Skip navigation
Help

the Washington Post

warning: Creating default object from empty value in /var/www/vhosts/sayforward.com/subdomains/recorder/httpdocs/modules/taxonomy/taxonomy.pages.inc on line 33.

The National Security Agency and its UK counterpart have made repeated and determined attempts to identify people using the Tor anonymity service, but the fundamental security remains intact, as top-secret documents published on Friday revealed.

The classified memos and training manuals—which were leaked by former NSA contractor Edward Snowden and reported by The Guardian, show that the NSA and the UK-based Government Communications Headquarters (GCHQ) are able to bypass Tor protections, but only against select targets and often with considerable effort. Indeed, one presentation slide grudgingly hailed Tor as "the king of high-secure, low-latency Internet anonymity." Another, titled "Tor Stinks," lamented: "We will never be able to de-anonymize all Tor users all the time."

An article published separately by The Washington Post also based on documents provided by Snowden concurred.

"There is no evidence that the NSA is capable of unmasking Tor traffic routinely on a global scale," the report said. "But for almost seven years, it has been trying."

0
Your rating: None

The intro for yesterday's video interview with Don Marti started out by saying, "Don Marti," says Wikipedia, "is a writer and advocate for free and open source software, writing for LinuxWorld and Linux Today." As we noted, Don has moved on since that description was written. In today's interview he starts by talking about some things venture capitalist Mary Meeker of Kleiner Perkins has said, notably that people only spend 6% of their media-intake time with print, but advertisers spend 23% of their budgets on print ads. To find out why this is, you might want to read a piece Don wrote titled Targeted Advertising Considered Harmful. Or you can just watch today's video -- and if you didn't catch Part One of our video conversation yesterday, you might want to check it out before watching Part 2.

Hide/Show Transcript

0
Your rating: None

Further fueling the ongoing debate over the future of the news media and independent journalism, eBay founder and billionaire Pierre Omidyar last month committed $250 million to a news site co-founded by journalist and author Glenn Greenwald. Omidyar’s investment followed the announcement over the summer that Amazon founder and CEO Jeff Bezos had purchased The Washington Post, also a $250 million investment. The late Steve Jobs’s wife, Lauren Powell, and 29-year-old Facebook co-founder Chris Hughes are also pouring money into old and new media ventures.

Could this new band of news media owners shape a technology-led business model that will be profitable and protect the integrity of impartial, ideology-free journalism? Ultimately, according to Wharton experts, the ball will rest with the consumer.

Any new business model that those in the technology world would bring to the media realm would have to address the major pain points currently facing the industry. News organizations have “suffered a lot financially in the past couple of years,” says Wharton marketing professor Pinar Yildirim. Circulation numbers and advertising revenue have shrunk as both readers and companies turned their focus to the Internet. The industry has tried to adjust to the new normal — some newspapers and magazines have cut back on issues or the number of days they produce a print product. Other news organizations have started charging for online access. Still more have tried to add content that mimics what tends to be most popular on the web, especially entertainment-related coverage, Yildirim notes.

Omidyar has indicated that he was motivated more by a desire to protect independent journalism than the prospect of getting a return on his investment, at least for now. In a blog post published on his website last month, Omidyar wrote that his investment in Greenwald’s venture (tentatively called “NewCo.”) stems from his “interest in journalism for some time now.” In 2010, Omidyar founded Honolulu Civil Beat, a news website with a stated focus on “investigative and watchdog journalism.” Earlier this summer, he explored buying The Washington Post newspaper before Bezos became the winning bidder. Around that time, Omidyar said he began thinking about the social impact he could help create with an investment in “something entirely new, built from the ground up.”

0
Your rating: None
Original author: 
Megan Geuss

The Guardian

The Guardian released an interview today with the man who has been the paper's source for a few now-infamous leaked documents that revealed a vast dragnet maintained by the NSA for gathering information on communications in America. That source is Edward Snowden, 29, an employee of American defense contractor Booz Allen Hamilton and a former technical assistant for the CIA.

When The Guardian published a leaked document on Wednesday of last week that showed a FISA court granting the NSA power to collect the metadata pertaining to phone calls from all of Verizon's customers over a period of three months, it became one of the biggest exposures of privacy invading actions taken by the government without the public's knowledge.

That is, until the next day, when The Guardian and The Washington Post revealed slides pertaining to another NSA project called PRISM, which apparently gathered vast swaths of information on users of Google services, Facebook, Apple, and more. While the companies named in the PRISM slides have all denied participation in such a program, President Obama and a number of senators confirmed the collection of phone call metadata on Friday.

Read 9 remaining paragraphs | Comments

0
Your rating: None
Original author: 
Cyrus Farivar

The Washington Post

It’s worse than we thought.

Just one day after disclosing a secret court order between the National Security Agency (NSA) and Verizon, The Guardian and The Washington Post both published secret presentation slides revealing a previously undisclosed massive surveillance program called PRISM. The program has the capability to collect data “directly from the servers” of major American tech companies, including Microsoft, Google, Apple, Facebook, and Yahoo. (Dropbox is said to be “coming soon.”)

The newspapers describe the system as giving the National Security Agency and the FBI direct access to a huge number of online commercial services, capable of “extracting audio, video, photographs, e-mails, documents, and connection logs that enable analysts to track a person’s movements and contacts over time.”

Read 16 remaining paragraphs | Comments

0
Your rating: None
Original author: 
Chris Welch

Iphone__2_of_2__large

Apple is among the nine technology companies attached to PRISM, the just-leaked government program that reportedly allows the NSA and FBI to access sensitive data of US citizens in total secrecy. There's just one problem: Apple says it's never heard of PRISM. That's according to identical statements provided to both CNBC and The Wall Street Journal.

Continue reading…

0
Your rating: None
Original author: 
Dan Goodin

Josh Chin

The Chinese hackers who breached Google's corporate servers 41 months ago gained access to a database containing classified information about suspected spies, agents, and terrorists under surveillance by the US government, according to a published report.

The revelation came in an article published Monday by The Washington Post, and it heightens concerns about the December, 2009 hack. When Google disclosed it a few weeks later, the company said only that the operatives accessed Google "intellectual property"—which most people took to mean software source code—and Gmail accounts of human rights activists.

Citing officials who agreed to speak on the condition that they not be named, Washington Post reporter Ellen Nakashima said the assets compromised in the attack also included a database storing years' worth of information about US surveillance targets. The goal, according to Monday's report, appears to be unearthing the identities of Chinese intelligence operatives in the US who were being tracked by American law enforcement agencies.

Read 7 remaining paragraphs | Comments

0
Your rating: None


Bradley Manning.

Wikimedia Commons

Over the course of two hours in a military courtroom today, Bradley Manning explained why—and in precise detail, how—he sent WikiLeaks confidential diplomatic cables and "war logs." Bradley's 35-page statement, read over the course of a few hours this afternoon, followed the news that he had pleaded guilty to 10 lesser counts among the many charges against him. The admissions were not part of a plea bargain; Manning still faces trial in June on the most serious charges, such as "aiding the enemy."

The Guardian's Ed Pilkington sets the scene:

Manning was flanked by his civilian lawyer, David Coombs, on one side and two military defence lawyers on the other. Wearing full uniform, the soldier read out the document at high speed, occasionally stumbling over the words and at other points laughing at his own comments.

The American people had the right to know "the true costs of war," Manning said in court today today. He continued:

Read 11 remaining paragraphs | Comments

0
Your rating: None