downloads, and we’ve never seen any old titles in our weekly lists. Older titles do show up as popular in tracker scrapes sometimes, but they are always from fake torrent files or manipulated trackers. Common sense should have alerted the researchers that something might have been wrong with their data collection methods or sample.
The report also claims that the aXXo release of the film Wanted had a massive 50,582 seeders two years after it was released. Aside from the fact that we haven’t seen such a high seeder count in weeks, it is absolutely impossible that a download would have these impressive figures two years after it first became available.
The inaccuracy of the most downloaded film list is nicely illustrated by the researchers themselves. Aside from gathering data from BitTorrent trackers, they also looked at the 100 most searched for terms on the BitTorrent search engine isoHunt at the time. Interestingly, none of the older movies listed in their top 10 most downloaded list was present in the list of popular searches.

2. Popular Categories

As we suggested, to determine the popularity of various categories the researchers used a random sample of torrents this time, instead of the sample of popular torrents they previously selected. Despite this change the gathered data differs significantly from what most torrent sites report.
Based on a sample of 127,600 torrent files they conclude that nearly 70% of the torrents are video content and less than 2% is software.
If we look at the >10 million torrent files (unique hashes) that are available on a quality torrent site such as BitSnoop, we see a different picture. On BitSnoop 9% of all torrents are categorised as software, while video adds up to ‘just’ 52%. This leads us to believe that the sample the researchers used is heavily biased towards video content, or that their categorization algorithms are flawed.

3. Multiplying Trackers

The last point that we want to address is again an illustration of the incompetence of the researchers. What we missed last time is that they simply added up the reports of the different BitTorrent trackers they scraped. If “torrent A” is tracked by 5 individual trackers, then the researchers add up the seeder counts of them all, while in fact they are often used by the same downloaders.
Or put differently, most torrent clients allow people to use multiple trackers. That means that they can be listed as a seeder at several trackers at the same time. The researchers didn’t calculate this in, and are therefore overestimating the download counts, which were already suspicious to begin with.
Sadly enough we have to conclude that this new study is just as bad as the previous one, and totally unusable to describe the BitTorrent landscape. We’re not exaggerating if we say that the researchers are incompetent, lack common sense, and are too stubborn to take advice when we offered it.
When I contacted researcher Dr. Paul Watters last time he sent the following reply: “I would be happy to send you a complimentary of my O’Reilly ‘Statistics in a Nutshell’ book that might give further insight into statistical methodology.” I chuckled, since I’ve worked as an academic myself for years, publishing in high impact peer-reviewed journals.
Perhaps the State Government of Victoria, IBM, Westpac Banking Corporation, the Australian Federal Police and Village Roadshow should ask for a refund, as they all supported the research financially.

Sunday, 12 December 2010

John Perry Barlow JPBarlow At the heart of all secrets lies shame.

Aspirin: the world's humble true wonder drug

The geek who shook the world

Wikileaks founder Julian Assange.
Wikileaks founder Julian Assange. Photo: Mark Chew
The journalist Suelette Dreyfus collaborated with Julian Assange to create Underground, a 1997 book about hackers in Australia and around the globe. Here she reveals the inside story on Assange, the geek who founded WikiLeaks and became the scourge of world governments.
One of Julian Assange's favourite books is Darkness at Noon by Arthur Koestler. It is a bleak novel loosely based on the Stalinist purges and Moscow show trials of the late 1930s.
It tells the story of a Russian named Rubashov who was once a revered 1917 revolutionary, but who is cast out from his society. Suddenly he awakes in the middle of the night to find he is arrested and imprisoned. There are no charges, no due process and no justice. He can get no truth or explanation of what is going on. Eventually he is interrogated, and asked to sign a false confession admitting his guilt in a plot to assassinate the mysterious “No. 1”, the unknown and unnamed government leader.
He refuses.
From left: Julian Assange after being accused of hacking in 1995; a stressed Assange tells reporters last month that WikiLeaks staff were receiving death threats; Interpol's online wanted poster before Assange's arrest last week.
From left: Julian Assange after being accused of hacking in 1995; a stressed Assange tells reporters last month that WikiLeaks staff were receiving death threats; Interpol's online wanted poster before Assange's arrest last week. Photo: Reuters/Getty Images
He is isolated in his cell, but finds a way of communicating with another prisoner by tapping on pipes. Ever so carefully, they begin secretly passing information and stories back and forth.
In the gloomy prison, an interrogation begins. First, an old friend of Rubashov's is brought in to start a soft persuasion. When that fails, because Rubashov refuses to admit to a crime he did not commit, his friend is arrested and executed for going too easy on the prisoner.
Then a coarse and violent interrogator takes over. He believes that torture is a good way to extract confessions from prisoners. He hates Rubashov because the prisoner is educated: being enlightened through learning is clearly a dangerous thing.
The activist on the cover of <i>Time Magazine</i> this month.
The activist on the cover of Time Magazine this month.
At the novel's end, Rubashov is summarily executed.
It's a case of life imitating art, with obvious parallels between Julian Assange's predicament and that of his favoured novel.
The world's most mysterious and famous publisher of verboten secrets is sitting in a jail cell in Britain awaiting extradition to a place with a very alien legal system, Sweden, to face questioning about criminal charges he does not understand. He has said publicly that he is at a loss to know how he could be accused of sexual offences against two women with whom he had sex when they have admitted it was consensual.
Assange has always been an avid reader of books. I know this because we worked together for almost three years to create Underground, a book published in Australia in 1997 and again in an electronic version in 2001. Underground is the true story of hackers in Australia and around the globe. Assange, the former hacker, contributed exceptional technical skills and analysis, and I brought years of experience as a journalist and writer. The book has become something of a classic among computer enthusiasts and has been translated into Czech, Chinese and Russian. Books were the basis of Assange's self-education. He attended school off and on during his childhood, but he was continually frustrated by teachers who were at a loss about what to do with him.
A geek friend of his once described Assange as having an IQ "in excess of 170". I suspect this could be true. I can only imagine how hard it must have been for a teacher in 1970s Australia to teach her class of normal children while also dealing with one small blond-haired boy who was off the charts.
So Assange largely gave up on school, finding it more efficient to educate himself by reading books. He learned to tune out if people didn't feed him information fast enough.
I've watched Assange do this many times. It's not meant to be rude, though it can make him seem aloof. It is, I suspect, a habit learned from these early years. It can give him the air of an absent-minded professor. He's not really absent; it's just that his brain is running several processors in parallel, like a high-powered desktop computer.
If some information is of more interest, more processing power will be diverted to that to optimise the running of the machine. Sometimes he thinks he has told you something when he hasn't. This is probably because his brain moves so much faster than his voice; by the time he opens his mouth to speak, his thoughts have zoomed a million light years down the next thought path.
The computer geek in him always gravitated towards optimisation of everything. Some people are born engineers and the desire to optimise is a good test of this.
Once, when Assange was packing boxes to move house, he complained at how long it took. Most people just throw things in boxes and tape them up. Not Assange. He approached putting his books in boxes as though he was solving a puzzle aimed at using all the space in the box most efficiently. If there was dead space in the box, the packing had not been optimal and was a failure. He would empty the box and restart the packing again.
This desire for optimisation might be dismissed as the quirky trait of a geek, but it is far more important. It is part of the larger puzzle of how WikiLeaks has come to exist today.
The need for optimisation and the deep desire for justice, reflected by his choice of books, came together with a few other convictions.
One of these can be found in another favourite piece of writing, this time by the World War II pilot and author of The Little Prince, Antoine de Saint-Exupery. The quote, used by Assange to sign many of his emails, was this: "If you want to build a ship, don't drum up people to collect wood and don't assign them tasks and work, but rather teach them to long for the endless immensity of the seas."
The quote suggests that if you can show people why something is important, they will work to achieve that goal far more effectively than if you just tell them to tick off items on a banal to-do list. Large corporations spend hundreds of thousands of dollars every year trying to drum that message into their executives in high-end training courses. Assange knew it instinctively.
The final piece in the puzzle was curiosity. Like all good journalists, Assange has it in abundance. It is part of his clay. He understood that most people are curious and he spoke to me about the immense power of information to change the world for the better.
WikiLeaks is the picture that emerges when you lay the last puzzle piece in place.
If you want to improve the lot of the poorest, most oppressed people in the world, you can go to a destitute, corrupt African country and work in a community-aid program. It is a noble and self-sacrificing choice. But it only saves one village. Therefore, although it works towards greater justice (in this case economic justice) it is not optimal. A computer geek would consider it sub-optimal. To be optimal, it must be on a much larger scale. Larger than one village, larger than one country, even than one continent. The only way to do that is to use information which can be replicated endlessly – and cheaply – to promote change for the better. But it must be good information, not trashy information or PR spin. It must be the kind of information that plucks at those little threads of curiousity we all have in one measure or another.
It must be the kind of information news media organisations would publish for their readers.
Not everyone wants change, however. Tin-pot dictators like to steal money from their countries.
Average people may think they are happy in their ordinary lives: they don't want change. Yet imagine if there was a secret world these average people did not know about. What could be in that world? It could be a world of classified logs from the front line of a war. It could also be a world of secret diplomatic cables that tell the truth about what really happens behind the mahogany doors of power. The average people might actually want that information – if someone revealed it to them.
WikiLeaks has taught people to "long for the endless immensity of the seas". Who wants to go back to their cramped dog-box apartment now that they have tasted the salty air and seen the ocean's infinite horizon?
Yet Assange still sits in prison, waiting for answers and explanations, like Rubashov. It is more than likely the US will try to extradite him from Sweden if he is forced to leave Britain. Hints in the American media suggest that a secret grand jury investigation is under way or is even completed – without Assange even being in the country.
American politicians propose that Assange be assassinated. Forget a trial or jury. They are judge, jury and executioner, like the thuggish interrogator in Darkness at Noon.
The office of US senator Joseph Lieberman tried to gag WikiLeaks this week by making a phone call that forced Amazon to stop hosting the publisher. The New York Times has also released the diplomatic cables. Lieberman's office has called for an investigation but has not tried to order the paper to stop its presses. As if it could. There would be rioting in the streets of Manhattan.
In person, Assange is remarkably calm. He is sometimes dedicated to the cause of free speech in a pointed way that that affronts Americans, which is surprising, really, given their dedication to the right of free speech.
What matters is that WikiLeaks is changing the balance of power between average citizens and their governments like nothing else has this century. For the past decade the pendulum has swung towards government. WikiLeaks is pulling the pendulum back towards towards the citizens.
Suelette Dreyfus @'SMH' 

'Underground'
(Hacking, madness and obsession on the electronic frontier)

Air guitar as you have never seen it before!

Jailed Afghan Drug Lord Was Informer on U.S. Payroll

When Hajji Juma Khan was arrested and transported to New York to face charges under a new American narco-terrorism law in 2008, federal prosecutors described him as perhaps the biggest and most dangerous drug lord in Afghanistan, a shadowy figure who had helped keep the Taliban in business with a steady stream of money and weapons.
Confiscated opium is destroyed. Opium and heroin production soared after the fall of the Taliban.
But what the government did not say was that Mr. Juma Khan was also a longtime American informer, who provided information about the Taliban, Afghan corruption and other drug traffickers. Central Intelligence Agency officers and Drug Enforcement Administration agents relied on him as a valued source for years, even as he was building one of Afghanistan’s biggest drug operations after the United States-led invasion of the country, according to current and former American officials. Along the way, he was also paid a large amount of cash by the United States.
At the height of his power, Mr. Juma Khan was secretly flown to Washington for a series of clandestine meetings with C.I.A. and D.E.A. officials in 2006. Even then, the United States was receiving reports that he was on his way to becoming Afghanistan’s most important narcotics trafficker by taking over the drug operations of his rivals and paying off Taliban leaders and corrupt politicians in President Hamid Karzai’s government.
In a series of videotaped meetings in Washington hotels, Mr. Juma Khan offered tantalizing leads to the C.I.A. and D.E.A., in return for what he hoped would be protected status as an American asset, according to American officials. And then, before he left the United States, he took a side trip to New York to see the sights and do some shopping, according to two people briefed on the case.
The relationship between the United States government and Mr. Juma Khan is another illustration of how the war on drugs and the war on terrorism have sometimes collided, particularly in Afghanistan, where drug dealing, the insurgency and the government often overlap.
To be sure, American intelligence has worked closely with figures other than Mr. Juma Khan suspected of drug trade ties, including Ahmed Wali Karzai, the president’s half brother, and Hajji Bashir Noorzai, who was arrested in 2005. Mr. Karzai has denied being involved in the drug trade...
Continue reading
James Risen @'NY Times'

REpost: Julian Assange - Why the world needs Wikileaks


It's interesting coming back to this again and hear him denying receiving the Embassy cables!

*gulp* < 3

♪♫ Vladimir Putin - Blueberry Hill


Tis the Season of DDoS – WikiLeaks Edition

Jay Rosen's 5 major points made at the pdfleaks symposium in New York

1. It takes “the world’s first stateless news organization” http://jr.ly/5jnk to show our news organizations how statist they are.
2. The sources are voting with their leaks. That they go to Wikileaks rather than the newspapers says something about the papers.
 3. The watchdog press died. More viable today is a distributed “eye on power” that includes the old press as one component part. 
4. The state has a monopoly on the legal use of force. But it can have no monopoly on the legitimate use of digital “force."
5. Everything a journalist learns that he cannot tell the public alienates him from that public. Wikileaks tries to minimize this.   

PDF Leaks Panel 11 December 2010 (Part 1)



PDF Leaks Panel 11 December 2010 (Part 2)


Mass Surveillance and State Control: The Total Information Awareness Project

Did you know that The Department of Defense has an ongoing research project to remote control soldier’s emotions and tolerance for stress?  A soldier who didn’t display fear in dangerous situations and didn’t experience fatigue, would make a better fighting machine.  And what better way to turn a human being into a mere machine devoid of personal freedom and autonomy.  In a world that is under total surveillance, there is not likely to be much we could call freedom.  Freedom to speak or think would be freedom to speak or think what the authorities permit. 
In my new book, Mass Surveillance and State Control: The Total Information Awareness Project, I detail the ways in which our personal privacy has been and continues to be eroded and how we are now heading toward a brave new world of total information awareness and control.  Now afoot is an interconnected web of trends toward greater and greater modes of control, which will predictably advance with the advent of new technologies and the loosening of constitutional safeguards against the abridgment of privacy.  Accordingly, what is needed now more than ever before in the history of humankind is a vigilant, well organized, grass roots effort to stem this malignant tide before it is too late.
Steadily escalating is the program of warrantless wiretapping of millions of American’s personal, electronic communications, which began under the Bush administration.  This mass dragnet of personal email messages, phone calls, and Internet searches is now being done with a virtual blank check from the Foreign Intelligence Surveillance (FIS) courts, which were originally created in 1978 to assure that, in gathering foreign intelligence, the government would not abridge the Fourth Amendment rights of Americans.
The Obama administration has blocked law suits against telecom companies such as AT&T for assisting the National Security Agency in this mass dragnet of electronic communications; and it has also sealed up the ability of American citizens to seek redress by suing the federal government, even if it can be shown that such wiretaps had been unlawfully conducted...
Continue reading
 Elliot D. Cohen @'Psychology Today'

West African Masquerade

Photographs by Phyllis Galembo

WTF???

State Dept: Having ‘political objective’ disqualifies Assange ‘from being considered a journalist’

WikiLeaks, Amazon and the new threat to internet speech