Procedure

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Saturday, January 19, 2013

WikiLeaks says Aaron Swartz may have been a 'source'

Posted on 11:27 PM by Unknown

WikiLeaks said late yesterday that recently deceased Internet activist Aaron Swartz assisted the organization, was in contact with Julian Assange, and may have been one of the organization's sources.
Reached in Iceland on Saturday evening, California time, WikiLeaks representative Kristinn Hrafnsson confirmed to CNET that the tweets were authentic but declined to elaborate.
In the tweets, the organization said it was revealing the information "due to the investigation into the Secret Service involvement" with Swartz.
Here are screenshots of the tweets:

The phrasing of the last tweet ("strong reasons to believe, but cannot prove") may be related to the precautions WikiLeaks says it takes to ensure its sources' anonymity. WikiLeaks'policy says:
 ...we operate a number of servers across multiple international jurisdictions and we we do not keep logs. Hence these logs can not be seized. Anonymization occurs early in the WikiLeaks network, long before information passes to our web servers. Without specialized global internet traffic analysis, multiple parts of our organisation must conspire with each other to strip submitters of their anonymity.
The Secret Service has a legal mandate to investigate computer crime, a task it shares with the FBI and other federal agencies, which the agency describes including "unauthorized access to protected computers" -- which Swartz is alleged to have been guilty of. It also investigates forgery, identity fraud, visa fraud, money laundering, food stamp fraud, wire fraud, and a host of other federal offenses.
It would not be unusual, in other words, for the Secret Service to be involved in a criminal probe of Swartz's alleged bulk downloading from the JSTOR database. Some other examples: The Secret Service, which is now part of the Department of Homeland Security, has investigated an artist who installed photo-taking software in Apple stores, a credit card theft ring, spywareinstalled on college campuses, and a possible theft of GOP candidate Mitt Romney's income tax returns.
The ambiguous WikiLeaks tweets have prompted speculation about what the group was trying to suggest. The Verge's Tim Carmody wrote that "the aim of these tweets could be to imply that the US Attorney's Office and Secret Service targeted Swartz in order to get at WikiLeaks, and that Swartz died still defending his contacts' anonymity. Taking that implied claim at face value would be irresponsible without more evidence." And blog emptywheel wrote that if true, the tweets "strongly indicate" that "the US government used the grand jury investigation into Aaron's JSTOR downloads as a premise to investigate WikiLeaks."
Until WikiLeaks elaborates on what it intended to say by highlighting the Secret Service's involvement, and provides supporting evidence, it will be difficult to draw any conclusions.
After confirming the authenticity of the tweets, WikiLeaks representative Hrafnsson asked that we contact him later with any further questions. We'll do that and let you know what we find out.
It seems the only thing that's now certain is that criticisms of, and speculation about, the government's handling of the Swartz-Jstor case isn't likely to die down overnight.
Email ThisBlogThis!Share to XShare to Facebook
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Will New Internet Domain Names Change the Web?
    Finally, the World Wide Web will live up to its name. The decision by the Internet Corporation for Assigned Names and Numbers (ICANN) that W...
  • How to sync files and folders across two PCs
    Here are four ways to do this, although--technically speaking--only two of them actually keep the files on both PCs. The others merely make ...
  • Rugged laptop guide
    Our rugged laptop guide will give you more information on rugged laptops and rugged notebooks than, let’s say, 95% of regular rugged laptop ...
  • LinkedIn shuts down would-be hook-up service
    LinkedIn has shut off its API access to “Bang With Professionals,” a Web service that was intended to facilitate more, say, intimate connect...
  • Yahoo Reject Microsoft ! Glance At New Corp.
    As we know, Microsoft is aggressively try to overtaking Yahoo. They launch 44,6 billion dollar AS bid ! This is the biggest offer that ever ...
  • Rumored Sony PS4 controller shows new thumbsticks
    As the speculation on Sony's next game console is ramps up ahead of  next week's press event , a pair of images have surfaced, purpo...
  • Twitter: Hacking attacks may have accessed data of 250K users
    Twitter said today that it recently detected a series of attempts to hack into user data, and that the attackers may have successfully absco...
  • Why Microsoft redesigned Windows
    Windows 8 has its fans and foes, but Microsoft felt the time was ripe for a new look and feel for a product used by more than 1.2 billion pe...
  • How Access Registry Using Command Prompt
    Firstly, you need to know that regedit.exe is a tool that created to access registry based on windows. And reg.exe is a tool that created ...
  • Pirate Bay to sue antipiracy site for pirating its design
    An antipiracy group may find itself in legal trouble after borrowing the look of the Pirate Bay Web site for a new campaign. The Pirate Bay...

Categories

  • apple
  • browser
  • buy
  • christmas
  • computer information
  • crack
  • cyber monday
  • download
  • files
  • firewall
  • flash disk
  • font
  • graphene
  • hard disk
  • hidden
  • Hot News
  • how to
  • intel
  • Internet
  • Internet Explorer
  • iOS
  • iPad
  • Mac
  • Malware
  • nokia
  • notebook
  • play station 4
  • processor
  • removal
  • safe
  • samsung
  • samsung. microsoft
  • security
  • sony
  • ssd
  • The Meaning Is
  • tips
  • twitter
  • ubuntu
  • video card
  • virus
  • vulnerability
  • What to do
  • windows 8
  • windows7

Blog Archive

  • ▼  2013 (90)
    • ►  October (2)
    • ►  September (6)
    • ►  August (3)
    • ►  July (4)
    • ►  June (5)
    • ►  May (9)
    • ►  April (14)
    • ►  March (11)
    • ►  February (17)
    • ▼  January (19)
      • Nokia begins work on graphene, world's strongest m...
      • iPhone users pay highest phone bills
      • 10 ways PowerPoint 2013 gets more polish
      • New iPad 4 reportedly in the works -- perhaps a 12...
      • In Swartz protest, Anon hacks U.S. site, threatens...
      • Swartz didn't face prison until feds took over cas...
      • Samsung quarterly profit jumps 76 percent on Galax...
      • CNET News Business Tech Intel to wind down desktop...
      • WikiLeaks says Aaron Swartz may have been a 'source'
      • SSDs vs. hard drives vs. hybrids: Which storage te...
      • Prosecutor in Aaron Swartz 'hacking' case comes un...
      • Feds: MegaUpload was not entrapped
      • Apple is done, say teens
      • White House shoots down petition to build Death Star
      • Chrome 24 brings math formatting, better offline a...
      • Eyes-on: Samsung's Youm flexible-display tech at C...
      • Intel at CES: throwing down the gauntlet with Nvidia
      • Dad hires hit men to kill son's video game characters
      • Google to make Maps accessible to Windows Phone users
  • ►  2012 (27)
    • ►  December (22)
    • ►  November (5)
  • ►  2010 (4)
    • ►  June (1)
    • ►  January (3)
  • ►  2009 (32)
    • ►  December (2)
    • ►  November (11)
    • ►  October (11)
    • ►  September (2)
    • ►  March (2)
    • ►  February (4)
  • ►  2008 (39)
    • ►  October (2)
    • ►  September (2)
    • ►  August (1)
    • ►  June (1)
    • ►  May (3)
    • ►  March (1)
    • ►  February (7)
    • ►  January (22)
  • ►  2007 (46)
    • ►  December (8)
    • ►  November (9)
    • ►  September (4)
    • ►  August (2)
    • ►  July (9)
    • ►  June (14)
Powered by Blogger.

About Me

Unknown
View my complete profile