Thursday Reads
Posted: July 24, 2014 Filed under: Algeria, Foreign Affairs, morning reads, Russia, Ukraine | Tags: Air Algerie Flight 5017, Department of Defense, dogs and emotions, Edward Snowden, Glenn Greenwald, Jacob Applebaum, Malaysian Airlines MH17, Mali, research on dog brains, Snowden in Hong Kong, Spain, Swiftair, TOR, Yasha Levine 25 Comments
Good Morning!!
Another missing plane story tops the news right now. This time it’s an Algerian that has disappeared in Mali. According to the Wall Street Journal: Air Algérie Flight Reported Missing With 116 on Board.
Air Algérie lost contact with Flight 5017 after takeoff from Ouagadougou, Burkina Faso, as the jetliner headed to Algiers with 116 people on board, Algeria’s state news agency and the plane’s operator said Thursday.
French Secretary of Transport Frédéric Cuvillier told reporters the plane disappeared over Northern Mali, where Islamist militants are fighting the Malian government and French forces. Numerous French nationals were probably aboard the missing plane, Mr. Cuvillier said.
Contact with the Boeing Co. BA -0.95%MD-83, carrying 110 passengers and six crew members, was lost at about 1:55 a.m. local time, 50 minutes after the jet had taken off, the Algerian government’s official news agency said in a statement. “Air Algérie launched [an] emergency plan,” the agency added. It gave no other details.
An official at the directorate of Ouagadougou Airport said there had been an incident, “but for the moment we don’t know anything more.” He refused to give his name because he wasn’t authorized to speak to reporters.
Was this plane shot down like Malasian Airlines Flight MH17 in Ukraine?
The flight path of the missing Algerian jet isn’t yet clear but the FAA has warned airlines to be extra vigilant when flying over Mali.
There is no indication the jet was shot down and no confirmation of a crash.
Still, amid questions by airline executives and regulators over whether MH17 should have been flying over eastern Ukraine, the Air Algérie jet’s flight path will be closely scrutinized.
The FAA has banned U.S. carriers of flying over Mali at lower altitudes. The FAA cited “insurgent activity,” including the threat of antiaircraft missiles, rocket-propelled grenades and rockets. Apart from worries about insurgent threats in Mali, the Algerian government has been keeping a close watch on airspace on its eastern border, where violence in Libya has led to flight bans there.
The missing plane was owned by Swiftair, a Spanish charter company. NBC News reports: Air Algerie Jet Chartered by Spain’s Swiftair Vanishes in Africa.
Air Algerie Flight AH5017 vanished about 50 minutes after it left Ouagadougou, Burkina Faso, according to the Algerian Press Service. The jet took off at 1:17 a.m. local time (9:17 p.m. ET on Wednesday) bound for Algiers, Algeria.
In a statement, Madrid-based Swiftair confirmed it had chartered the missing McDonnell Douglas MD-83. Swiftair said 110 passengers and six crew were aboard the jet. It had been due to land in the Algerian capital at 5:10 a.m. local time (12:10 a.m. ET). The flight was missing for hours before the news was made public….Issa Saly Maiga, the head of Mali’s National Civil Aviation Agency, told Reuters that a search was under way for the missing flight. “We do not know if the plane is Malian territory,” he added. “Aviation authorities are mobilised in all the countries concerned – Burkina Faso, Mali, Niger, Algeria and even Spain.”
Updates on Malaysian Airlines MH17
“We thought we were going to fight but instead we found dead civilians”“We thought we would have to fight baled out Ukrainian pilots but instead we found dead civilians. All those poor people with baggage that certainly wasn’t military”. We spoke to a militiaman from the Oplot (stronghold) combat unit at midday yesterday on the concrete platforms of Torez railway station. He was standing beside five rail wagons – four refrigerated and the fifth with the refrigeration unit’s diesel geneerators – containing the human remains collected among the sunflower fields in pro-Russian separatist-held Ukraine. His words are revealing because he spoke them quite naturally, without reflecting, after telling us about the international representatives’ recently completed inspection of the bodies and his unit’s orders to stand guard over the wagons. In its innocence and simplicity, the story is significant. In fact, it could provide new evidence for those who blame the pro-Russians for mistakenly launching the fatal missile under the impression that their target was a Ukrainian military aircraft.
A top rebel commander in eastern Ukraine has reportedly said that the armed separatist movement had control of a Buk missile system, which Kiev and western countries say was used to shoot down a Malaysia Airlines plane last week.
Alexander Khodakovsky, who leads the Vostok battalion – one of the main rebel formations – said the rebels may have received the Buk from Russia, in the first such admission by a senior separatist.
“That Buk I know about. I heard about it. I think they sent it back. Because I found out about it at exactly the moment that I found out that this tragedy had taken place. They probably sent it back in order to remove proof of its presence,” Khodakovsky told Reuters.
Russian news agencies later said people close to Khodakovsky denied he made the admissions. Khodakovsky himself told Life News, a Russian news agency with links to Moscow’s security services, that he was misquoted and had merely discussed “possible versions” with Reuters. Khodakovsky said the rebels “do not have and have never had” a Buk.
As two further Ukrainian fighter jets were shot down, apparently by missiles fired from within Russia, Khodakovsky appeared to imply that MH17 was indeed downed by a missile from the Buk, assuming the interview with Reuters is confirmed. He blamed Ukrainian authorities, however, for allowing civilian jets to fly over its airspace when the rebels had such capabilities.
Mr Borodai admitted that the rebels had received support from “the whole Russian people” in their fight against the Ukrainian government.
“Volunteers are joining us,” he told the Newsnight programme, describing himself as one of them – “a resident of the city of Moscow”.
“It just so happened that, instead of sitting in a trench with a rifle or a machine gun, I now have the post of prime minister. Well… that’s fate.”
He denied that he was a member of a Russian intelligence agency, as has often been alleged.
However, he admitted to having contact with other members of the secret services in Russia – as, he said, would anyone “who has dealings with the elite of society”.
On the treatment of the bodies,
“We wanted to collect the bodies from the very beginning,” said Mr Borodai.
“But we were under extreme pressure from the OSCE representative, who said to us: ‘I represent 57 countries. Don’t you dare touch the bodies of the dead. Under no circumstances. Or else all the 57 countries of the OSCE will do this and that to you.'”
“So we wait a day. We wait a second day. A third day. Come on! Not a single expert…. Well, to leave the bodies there any longer, in 30C heat, it’s absurd. It’s simply inhuman. It’s a scene from a horror movie.”
However, an OSCE spokesman told the BBC that the organisation had not warned the rebels against moving the bodies.
More obfuscation at the link. Thank goodness the bodies are now being returned to the Netherlands.
Do Dogs Experience Emotions?
There’s a story in The New York Times about research on dogs and emotions with a somewhat cutsie headline and introduction, Inside Man’s Best Friend, Study Says, May Lurk a Green-Eyed Monster. Do dogs experience jealousy?
The answer, according to Christine Harris, a psychologist at the University of California, San Diego, is that if you are petting another dog, Roscoe is going to show something that Dr. Harris thinks is a form of jealousy, even if not as complex and twisted as the adult human form.
Other scientists agree there is something going on, but not all are convinced it is jealousy. And Roscoe and the rest of his tribe were, without exception, unavailable for comment.
Dr. Harris had been studying human jealousy for years when she took this question on, inspired partly by the antics of her parents’ Border collies. When she petted them, “one would take his head and knock the other’s head away,” she said. It certainly looked like jealousy.
But having studied humans, she was aware of different schools of thought about jealousy. Some scientists argue that jealousy requires complex thinking about self and others, which seems beyond dogs’ abilities. Others think that although our descriptions of jealousy are complex, the emotion itself may not be that complex.
Read more, including reactions from other scientists at the NYT.
Another researcher, Greg Berns of Emory University, has been examining the question of how dogs think and how they relate to humans.
“The more I study dogs and the more I study their brains, the more similarities I see to human brains,” Berns told WGCL-TV. “They are intelligent, they are emotional, and they’ve been ignored in terms of research and understanding how they think. So, we are all interested in trying to develop ways to understand how their minds work.”
Dr. Berns uses an MRI to test a dog’s brain.
“So, we’ve done experiments where we present odors to the dogs and these are things like the scent of other people in their house, the scent of other dogs in the house, as well as strange people and strange dogs,” Berns said. “And so what we found in that experiment is that the dogs reward processing center, so basically the part of the brain that is kind of the positive anticipation of things responds particularly strongly to the scent of their human.” ….
“Currently, we are trying to understand what dogs perceive about the world,” Berns said. “You know, what do they see when they see humans, dogs, other animals, cars, etc. so the idea is, at least in humans and even in certain chimpanzees and monkeys, there are parts of the brain specialized for visual processing of all of these things and so what we are trying to determine is whether a dog has that same kind of specialization.
Here’s Dr. Berns’ home page. He has written a book called How Dogs Love Us.
Anyone who has ever spent time with dogs (or cats for that matter) knows that pets express emotions through body language, facial expressions, and vocalizations; it’s nice to see there are some serious researchers trying to understand their emotions and thinking processes.
A couple more interesting reads . . .
At Talk to Action, the first two-parts of a three-part article on the influence of fundamentalist Catholocism on the Supreme Court by Frank Coccozelli: An Opus Focus on SCOTUS? A brief excerpt:
Beyond the creeping erosion of Roe, there is the disturbing reliance upon traditionalist Catholic teaching on grey area issues, such as a pregnancy endangering the life of the mother. As Justice Ginsburg noted in here dissent:
Today’s decision is alarming. It refuses to take Casey and Stenberg seriously. It tolerates, indeed applauds, federal intervention to ban nationwide a procedure found necessary and proper in certain cases by the American College of Obstetricians and Gynecologists (ACOG). It blurs the line, firmly drawn in Casey, between previability and postviability abortions. And, for the first time since Roe, the Court blesses a prohibition with no exception safeguarding a woman’s health.
Where does this leave a Jewish woman whose life is endangered by a pregnancy? By the Supreme Court’s reasoning in Carhart, the Jewish teaching of saving the mother’s life in such circumstances is not respected. Vatican teaching is completely different. Instead it prohibits any abortion procedure that would be required not only if the choice is between the life of the mother and the fetus, but also where if no procedure is performed, a stillborn would result. That is an extreme teaching that many mainstream Catholics reject outright.
Read Part one here and Part two here.
At Pando, Yasha Levine has a fascinating story about the bizarre and twisted interactions between the encryption service TOR and its most prominent employee Jacob Applebaum, the Department of Defense, the CIA, Edward Snowden, and Glenn Greenwald, Hall of Mirrors: Wikileaks volunteer helped build Tor, was funded by the Pentagon. It’s a must-read for anyone interested in the Snowden story. Also check out Levine’s earlier article, Almost everyone involved in developing Tor was (or is) funded by the US government.
Also for Snowden junkies, Michael Kelley at Business Insider writes about “An 11-Day Hole In Snowden’s Story About Hong Kong.”
Why doesn’t the mainstream media ask any serious questions about Snowden and his closest supporters?
Now it’s your turn. What stories are you following today?
Thursday Reads: Updates from Snowden-Greenwald Land and Other News
Posted: May 22, 2014 Filed under: morning reads | Tags: Cincinnatus, cyber-parties, discrimination, Edward Snowden, encryption extremists, George Packer, Glenn Greenwald, hackers, Jacob Applebaum, Julian Assange, Kevin Poulsen, Laura Poitras, NSA, Poverty, privacy extremists, Racism, Runa Sandvik, Sexism, The Tor Project, unemployment, Wikileaks 32 CommentsGood Morning!!
The photos in today’s post are from a project by photographer Mark Makela to take pictures of children “learning to read by reading to homeless cats.”
Last February, photographer Mark Makela traveled to Birdsboro, Pennsylvania, to photograph a reading group where the participants were grade-school students and a group of cats. The idea for the group, known as Book Buddies, was hatched at the Animal Rescue League of Berks County when the program coordinator Kristi Rodriguez’s 10-year-old son was struggling with reading. Rodriguez decided to bring him into the shelter, where he could be in what she called a “nonevaluative” environment in order to feel more comfortable practicing his reading skills. It worked.
According to ARL’s website, studies at Tufts University found that the more relaxed, nonjudgmental audience of cats helps students to sustain their focus, maintain a higher state of awareness, and develop an improved attitude toward school. In August of last year, ARL officially started the Book Buddies program, inviting students in first through eighth grades to read to the cats. As an incentive to continue, once the students complete five books, they receive prizes. “It’s one of those opportunities that is unique and humorous and so endearing,” Makela said about the assignment to document the Book Buddies program.
See more marvelous photos at the Slate Magazine link above. Even more at Buzzfeed–including more girls.
Now to the news:
I’ve long suspected that Edward Snowden interacted with Wikileaks’ Julian Assange and others in the hacker community before he made his final decision to steal a massive trove of data from NSA computers and then abscond to Hong Kong at the end of May last year.
We know that Snowden was in touch with Jacob Applebaum and Laura Poitras early on, because they published an interview with him in Der Spiegel that they had conducted by e-mail in Mid-May, before Snowden fled Hawaii. But Snowden could have actually met Applebaum in Hawaii in April 2013 when Applebaum vacationed there by his own admission. Did Snowden and Applebaum discuss Snowden’s plans to steal NSA files? Did Applebaum suggest which items Snowden should take? Note that Applebaum is deeply involved with Wikileaks and has been a long-time, passionate defender of Julian Assange.
Glenn Greenwald revealed in his new book “No Place to Hide” that Snowden had used the code name “Cincinnatus” in early communications between the two. Interestingly enough, a “cyber-party” had been held in Hawaii in December 2012, and the host was someone who called himself “Cincinnatus.” Once this news came out, people began speculating on Twitter that perhaps this wasn’t a coincidence. Suddenly, on May 17, the cyber-party announcement was deleted by someone with the Twitter handle @jskuda. Fortunately Twitter user @ShrillBrigade located it on the Wayback Machine. And check out the title of Cincinnatus’ talk: “Painlessly setting up your own fast exit.” (h/t @catfitz)
Then yesterday, former criminal hacker and technical adviser to Greenwald and Poitras’ Freedom of the Press Foundation Kevin Poulsen published a limited hangout at Wired: Snowden’s First Move Against the NSA Was a Party in Hawaii.
It was December 11, 2012, and in a small art space behind a furniture store in Honolulu, NSA contractor Edward Snowden was working to subvert the machinery of global surveillance.
Snowden was not yet famous. His blockbuster leaks were still six months away, but the man destined to confront world leaders on a global stage was addressing a much smaller audience that Sunday evening. He was leading a local “Crypto Party,” teaching less than two dozen Hawaii residents how to encrypt their hard drives and use the internet anonymously.
“He introduced himself as Ed,” says technologist and writer Runa Sandvik, who co-presented with Snowden at the event, and spoke about the experience for the first time with WIRED. “We talked for a bit before everything started. And I remember asking where he worked or what he did, and he didn’t really want to tell.”
Runa Sandvik is a hacker who works at the TOR project along with Jacob Applebaum. TOR is a site (ironically funded by the U.S. Department of Defense) that provides free encryption software to people who want to hide their on-line activities (including drug dealers and child porn purveyors).
Poulsen writes:
The roots of Snowden’s crypto party were put down on November 18, 2012, when he sent an e-mail to Sandvik, a rising star in privacy circles, who was then a key developer on the anonymous web surfing software Tor.
Tor is free software that lets you go online anonymously. The software is used by a wide swath of people in need of extreme anonymity, including human rights groups, criminals, government agencies, and journalists. It works by accepting connections from the public internet, encrypting the traffic and bouncing it through a winding series of relays before dumping it back on the web through any of more than 1,000 exit nodes.
Most of those relays are run by volunteers, and the pre-leak Edward Snowden, it turns out, was one of them.
How about that? Snowden was already deeply involved with TOR in December 2012–and Jacob Applebaum of TOR just happened to travel to Hawaii a few months later in April! Coincidence? I don’t think so.
In his e-mail, Snowden wrote that he personally ran one of the “major tor exits”–a 2 gbps server named “TheSignal”–and was trying to persuade some unnamed coworkers at his office to set up additional servers. He didn’t say where he worked. But he wanted to know if Sandvik could send him a stack of official Tor stickers. (In some post-leak photos of Snowden you can see the Tor sticker on the back of his laptop, next to the EFF sticker).
Well, well, well. Now we know how Snowden got his TOR sticker. Did Runa give him the EFF sticker too? Read the rest of the Wired piece for more details.
Phew! I hope that made sense. This stuff is difficult to write about.
Also yesterday, well-known and respected journalist and New Yorker writer George Packer published a no-holds-barred review of Glenn Greenwald’s new book in the UK Prospect: The errors of Edward Snowden and Glenn Greenwald. Among other things, Packer accuses Greenwald of “a pervasive absence of intellectual integrity,” and provides numerous examples. He characterizes Snowden as someone who lives on the internet, detached from the realities of the real world. Here are a few excerpts, but please read the whole thing.
Snowden’s leaks can be seen, in part, as a determined effort to restore the web to its original purity—a project of technology rather than law. “Let us speak no more of faith in man, but bind him down from mischief by the chains of cryptography,” wrote Snowden, in an early message to his collaborators. In March of this year, appearing remotely from Russia on a robotised screen onstage at a TED talk in Vancouver, Snowden said that the single best solution to the NSA’s abuses is stronger encryption: “The internet that we’ve enjoyed in the past has been exactly what we, as not just a nation but as a people around the world, need.” In taking nearly two million highly classified documents from the US, he was grabbing back the key to heaven.
As I’ve written previously, Snowden’s solution to the problem of government interference with its citizens is impenetrable universal encryption–never mind the fact that this would allow vast numbers of vicious criminals to hide their actions from law enforcement.
As I suspected, Packer writes that Greenwald’s book “contains no major scoops.” He does, however, praise Greenwald’s argument for the primacy of privacy as central to a “free society.”
Greenwald also makes a powerful case—all the more so for being uncompromising and absolute—for the central role of privacy in a free society, and against the utilitarian argument that, since the phone companies’ metadata on Americans hasn’t been seriously abused by government officials (not yet, anyway), none of us should be too worried. In a chapter called “The Harm of Surveillance,” he cites Justice Louis Brandeis’s famous opinion on the basic “right to be let alone,” and writes: “The desire for privacy is shared by us all as an essential, not ancillary, part of what it means to be human. We all instinctively understand that the private realm is where we can act, think, speak, write, experiment, and choose how to be, away from the judgemental eyes of others. Privacy is a core condition of being a free person.”
I would argue that these considerations are of vital importance to people like Greenwald who are financially secure. Those Americans who must deal with racial and gender discrimination, long-term unemployment, and especially grinding poverty have other, more urgent concerns. Can one be a “free person” under those conditions?
Along similar lines, Packer writes:
If Greenwald and others were actually being persecuted for their political beliefs, they would instinctively understand that the rule of law has to protect people regardless of politics. The NSA disclosures are disturbing and even shocking; so is the Obama administration’s hyper-aggressive pursuit of leaks; so is the fact that, for several years, Poitras couldn’t leave or re-enter the US without being questioned at airports. These are abuses, but they don’t quite reach the level of the Stasi. They don’t portend a totalitarian state “beyond the dreams of even the greatest tyrants of the past,” as Greenwald believes is possible. A friend from Iran who was jailed and tortured for having the wrong political beliefs, and who is now an American citizen, observed drily, “I prefer to be spied on by NSA.” The sense of oppression among Greenwald, Poitras, and other American dissenters is only possible to those who have lived their entire lives under the rule of law and have come to take it for granted.
In the year since the first NSA disclosures, Snowden has drifted a long way from the Thoreauvian ideal of the majority of one. He has become an international celebrity, far more championed than reviled. He has praised Russia and Venezuela’s devotion to human rights. His more recent disclosures have nothing to do with the constitutional rights of US citizens. Many of them deal with surveillance of foreign governments, including Germany and Brazil, but also Iran, Russia, and China. These are activities that, wise or unwise, fall well within the NSA’s mandate and the normal ways of espionage. Snowden has attached himself to Wikileaks and to Assange, who has become a tool of Russian foreign policy and has no interest in reforming American democracy—his goal is to embarrass it. Assange and Snowden are not the first radical individualists to end up in thrall to strongmen.
Snowden looked to the internet for liberation, but it turns out that there is no such thing as an entirely free individual. Cryptography can never offer the absolute privacy and liberty that Snowden seeks online. The internet will always be a space controlled by corporations and governments, and the freedom it provides is of a limited, even stunting, kind. No one lives outside the fact of coercion—there is always a state to protect or pursue you, whether it’s Obama’s America or Putin’s Russia.
I’ve barely touched the surface of Packer’s scathing critique of Greenwald’s “journalism”; I enourage you to go to Prospect link to read more.
I have a few more stories for you that I’ll list link-dump style:
It appears that the prosecution in the Boston Bombing case decided to leak some previously secret information–most likely to counter the defense’s argument that Dzhohar Tsarnaev was illegally questioned by the FBI when he was in the hospital with terrible injuries.
Reuters: Accused Boston bomber admitted role in attack, prosecutors say
NBC News: Government doc shows how closely Boston Marathon bombers followed al Qaeda plans.
NY Daily News: Boston Marathon bombers used ‘sophisticated’ bombs made of parts from Christmas lights, model cars: prosecutors.
Boston Globe: Christmas Lights Used in Boston Marathon Bombs.
KSDK.com: Feds: Boston bomber’s hideout note says he wanted to be martyr.
ABC News: FBI Feared Boston Bombers ‘Received Training’ And Aid From Terror Group, Docs Say.
This is encouraging from the Boston Globe: Oakland Examining Pension of FBI Agent who Shot Todashev
Other News:
The Economic Times of India: Google wants to show ads through your thermostat and car. (You though the NSA was bad?)
Information Week: Google Outlines Advertising Vision. (How would you like targeted Google ads appearing on your refrigerator or watch?)
The Atlantic: It Wasn’t Household Debt That Caused the Great Recession; It was how that debt was disproportionately distributed to America’s most economically fragile communities.
NYT: U.S. Sends Troops to Chad to Aid Hunt for Nigerian Schoolgirls.
USA Today: Thai military declares coup, detains party leaders.
Science Recorder: ‘Aliens of the sea’ could lead to breakthroughs in regenerative medicine.
What stories are you following today? Please post your links on any topic in the comment thread.
Tuesday Reads: Hacker Twitter Storm and Post-Prom Nightmares
Posted: May 20, 2014 Filed under: Crime, morning reads, Rape Culture, Real Life Horror, Violence against women | Tags: after-prom horrors, Calhoun High School Georgia, cypherpunks, Edward Snowden, Ellijay Georgia Calhoun High Prom Rape, gang rape, Gilmer County GA, Glenn Greenwald, hackers, Jacob Applebaum, John Cook, Laura Poitras, NSA leaks, redactions, The Intercept, twitter fight, twitter storm 104 Comments
Good Morning!!
In the comments on yesterday’s post, I mentioned that there has been quite a bit of tension building up between Glenn Greenwald and some of the more extreme members of the (for lack of a better name) cypherpunks crowd–Wikileaks, Cryptome.com, and the hacker community (including Jacob Applebaum, who is closely involved both with Wikileaks and Laura Poitras, Greenwald’s partner in crime. I guess I should have stayed up later last night, because this morning I woke up to the aftermath of a major storm in the Twitterverse, where most of these types of people choose to communicate with each other.
The fight stemmed from an article posted at The Intercept yesterday, in which the authors chose to redact the name of one of the five countries targeted by NSA data collection. However, it really goes back much further than that.
There has been a long running disagreement between Greenwald and the other groups I mentioned on how much of Edward Snowden’s trove of stolen NSA data to publish. The hacker/Wikileaks crowd thinks Greenwald should simply release everything and let the chips fall where they may, and Greenwald claims he is carefully vetting the material with Snowden’s help in order not to reveal anything that would harm anyone.
Greenwald has actually revealed only a small portion of the material so far, presumably holding back information that he wanted to include in his book. But now the book has been released, and it apparently contains much information that has already been published. For those who have been obsessively following the NSA leaks story, there doesn’t seem to be a need to buy the book. Why is Greenwald being so stingy?
Here’s some background from Michael Kelley at Business Insider: WikiLeaks Threatens To Reveal Information That Glenn Greenwald Says Could Lead To ‘Deaths’.
America’s National Security Agency (NSA) can “vacuum up and store the actual content of every conversation” in the Bahamas and an unnamed country, the new publication The Intercept reported Monday, based on documents leaked by Edward Snowden.
Intercept Editor Glenn Greenwald — who wrote about documents leaked by Snowden when he was a columnist for The Guardian — said the publication didn’t reveal the country because it was “very convinced” that doing so would lead to “deaths.”
After a heated discussion between WikiLeaks, Greenwald, Intercept Editor-In-Chief John Cook, and American WikiLeaks hacker-turned-Der Spiegal contributor Jacob Appelbaum, WikiLeaks tweeted that it will reveal the name of the second country being spied on by the NSA.
As Kelley points out, the implications is that Wikileaks knows the name of the country either by unmasking the redaction with software or because Wikileaks has access to the Snowden files.
The most plausible way for WikiLeaks to have access to a Snowden cache is if Appelbaum, who led the reporting on several Der Spiegel articles based on NSA documents (which may or may not be from Snowden), shared information with his friend and WikiLeaks Editor-In-Chief Julian Assange. Applebaum tweeted that The Intercept’s redaction was “a mistake.”
Appelbaum, a close friend of Laura Poitras, the other journalist whom Snowden gave a large set of documents, also gave a presentation detailing a classified document listing technology available to the NSA’s hacking unit, known as TAO. It is not known how he acquired those documents.
So which is it? The careless ways in which the Snowden documents have been passed around between The Guardian and The New York Times and other news organizations; with Greenwald’s husband David Miranda carrying them through London to Berlin and back; as well as the fact that Snowden is in Russia, suggest that the entire cache will eventually be released, and presumably all hell will break loose. It’s only a matter of time.
Charles Johnson posted the entire Wikileaks-Greenwald argument at Little Green Footballs: Slap Fight of the Day: Wikileaks vs Pernicious G
Today on Twitter this happened: Julian Assange, who most people believe is the one behind the @Wikileaks account, threw a huge tantrum because Glenn Greenwald redacted the name of a country from his latest disingenuous article. Greenwald says he was convinced publishing the country’s name would lead to deaths. Assange doesn’t give a shit about that, of course.
There are some inadvertently hilarious moments here; Wikileaks’s Jacob Appelbaum says redacting the country “makes Wikileaks look extreme.” I almost fell out on that one. And then there’s the tweet in which Assange basically calls everyone in Greenwald’s crew “a bunch of racists.” And it all ends with Assange issuing a super-villain threat to release the country’s name “in 72 hours.”
Scroll through the collection below to see what it looks like when extreme libertarians have a purity war.
Head over to Green Footballs if you want the details. Read more exchanges between Wikileaks, Jacob Applebaum, and John Cook, editor of The Intercept at Chirpstory. Read more at Buzzfeed, where Miriam Berger and Miriam Elder provide a timeline of the tweets along with their interpretation: Julian Assange Is Angry At Glenn Greenwald And He’s Not Going To Take It Anymore.
Finally, Bob Cesca’s take on the whole affair: The Wikileaks vs Greenwald Twitter Fight: Julian Assange Threatens To Reveal Deadly NSA Info.
It all began Monday morning when The Intercept posted a new Snowden revelation with cutesy headline: “Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahamas.” Get it? Pirates! The article exhaustively describes an operation called MYSTIC and another called SOMALGET in which NSA gathers audio and metadata of cellphone calls in the Bahamas in order to spy on human traffickers and drug cartels. The Bahamas is notorious for both.
Naturally, the article featured all of the deceptive Greenwaldian bait-and-switch we’ve come to expect from his Snowden articles. For example, in paragraph seven, Greenwald and his co-authors Ryan Devereaux and Laura Poitras noted that Sen. Tom Harkin (D-IA), Bill Gates and Oprah Winfrey routinely vacation in the Bahamas:
By targeting the Bahamas’ entire mobile network, the NSA is intentionally collecting and retaining intelligence on millions of people who have not been accused of any crime or terrorist activity. Nearly five million Americans visit the country each year, and many prominent U.S. citizens keep homes there, including Sen. Tom Harkin (D-Iowa), Bill Gates, and Oprah Winfrey.
NSA is spying on Oprah! Stop the presses! But no, if you read all the way down to the 54th paragraph (!!) Greenwald tosses in a token mention of NSA’s rules about preventing data collection against U.S. Persons, whether or not they happen to be inside the U.S. There are very strict “minimization” procedures to eliminate the data that might’ve been inadvertently collected. Why? Because it’s illegal to spy on Americans without an individual warrant. And, by the way, Greenwald & Company noted that the SOMALGET program is, yes, legal.
It sure seems like there are enough hints in the story for anyone to guess the redacted country. Pirates? SOMALGET? Plus the fact the Assange accused Greenwald of “racism.” Read much more interpretation and more tweets at The Daily Banter.
I’ll be keeping a close eye on this story from now on and I’ll pass on any new information.
In other news . . .
On Sunday JJ wrote about an alleged gang rape that reportedly took place after the Calhoun High School senior prom in North Georgia on May 10. The reason I’m writing about it is that Sky Dancing has been getting a huge number of clicks from people looking for more information on this story. It seems people want to know what is happening, but the local papers have not published anything on the crime or the investigation since Sunday. Doesn’t that seem odd and troubling? Is a cover-up in the works. As JJ pointed out it brings back memories of Steubenville, Ohio. After the gang rape there, local officials tried to sweep it under the rug, but a blogger and an “Anonymous” group kept the story alive. Maybe someone with inside information from Calhoun needs to get something like that started? As in Steubenville, there are hints that coddled football players may be involved.
Meanwhile, in another prom-related tragedy, a girl was found dead after a prom at MacArthur High School in Houston. According to her mother, the mother of Jacqueline Gomez’ boyfriend was supposed to bring her home that night, but instead the boy’s mother allowed the couple to stay in a hotel room against the Gomez’ mother’s wishes. To me the whole thing sounds really suspicious. From KHOU.com, Mother: Daughter was not supposed to stay at hotel after MacArthur HS prom.
There are new startling details from the mother of a teenagerfound dead on prom night. Her mother feels like she was mislead by her daughter’s prom date and his mother….
Gomez was off to her senior prom at the Hyatt North Houston Hotel. Her mother was too distraught to show her face on camera, but said she expected to see her daughter back at home later that night….
Barron said Gomez’s date’s mother picked the couple up from her home. She also picked them up from the hotel later that night. That’s when she last spoke to her daughter on the phone.
“I just spoke to them after prom, a couple words, told me she was going to get something to eat,” said Barron.
That’s when the boy’s mother got on the phone and asked if Gomez could spend the night at their house.
“I said no, bring her back home,” said Barron. “I gave them a couple hours, and I never heard back.”
The next call she got was from a homicide detective with the Houston Police Department. She said detectives told her the room was booked by the boyfriend’s mother.
What happened? Who gave Jacqueline the drugs and did the boy’s mother know about it? More information from The Houston Chronicle: Texts Hint Girl May Have Overdosed After Prom.
A series of text messages offered new details into the death of Jacqueline Gomez, the 17-year-old Aldine ISD senior found dead Saturday in a Houston motel room the morning after her prom. The texts, sent from an account identified as Gomez’s date, also indicate investigators believe the girl probably overdosed….
Yet nobody can be certain how the MacArthur High School student died until autopsy results are complete – which could take several weeks, the Harris County medical examiner said. And that has the date and Gomez’s family and friends anxiously waiting for the mystery to be solved.
Meanwhile, her friends and family refute any suggestion that Gomez was ever a “party girl,” saying she spent most of her time working at a Kroger grocery and preparing to graduate in June.
Was Jacqueline given a date-rape drug? We may never find out, because those drugs wash out of the system very quickly. Check this out:
“He was posting pictures of himself crying on Instagram. So I a sent him a text that day to ask what had happened to my girl,” said Justice Gonzalez, a close friend of Gomez who saw the couple leave the prom together Friday night to go to that room. Authorities report Gomez was found dead in her bed about 9:20 the next morning.
“They said she overdosed,” part of the text reads, likely referring to law enforcement officials.
He went on.
“I woke up. I tried waking her but she wouldn’t,” the date texted back, adding four frowning faces. “I was screaming and crying telling her to wake up. But she didn’t. She didn’t,” He ended his text with two frowning faces with tears.
He stated she had appeared “perfectly fine and happy” when they left the “Miami Night” prom. She also seemed “happy” when they both went to sleep, he said.
He had told authorities that they had some alcohol, but said in a text to the friend that Gomez had also taken the painkiller hydrocodone.
Why the f&ck didn’t didn’t he take her home, and WTF was his mother thinking?! Furthermore, why can’t something be done to prevent these kinds of after-prom horrors?
Now I’m really mad, and I’m running out of space and time. I’ll post links to other news in the comment thread, and I hope you’ll do the same.
Recent Comments