Procedure

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Saturday, January 19, 2013

WikiLeaks says Aaron Swartz may have been a 'source'

Posted on 11:27 PM by Unknown

WikiLeaks said late yesterday that recently deceased Internet activist Aaron Swartz assisted the organization, was in contact with Julian Assange, and may have been one of the organization's sources.
Reached in Iceland on Saturday evening, California time, WikiLeaks representative Kristinn Hrafnsson confirmed to CNET that the tweets were authentic but declined to elaborate.
In the tweets, the organization said it was revealing the information "due to the investigation into the Secret Service involvement" with Swartz.
Here are screenshots of the tweets:

The phrasing of the last tweet ("strong reasons to believe, but cannot prove") may be related to the precautions WikiLeaks says it takes to ensure its sources' anonymity. WikiLeaks'policy says:
 ...we operate a number of servers across multiple international jurisdictions and we we do not keep logs. Hence these logs can not be seized. Anonymization occurs early in the WikiLeaks network, long before information passes to our web servers. Without specialized global internet traffic analysis, multiple parts of our organisation must conspire with each other to strip submitters of their anonymity.
The Secret Service has a legal mandate to investigate computer crime, a task it shares with the FBI and other federal agencies, which the agency describes including "unauthorized access to protected computers" -- which Swartz is alleged to have been guilty of. It also investigates forgery, identity fraud, visa fraud, money laundering, food stamp fraud, wire fraud, and a host of other federal offenses.
It would not be unusual, in other words, for the Secret Service to be involved in a criminal probe of Swartz's alleged bulk downloading from the JSTOR database. Some other examples: The Secret Service, which is now part of the Department of Homeland Security, has investigated an artist who installed photo-taking software in Apple stores, a credit card theft ring, spywareinstalled on college campuses, and a possible theft of GOP candidate Mitt Romney's income tax returns.
The ambiguous WikiLeaks tweets have prompted speculation about what the group was trying to suggest. The Verge's Tim Carmody wrote that "the aim of these tweets could be to imply that the US Attorney's Office and Secret Service targeted Swartz in order to get at WikiLeaks, and that Swartz died still defending his contacts' anonymity. Taking that implied claim at face value would be irresponsible without more evidence." And blog emptywheel wrote that if true, the tweets "strongly indicate" that "the US government used the grand jury investigation into Aaron's JSTOR downloads as a premise to investigate WikiLeaks."
Until WikiLeaks elaborates on what it intended to say by highlighting the Secret Service's involvement, and provides supporting evidence, it will be difficult to draw any conclusions.
After confirming the authenticity of the tweets, WikiLeaks representative Hrafnsson asked that we contact him later with any further questions. We'll do that and let you know what we find out.
It seems the only thing that's now certain is that criticisms of, and speculation about, the government's handling of the Swartz-Jstor case isn't likely to die down overnight.
Email ThisBlogThis!Share to XShare to Facebook
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • How to recover corrupted PowerPoint file using TEMP folder?
    Today tip will help you to recover the unreadable and corrupted file of Microsoft PowerPoint. Normally PowerPoint open files can become ...
  • How to create a Windows 8 shutdown tile
    1. It starts, ironically, in Desktop mode, which you can reach by clicking/tapping the Desktop tile or pressing  Win-D  (that's the Wind...
  • Keep your laptop battery healthy: Use it sparingly
    What wears down a battery? Charging and discharging. Obviously, you can't avoid either of those acts entirely (although if you could, yo...
  • The "Other" Facebook inbox you didn't know you had
    I know loads of Facebook users who never bother to check their notifications. You know, that area in the top-left corner of the screen, the ...
  • Apple wins design patents for slide-to-unlock, original iPhone
    U.S. Patent and Trademark Office grants design patents for the contentious user interface asset. Apple was granted design patents today for ...
  • Obama opposes Silicon Valley firms on immigration reform
    President Obama opposes an immigration reform bill backed by companies including Apple, Microsoft, and Adobe that would let U.S.-educated co...
  • Learn to build a PC in under two minutes
    Building a computer is a great way to get a custom configuration, save some money and have fun. In this how-to video, we'll show you how...
  • Windows Blue: How it could reinvent Windows (or sink Windows 8)
    With Windows 8's much ballyhooed launch barely a month behind us, alleged details of Microsofts  next  next-generation operating system ...
  • LinkedIn shuts down would-be hook-up service
    LinkedIn has shut off its API access to “Bang With Professionals,” a Web service that was intended to facilitate more, say, intimate connect...
  • How to change ur static ip
    To start off, you need a direct connection to your modem and computer. If you have a router, disconnect it and directly hook up your modem t...

Categories

  • apple
  • browser
  • buy
  • christmas
  • computer information
  • crack
  • cyber monday
  • download
  • files
  • firewall
  • flash disk
  • font
  • graphene
  • hard disk
  • hidden
  • Hot News
  • how to
  • intel
  • Internet
  • Internet Explorer
  • iOS
  • iPad
  • Mac
  • Malware
  • nokia
  • notebook
  • play station 4
  • processor
  • removal
  • safe
  • samsung
  • samsung. microsoft
  • security
  • sony
  • ssd
  • The Meaning Is
  • tips
  • twitter
  • ubuntu
  • video card
  • virus
  • vulnerability
  • What to do
  • windows 8
  • windows7

Blog Archive

  • ▼  2013 (90)
    • ►  October (2)
    • ►  September (6)
    • ►  August (3)
    • ►  July (4)
    • ►  June (5)
    • ►  May (9)
    • ►  April (14)
    • ►  March (11)
    • ►  February (17)
    • ▼  January (19)
      • Nokia begins work on graphene, world's strongest m...
      • iPhone users pay highest phone bills
      • 10 ways PowerPoint 2013 gets more polish
      • New iPad 4 reportedly in the works -- perhaps a 12...
      • In Swartz protest, Anon hacks U.S. site, threatens...
      • Swartz didn't face prison until feds took over cas...
      • Samsung quarterly profit jumps 76 percent on Galax...
      • CNET News Business Tech Intel to wind down desktop...
      • WikiLeaks says Aaron Swartz may have been a 'source'
      • SSDs vs. hard drives vs. hybrids: Which storage te...
      • Prosecutor in Aaron Swartz 'hacking' case comes un...
      • Feds: MegaUpload was not entrapped
      • Apple is done, say teens
      • White House shoots down petition to build Death Star
      • Chrome 24 brings math formatting, better offline a...
      • Eyes-on: Samsung's Youm flexible-display tech at C...
      • Intel at CES: throwing down the gauntlet with Nvidia
      • Dad hires hit men to kill son's video game characters
      • Google to make Maps accessible to Windows Phone users
  • ►  2012 (27)
    • ►  December (22)
    • ►  November (5)
  • ►  2010 (4)
    • ►  June (1)
    • ►  January (3)
  • ►  2009 (32)
    • ►  December (2)
    • ►  November (11)
    • ►  October (11)
    • ►  September (2)
    • ►  March (2)
    • ►  February (4)
  • ►  2008 (39)
    • ►  October (2)
    • ►  September (2)
    • ►  August (1)
    • ►  June (1)
    • ►  May (3)
    • ►  March (1)
    • ►  February (7)
    • ►  January (22)
  • ►  2007 (46)
    • ►  December (8)
    • ►  November (9)
    • ►  September (4)
    • ►  August (2)
    • ►  July (9)
    • ►  June (14)
Powered by Blogger.

About Me

Unknown
View my complete profile