I wonder what are the risks associated with downloading and sharing such torrents.
Evidently, anyone getting them becomes a highly visible target and once the content of these torrents is known, you could become involved in the distribution of classified data.
Even if the content is not known, it could be viewed as an 'unfriendly' act and could make you become a "target of interest" to some zealous 3-letter agency...
Maybe I'm too paranoid. On the other hand, maybe not enough. Hard to know these days.
And what if I'm not a USA citizens, they are watching me anyway. Anyway, if I were on the NSA's office, watching everyday comments on Hacker-News I'd already have targeted half it's crowd potentially dangerous to the security of the country, just for being so interested in national security matters. Those Geeks!!!
You do state the law correctly, your confusion seems instead to be with regards to the phrase "due process."
It means literally what it says: everyone is entitled to "due" (i.e. warranted) process, not judicial process. What process is "due" in any given case? It is, on its face, a context-sensitve inquiry.
If you trace the due process clause back to its origins in Clause 39 of the Magna Carta, you'll see that it is not a guarantee of a trial in every case, but rather a protection against arbitrary action: "No free man shall be seized or imprisoned, or stripped of his rights or possessions, or outlawed or exiled, or deprived of his standing in any other way, nor will we proceed with force against him, or send others to do so, except by the lawful judgment of his equals or by the law of the land." The AUMF is, for better or worse, the law of the land.
People gave Eric Holder a lot of flak when he stated that the Constitution guarantees due process and not judicial process, but his comment was a totally uncontroversial statement of the law. I'm pretty sure Greenwald knows that too, since last time I checked NYU (where he got his JD) doesn't teach some bizarro version of Constitutional Law where down is up and due process always requires a trial.
Before mentioning "due process", the Fifth Amendment states:
"No person shall be held to answer for a capital, or otherwise infamous crime, unless on a presentment or indictment of a Grand Jury, except in cases arising in the land or naval forces, or in the Militia, when in actual service in time of War or public danger..."
The exclusion for "cases arising in the land or naval forces" apparently applies to members of the U.S. military, who can be tried under military law (like Bradley Manning was). [1]
Furthermore, the Sixth Amendment says:
"In all criminal prosecutions, the accused shall enjoy the right to a speedy and public trial, by an impartial jury of the State and district wherein the crime shall have been committed, which district shall have been previously ascertained by law, and to be informed of the nature and cause of the accusation; to be confronted with the witnesses against him; to have compulsory process for obtaining witnesses in his favor, and to have the Assistance of Counsel for his defence."
So I don't understand how the Constitution allows the federal government the right to execute a citizen without judicial process. Any references would be sincerely appreciated.
> So I don't understand how the Constitution allows the federal government the right to execute a citizen without judicial process. Any references would be sincerely appreciated.
I think you'll be waiting a long time for rayiner to give you one.
The "time of war" clause applies to soldiers serving in the U.S. armed forces, who are subject to military law. It doesn't apply to random U.S. citizens.
That won't dissuade him. We live in strange times where people practicing cognitive dissonance want to deny others their basic rights because "terr'rists wanna blow you up!"
Judicial process is a subset of due process. You'll notice the comment I was responding to mentioned judicial process. If a US citizen takes up arms with an enemy whom the US is at war with, then the process which he is due does not extend past accurate sighting before the trigger is pulled.
Of course it's a tragedy if a citizen is killed in time of war if it turns out they were not actually engaged in combat alongside the enemy, but war is tragic in general.
And herein lies the beauty of the war on terror, drugs, internet piracy, etc. You (the gov'nt) don't have to define who the enemy are, what actually constitutes an act of combat, or how we know the war has come to an end.
Read the Patriot Act. Read the rules of engagement for taking out U.S. citizens. It would not take a stretch of Eric Holder's imagination to think that downloading the Wikileaks file constitutes an act of aggression against the U.S.
You may be right that my understanding of the due process clause is confused. It's been over a decade since I went to law school and I'm getting up in the years, so it wouldn't be completely surprising.
However, I think you miss the point of my response in context of the comment I was responding to. The point of my comment was that our government has taken a very fluid approach to the law to fit its needs versus American citizens/non-citizens. If one feels a certain comfort that the law will protect him/her in the course of some action that seems fully protected by the law today, you might be in for a rude awakening tomorrow.
Suppose, for example, that you discovered a locked storage box with 'property of Big Bank' on the outside. You're supposed to report found items to the police; instead you take it home. Someone sees you and the police turn up; it emerges the box contains a lot of money, and you are charged with theft. You argue at trial that no mens rea existed because you didn't know about the money; true, but the possibility that a locked box belonging to Big Bank would be full of cash was what motivated you to take it home. If, on the other hand, the both contained a brick, you could still be charged with attempt because your intent in picking up the box was impure, even if the contents were valueless.
In this case, Wikileaks 'insurance' documents have in the past contained classified information; they are meant to function as insurance because the contents would embarrass or injure someone if revealed; revelation would be contingent on Wikileaks' dissolution or disablement; and it's reasonable to suppose that only a government could bring that about. Thus, your decision to host the files, even without knowledge of their content, involves an awareness of the strong possibility that they do contain classified information. So whatever the contents actually turn out to be, you would be judged on your intent given the information available at the time.
Now you might also argue that there was some higher interest motivating your actions, eg the belief that all secrecy is evil and that nothing should be classified, ever. But such moral beliefs are normative, ie expressions of what you think the law should be; they have no bearing on what the law actually is, and it is the latter which is supposed to govern your actions. For comparison, I might hold a sincere belief that any insult to a person's honor justifies violent retaliation; but if I kill someone in defense of my honor, that won't spare my from charges of murder, because my private belief is not the law of the land, no matter how sincerely it is held.
In short, don't take deliberately engineered ignorance as equivalent to innocence.
You may find this law review article of interest: http://www.columbialawreview.org/wp-content/uploads/2012/07/... This discusses a narrower reading of mens rea than I have outlined above, but bear in mind the elevated likelihood of a public welfare argument in a case where national security turns out to be at stake. So I would be reluctant to rely on Flores-Figueroa as an escape hatch because that was a case in which the harm largely befell a single individual (the lawful possessor of the identifying information that F-F appropriated), as opposed to the general public whose collective security could be compromised by the release of classified information, personified in the form of the Untied States.
So what is the chance they put out an insurance file that they know can be decrypted by the NSA and has really damaging documents in it? I mean it would be a way of showing the NSA what you have, having it already in the hands of a bunch of other people. I wonder if that would be a useful strategy. It could give the NSA time to build a counter story (parallel construction :-) which would be mitigate some of the impact, but it could also be construed as a form of "responsible disclosure" letting them know before the world knows so they can "patch their systems."
I hope some creative writer is out there doing some exploration out there in a novel. Lots of interesting questions to think about with regard to the mechanics of this whole story.
If they're releasing something that they could reasonably expect the NSA to be able to crack, there's a non-zero chance other governments would be able to read it as well. That's not really "responsible disclosure" anymore.
It would be safer to just send the decryption key directly to the NSA on a CD. ;)
The NSA dedicates most of its resources to "working smarter not harder." If they have discovered a weakness in AES, it could be as little as running a single executable on a Macbook Air.
If by "working" you mean "bullying" and "strong arming" and "threatening" and "blackmailing" people. It doesn't take a lot of energy to bullying somebody into putting trojan horses into their encrypted email service, and threatening to arrest them if they shut down their company. What kind of dirt do you think they have on Obama and Pelosi and the rest of the Senate and House of Representatives, to make them so cooperative? More like "Work illegally, not smarter."
We do not know that. Using thermodynamics we can establish a limit on how much computation we can do (if I recall correctly Applied Chryptography says that a super nova does not have sufficient energy to count to 2^256 in base 2). However, we have no theoretical bases regarding how much computation is involved in breaking AES256. All we do know is that we (the public) do not know of a way to do it.
Glenn Greenwald (@ggreenwald) tweeted at 1:00 AM on Sun, Aug 18, 2013:
For those asking, @MikeGrunwald's now-deleted tweet: "I can't wait to write a defense of the drone strike that takes out Julian Assange"
(https://twitter.com/ggreenwald/status/368885133803143168)
Can't speak for the OP, but I often find myself reacting in a similar way. The reason is that in the past, more often than not all I got when clicking on such a link was a page asking me to login to see the actual content. I don't have a fb account, hence there's nothing to see for me.
This is not always the case because as far as I know you can see some pages without having to login first, but they seem to be a minority and so I learned simply to ignore such links.
It has nothing to do with dis-/liking fb or not, it's just a matter of practicality.
HN, reddit, digg et al. would have failed long long ago if half the websites required a login before you could see the linked content. I see no good reason to make an exception for just one particular website.
Facebook does, in fact, require you to log in to see a lot of content. This may be due to mistaken settings on the content by its uploader, but that's more or less irrelevant. When I follow a link to a Facebook page about a person or event or something, the chances are about 50/50 that I'll simply see a "please log in" box.
The thread started off with hnha asking, "why on earth is this a link to Facebook of all things?" followed by RexRollman responding, "I agree. I see Facebook in a URL and I won't visit it, regardless of what it is.", followed by you asking, "And why is that, exactly?". None of which were asking, "can I access this link without logging into facebook", so positing that the discussion can be ended simply because this link can be accessed is a non-sequitur.
Interestingly, in the same thread that hnha started, there is also a posting by brokenparser about NOT being able to access the linked content - https://news.ycombinator.com/item?id=6228750 So, not only is your position a non-sequitur, it is also based on inconsistent evidence.
I appreciate your well-thought out reply, but I was simply referring to the tree of comments responding to my own original comment. Asserting that further discussion was (and is) moot was neither a non-sequitur nor based on inconsistent evidence.
Faceebook's abiolity to track you does not reqquire you to loginn. Yore y vewing pages with lick bittons preevids a rabust seat of indieacktor variaabbles. This why some cuntry mek illegal teh luke bouton.
Also, all the text you type on your smartphone goes to the fbi. You can probably be id'd by what you mosspell. It.s a question of whether they give a fuck.
If you want that domain to die please continue to spam this forum. Of all the places on the web this is probably the least smart to pull stunts like this.
That's funny hijackson, because My roomate's mother makes $87 hourly on the laptop. She has been fired for 7 months but last month her pay was $21739 just working on the laptop for a few hours. Read more here=====>>>>>=====www.jobs34.com
I almost thought this comment was going to be a parody of the other!
I'm kinda curious though. At $87/hour, she worked about 250 hours, which works out to be about 57 hours a week. If she only works a few hours at her laptop, the fuck is she doing the rest of the time?
No, no, I meant the 3 hours per month on her laptop, and the 57 hours per week she's working, but not on her laptop. Maybe she's a ho (a busy one at that!) that does her own bookkeeping and accounting!
Hm, is there a market there? Tracking of tricks, scheduling hoes, budgeting, tracking money in drug/alcohol funds, and oversight dashboards for pimps? I mean, they need software too, right?
Can't do it as iOS app (would never get through AppStore, and I bet most pimps can't jailbreak their phones), so it's either Android or HTML5, but it might get a decent market.
The real problem is that the target demographic is hard to monetize. Can't sign 'em up with a trackable CC, they're not a good target for advertisers, and your service is likely to attract a made-in-NSA parallel construction from FBI and friends.
Here on Brazil.recently.the justice.caught a.group.that stole.several millions that way..one third of a certain state.population here signed up.
Most depressingly,.after the justice shut the thing down, they asked it to allow it to.continue, because they were still.profitable... ( it was a ponzi )
Clearly, just use a standard solution (PGP). Don't do this with a weak passphrase, and use key-strengthening (bcrypt etc.) just in case. Assange is pretty good at crypto, so I'd expect Wikileaks to broadly get this right.
This isn't the worst thing ever, but using GPG for passphrase-protected encryption is not as strong as you might expect - just use a slightly longer/better one.
(Obviously, don't switch to another tool if you can't evaluate it in depth - GPG isn't perfect, but picking a random other tool won't be an improvement.)
The problem with doing that is that the US government might release the information themselves, just dampened a bit with some PR, so the insurance files aren't worth anything and so WikiLeaks don't get the credit.
Which would generally imply that they're not very good insurance files.
I had the last one for a bit, and deleted it just now because I'm seriously doubtful these things are anything more then /dev/urandom piped into a file.
Well, obviously, there's no way of telling or he'd simply crack the file and say it was random.
His point is based more on softer considerations like "they never used the previous insurance file yet, have they?" and "Wikileaks pulls a lot of stunts" and "this is just the sort of thing that would appeal to a cryptogeek like Assange whose avowed purpose is to throw sand into the gears of secretive organizations" and "so how did they get 300GB+ of leaked stuff since the site has been half-inactive for years and Assange completely distracted by his legal issues? Who would trust them with it? eg. Snowden didn't go to Wikileaks".
If these ever did get released and were damaging, the media/propaganda machines around the targeted governments would be doing dampening/PR anyway. So if that can largely stop the damage, they certainly wouldn't be any good as insurance, whoever releases them.
Under most circumstances I imagine I would want my opponent to be uncertain of what I have. Letting them know the contents gives them the ability to accurately assess damages and prepare responses.
I don't know VB though. On a serious note I wonder if there are guys out there that treat this tease as a challenge and try to poke holes themselves. Must be a thrill.
Can be related to both Snowden and Assange or even Manning. Sure thing is that these documents must be a sort of time-bombs: 10 years from now even if we crack them, won't have a meaning, but now... apparently they do.
| I wonder if new insurance files will have any influence on the actions of their enemies.
Even without that, no effect. Blackmailing a bureaucracy... it's not like dealing with a single rational actor. That's the Hollywood version of Washington.
It's like coming upon a traffic jam and deciding you should bribe those responsible so you can go on your way.
Evidently, anyone getting them becomes a highly visible target and once the content of these torrents is known, you could become involved in the distribution of classified data.
Even if the content is not known, it could be viewed as an 'unfriendly' act and could make you become a "target of interest" to some zealous 3-letter agency...
Maybe I'm too paranoid. On the other hand, maybe not enough. Hard to know these days.