Skip to main content

Home/ CNDLS Design Seminar/ Group items tagged security

Rss Feed Group items tagged

Hadley Stein

From Facebook to WikiLeaks: Addressing privacy and security | EHR Watch - 0 views

  • One can argue whether the privacy provisions were weakened or not. In the case of the WikiLeaks, Twila Brase, president of the Citizens' Council for Health Freedom, got to the heart of the matter when she said, "What WikiLeaks shows you is how security information is all about the integrity of individuals." The bottom line is that someone in the State Dept. leaked the documents. No iron-clad privacy provision in the world can protect against a person leaking information - whether it's paper based or computerized. Brase went on to say, "Once you get information on any kind of electronic format, it is very easy to take it, to access it, to share it, to download it."
  • The silver lining in the WikiLeaks scandal is that it puts a laser focus on privacy and security issues, which are things we need to keep working on to make it right.
  •  
    An interesting view of WikiLeaks through the perspective of health care and privacy information. Argues that security information relies on integrity of individuals.
Tyler Sax

Blogs | The Tor Blog - 1 views

    • Hadley Stein
       
      This is kind of confusing. Why is it that this more technological discussion on the internet is uncommon. If it is important that we understand these concepts to understand technology, privacy etc., why isn't it always accessible? Do those you understand these concepts purposely make it inaccessible to those who do not?
  • The question he didn't even know to ask is, "What are safe and secure computing and online practices?"
  • how to think about adversaries online, what is ssl, what it means, what are phishing, viruses, botnets, and state-sponsored malware. By the end of the 4th hour, he understood how tor is different than a simple vpn or proxy server, and when to use tor and when it isn't needed. 3.5h of that discussion was basic operational, computer, and online security and safe practices.
  • ...13 more annotations...
    • Hadley Stein
       
      Is it a problem when even people who you would except (or at least hope) understand how the internet works do not? This really highlights the lack of education surrounding th internet.
  • Look at the infrastructures of google, facebook, yahoo, and microsoft to see the challenges that lie ahead for these tools.
    • Hadley Stein
       
      I had never really thought about the infrastructure, specifically the money, required to develop the internet.
  • who uses and how they use it matters
  • What one should or should not do is policy and law, what one can actually do or not do is technology.
    • Tyler Sax
       
      Good quote
  • 1 billion people are online in some way
  • what a proxy is
  • technology exists to circumvent internet censorship
  • Technology is agnostic, who uses and how they use it matters.
  • Circumvention, anonymity, and privacy tools used in a free world can be a minor annoyance,
  • i.e. wikileaks used wikis, ssl, email, and yes, tor, but in the end, it's an annoyance. We don't have people in the streets rioting trying to overthrow our govt. Wikipedia uses the same technology in wikis, ssl, and email. Everyone loves Wikipedia and considers it a net positive.
  • technology exists to circumvent internet censorship
  • In the 1930s, the feds and police warned of mass chaos if the interstate highway system was built in the US. The ability for criminals to quickly transit between cities was of grave concern.
    • Tyler Sax
       
      I like this analogy about internet security
  •  
    What is the line between moral and immoral? Who determines what is moral or "net positive"?
Ihsaan Patel

WikiLeaks Scandal Spurs Hackers vs. Lobbyist Fight - US News and World Report - 0 views

  • . The companies did so, which prompted a group of hackers to hit back. The group, which goes by the moniker "Anonymous," launched a series of cyber attacks against those three companies and others, in what the hackers dubbed "Operation Payback."
    • Ihsaan Patel
       
      What exactly is the relationship between Anonymous and Wikileaks? Will the relationship between them benefit or hurt wikileaks because Anonymous's activities seem to be explicitly illegal and so Wikileaks could be forced to face even more punishment.
  • Barr's braggadocio didn't sit well with the hacker collective, who then apparently broke into HBGary Federal's computer system and stole tens of thousands of E-mails and posted them on the Internet, hijacked Barr's Twitter account, posted his supposed home address and social security number, and defaced HBGary Federal's website.
    • Ihsaan Patel
       
      The fact that the group broke into the security system of a firm that specializes in cyber security makes me wonder if any information on the internet can truly be kept "safe"
Tyler Sax

WikiLeaks - Submissions - 0 views

    • Randall Bass
       
      The Wikileaks postings are meant to be the beginning of a chain of reference. 
  • That is why we have created our novel method of submission based on a suite of security technologies designed to provide anonymity. We have put a great deal of technical and design work into the drop box because we take the journalist-source relationship very seriously.
    • Randall Bass
       
      What is the security architecture of Wikileaks? What makes the drop box secure? (RBass)
  • ...4 more annotations...
  • Communication is secured with SSL encryption.
  • 3.3 High risk postal submissions
  • This is because our journalists write news stories based on the material, and then provide a link to the supporting documentation to prove our stories are true. It’s not news if it has been publicly available elsewhere first, and we are a news organisation.
  • we do not solicit it
    • Tyler Sax
       
      This assertion was certainly challenged when it came to the most recent US government document leaks. Some speculated that Assange (or someone on his "team") helped the US soldier gain access to the documents
Randall Bass

five minutes to speak | The Tor Blog - 4 views

  •  
    Interesting brief talk about Internet security and the role of proxy technologies, esp under repressive regimes. Though check out the comments too. Clearly there are downsides and social hazards to proxy technologies too.
chaeyouncho91

WikiLeaks VIDEO Exposes 2007 'Collateral Murder' In Iraq - 0 views

  •  
    Especially note the media's fast reaction to the video release on wikileaks - the next day, The New York Times released an official cover story of the clip. Based on a US counterintelligence investigation into Wikileaks, the report determined that Wikileaks "represents a potential force protection, counterintelligence, operational security (OPSEC), and information security (INFOSEC) threat to the US Army." (see highlighted)
Ihsaan Patel

G.W. Schulz: Is WikiLeaks Driving Bank of America to Seize Ugly Web Domains? - 0 views

  • "using defensive domain registration to block others from exploiting domain names associated with your brand," according to its website.
    • Ihsaan Patel
       
      An intersting strategy for combating the wikileaks corporate threat that differs from the one proposed by the three security firms. This one seems to acknowledge that the information will get out, and it is simply trying to do some damage control.
  • snapping up more than 400 domain names (such as brianmoynihansucks.com) in recent weeks that could feasibly be used as destinations for leveling hatred at the company.
    • Ihsaan Patel
       
      The actions seem futile since there seems to be an infinite number of domain names that could be created to hurt Bank of America's image
  • Why the sudden burst in apparent pre-emptive action? One theory is that Bank of America is bracing for a fresh release of documents from the anti-secrecy site WikiLeaks.
Shida Zhang

BBC News - Anonymous hacktivists say Wikileaks war to continue - 1 views

    • Shida Zhang
       
      Note: they are trying to create hundreds of mirror sites for Wikileaks.
  • Security experts said the sites had been targeted by a so-called distributed denial-of-service attack (DDoS), which swamp a site with so many page requests that it becomes overwhelmed and drops offline.
  • Anonymous, which claimed to have carried out the attack, is a loose-knit group of hacktivists, with links to the notorious message board 4chan.
  • ...6 more annotations...
  • PayPal, which has stopped processing donations to Wikileaks, has also been targeted.
  • Paul Mutton at the security firm Netcraft, who is monitoring the attacks, said Visa is considered a more difficult target and the attack on it required a much larger number of "hacktivists" - politically motivated hackers - 2,000 compared with 400 for Mastercard.
  • "We feel that Wikileaks has become more than just about leaking of documents, it has become a war ground, the people vs. the government," he said.
  • "The idea is not to wipe them off but to give the companies a wake-up call," he said. "Companies will notice the increase in traffic and an increase in traffic means increase in costs associated with running a website."
  • DDoS attacks are illegal in many countries, including the UK.
  • Anonymous is also helping to create hundreds of mirror sites for Wikileaks, after its US domain name provider withdrew its services.
Hadley Stein

Twitter data privacy in dispute in WikiLeaks case - Technology & science - Security - m... - 1 views

  • The dispute cuts to the core of the question of whether WikiLeaks allies are part of a criminal conspiracy or a political discussion
  • The U.S. is investigating whether WikiLeaks should be held responsible for leaking classified information, even though it was not the original leaker.
  • "The First Amendment guarantees their right to speak up and freely associate with even unpopular people and cause," attorneys wrote.
  •  
    How exactly would the U.S. government hold WikiLeaks responsible (i.e. Would they identify a person within the organization, the entire organization etc.) Who determines whether WikiLeaks "are part of a criminal conspiracy or a political discussion"?
Adam Rosenfeld

WikiLeaks diplomatic documents put educators in a quandary - Page 2 - Philly.com - 0 views

  • "There is an ethical and moral dimension here that cannot be ignored," he says. "Some people have suffered because of this [leak]; they may even be dead." Danspeckgruber says there is evidence that a number of foreign sources cited in the cables have been punished, perhaps even executed, for passing on information to U.S. diplomats.
    • Adam Rosenfeld
       
      This professor touches on the ethical dilemma of even reading the documents
  • "It has been made clear by the government," she says by e-mail, "that it would be unwise for those who will need security clearances to avail themselves of the cables."Vladeck lays it out: "The government routinely asks potential employees whether they have had access to classified information in the past."If you've read the WikiLeaks material, he says, "you'd either have to say yes, and admit you've broken the law, or you'd have to lie." Not advisable, given the screening process, which often includes a polygraph test.
  • few weeks later," says Meunier, "one student in the [college military program] ROTC found out from his chain of command that reading the actual cables could prevent one from getting a security clearance."
Randall Bass

L. Gordon Crovitz: From WikiLeaks to OpenLeaks | Full Comment | National Post - 0 views

  •  
    Another good piece on the differences between WikiLeaks and OpenLeaks. This one also emphasizes that distribution of responsibility for vetting documents, checking validity, and making determinations about security breaches, etc. to the publishers. The notion of distributed intelligence and distribute responsibility is a key Web concept that has many manifestations. But this is an interesting and important version of it. "Distributed intelligence" is also one of those concepts that has both social and technological implications. 
chaeyouncho91

Wikileaks reveals video showing US air crew shooting down Iraqi civilians | World news ... - 0 views

  •  
    Article on the Petagon's reaction to the release of the video by wikileaks, and declaring it as "a threat against national security"
Tyler Sax

WikiLeaks - About - 2 views

shared by Tyler Sax on 16 Mar 11 - No Cached
  • Our goal is to bring important news and information to the public. We provide an innovative, secure and anonymous way for sources to leak information to our journalists (our electronic drop box).
    • Jaclyn Udell
       
      Do WikiLeaks have a bias/ulterior motive in leaking this information? How can we be certain that the electronic drop box is anonymous and ensures the safety of those submitting the information?
    • Jaclyn Udell
       
      I heard an interview on NPR one time and the people were talking about how authors should reveal their bias in their publications. Since WikiLeaks keeps submitters anonymous how do they expose the bias in their publications?
    • Tom Zorc
       
      While there is a bias in promoting certain data or info over others... a tool commonly used across many media sources, it seems to me that Wikileaks has been determined to release everything credible that comes across their desks, no matter what. (Correct me if I'm wrong.) Not much bias there. Bias on the side of the submitters though, I don't think that's Wikileak's responsibility to uncover... nor a possibility?
  • One of our most important activities is to publish original source material alongside our news stories so readers and historians alike can see evidence of the truth.
    • Jaclyn Udell
       
      Who in the company WikiLeaks is responsible for the repercussions of the information that is exposed? In America we have the right to express ourselves through words, but how does this impose upon other social norms in places where freedom of speech is limited?
    • Tyler Sax
       
      The question about responsibility is a great one. Obviously Julian Assange is taking a lot of heat right now, but he can't be the only one... wikileaks is an organization of paople all around the globe, most of whom work anonymously. 
    • Tom Zorc
       
      Does the responsibility of the repercussions of the content not lie with its creator? The issue of secrecy is interesting here - their communications obviously would have been very different if they *knew* it would be public information. So is secrecy a necessary part of the institution of government? Would the US political engine be designed differently if Wikileaks were a factor from day one? How might it be affected from here on out?
Lee Stromberg

U.S. ambassador to Mexico quits amid WikiLeaks furor - Washington Times - 0 views

  • Mr. Pascual also may have ruffled feathers in the Mexican government and Mr. Calderon’s National Action Party by dating the daughter of Francisco Rojas, the congressional leader of the former longtime ruling Institutional Revolutionary Party. Mexican officials and the U.S. Embassy have declined to comment on that matter.
    • Lee Stromberg
       
      Rather entertaining/interesting complication
  • Other U.S. Embassy cables released since have reported jealousies and a lack of coordination between various Mexican security forces.Their release has marred a relationship that both the United States and Mexico for years have touted as being stronger than ever.
    • Lee Stromberg
       
      It seems that this release of leaks is a culmination of a bunch of material which strains the relationship between the two neighbors.  Pascual's resignation is making more sense
Lee Stromberg

U.S. ambassador to Mexico quits amid WikiLeaks furor - Washington Times - 0 views

    • Lee Stromberg
       
      This article really shows how leaks can control government relations.  I'm confused as to why this expressed frustration at mexican security of drug cartels could considered serious enough for Pascual's resignation of his post.  It almost seems like he was looking for an excuse to go?
  • Mr. Pascual’s resignation — less than two weeks after President Obama met with Mr. Calderon at the White House — appeared to be the biggest fallout yet from thousands of sensitive U.S. diplomatic cables from around the world released by WikiLeaks. It was the first such public departure by a U.S. ambassador during the Obama administration.
Lee Stromberg

BBC News - Bradley Manning wins support from Welsh MP and friends - 0 views

  • he issue of Pte Manning's treatment has been raised with President Obama He said he had received assurances that the terms of Pte Manning's confinement were "appropriate".
    • Lee Stromberg
       
      That probably couldn't get any more vague
    • Lee Stromberg
       
      That probably couldn't get any more vague
  • Bradley Manning's detention at a high security US military prison has seen protests taken to the White House
    • Lee Stromberg
       
      Has anyone seen this downtown?
    • Lee Stromberg
       
      Has anyone seen this downtown?
    • Lee Stromberg
       
      Manning gains Welsh support and his situation strains governmental popularity both in the US and UK
  • ...2 more annotations...
  • But there has been mounting concern about the conditions he is being held in at a military prison.
  • She added: "While I consider myself a friend of the Americans, I think it ill becomes them to treat one of their own soldiers in this way before he has been convicted, before he has been tried."
Duncan Gillespie

Top 10 revelations from WikiLeaks cables - Yahoo! News - 0 views

  • On Sunday, five international news outlets published a selection of more than 250,000 U.S. diplomatic cables, provided by the website WikiLeaks.
    • Duncan Gillespie
       
      The scope of "calbegate" is massive. It would be interesting to learn how a news agency would pour through such a enourmous repository of documents.
  • According to one cable, King Abdullah of Saudi Arabia has repeatedly asked the U.S. to "cut off the head of the snake"
  • 3. The Obama administration offered sweeteners to try to get other countries to take Guantanamo detainees, as part of its (as yet unsuccessful) effort to close the prison. Slovenia, for instance, was offered a meeting with President Obama, while the island nation of Kiribati was offered incentives worth millions.
  • ...1 more annotation...
  • 7. The State Department labeled Qatar the worst country in the region for counterterrorism efforts. The country's security services were "hesitant to act against known terrorists out of concern for appearing to be aligned with the U.S. and provoking reprisals," according to one cable.
  •  
    Helpful to get a breakdown of the overall takeaways from some of the Wikileaks documents that an individual wouldn't be able to do on one's own.
Adam Rosenfeld

U.S. ambassador to Mexico resigns - CNN.com - 0 views

  • The move by Ambassador Carlos Pascual comes amid tension between the United States and Mexico after a U.S. diplomatic cable released last fall by the WikiLeaks website quoted U.S. officials talking about "widespread corruption" in Mexican security agencies and "a dysfunctionally low level of collaboration."
  •  
    Impact of wikileaks!!!! US Ambassador to Mexico to step down because of tension created by the diplomatic cables released by wikileaks.
Nicholas Adams

Iraq war logs: secret files show how US ignored torture - 0 views

  •  
    This article brings up a good question regarding whether the United States military has been honest in their reports of "enemy" casualties. Another important question is posed at the end of the article with a pentagon statement: "Condemning this fresh leak, however, the Pentagon said: "This security breach could very well get our troops and those they are fighting with killed. Our enemies will mine this information looking for insights into how we operate, cultivate sources and react in combat situations, even the capability of our equipment." Where do we draw the line between the citizens' right to know and the safety of government operations? Is it acceptable to allow secrecy to protect citizens or do the citizens have a right to know all that the government does? These are interesting questions given that the government is to be responsible to the citizenry, however, what if included in that responsibility is keeping certain information classified?
1 - 19 of 19
Showing 20 items per page