Search Results for: feed

<div class=Denny’s Super Bowl free ‘Grand Slam Breakfast’ brings 2 million diners
" />

Denny’s Super Bowl free ‘Grand Slam Breakfast’ brings 2 million diners

Friday, February 6, 2009

Lighted sign of a Denny’s Diner restaurant in Dallas, Texas

Denny’s 1,600 chain restaurants across North America, Puerto Rico and Canada, were slammed for eight hours Tuesday with hungry patrons standing on sidewalks for nearly two hours to take advantage of the $5.99 “Grand Slam Breakfast” giveaway.

Denny’s, a dining chain with annual revenue of about $900 million, has advertised in a TV commercial Sunday during the Super Bowl XLIII that it would give away its signature breakfast from 6 a.m. until 2 p.m. local time Tuesday, at all its restaurants in the U.S., Canada and Puerto Rico, while supplies lasted.

Denny’s Diner has promoted the iconic dish giveaway heavily, with a bold 30-second appeal ad that aired during the third quarter of the Super Bowl 43 on Sunday, plus another 15-second ad during the post-game show, offering a free breakfast to some 90 million viewers. In addition, it has placed a full-page ad in USA Today‘s Monday edition. The promotion was further announced on The Today Show and notices were also sent out to the chain’s “Denny’s Breakfast Club” members.

The NBC ad, which was bought to unveil a new promotion for customers squeezed by the recession, may have cost as much as $3 million, said Nelson Marchioli, CEO of Denny’s Corp. Super Bowl XLIII’s 30-second commercial time slot costs $2.4 million–$3 million for the airtime alone, excluding production and talent costs.

The game was televised live by the US NBC Sunday Night Football and Canada’s CTV Television Network. BayTSP has reported that, “as of 10 a.m. Wednesday, commercials that initially aired during NBC’s Super Bowl XLIII broadcast subsequently had been watched online more than 28 million times.”

“The promotion has a total cost of $5 million U.S., which includes $3 million for the commercial on NBC,” said a Denny’s spokesman, noting also that the company received about $50 million in news coverage, most of which was positive. According to a Denny’s representative, two million people walked through the restaurant chains’ doors Tuesday, and each Denny’s restaurant served an average of 130 Grand Slams per hour.

With the “Denny’s Feeds America” promotion, the company has reported 14 million hits on its Web site between Sunday night and Monday morning. Denny’s shares rose 6 cents, or 3.1 percent, to $1.98 in afternoon trading. The stock has traded in a range of $1.18 to $4.10 over the past 52 weeks.

A Halloween pancake at a Denny’s restaurant in Tokyo

“Denny’s free Grand Slam” has ranked in the top 10 Google searches early Tuesday and fell to No. 18 by the end of the promotion, while “denny s locations” was #9 on Google Trends, which tracks fast-rising searches. It has also held spots No. 1 (Denny’s) and 7 (Grand Slam) on Twitter‘s trending topics. It has generated much chat on Twitter, garnering 1,700 tweets on Tuesday, compared with its average of 59. Doritos, winner of the USA TODAY survey for best Super Bowl spot ad, had 933 mentions after reaching a peak of almost 3,300.

The idea of the TV ad was to get people to come in and re-evaluate Denny’s Diner. “A lot of people have forgotten what Denny’s is, or they think they know, while we’ve come out with a whole lot of new products. We felt like we needed to jump start the brand,” Denny’s Chief Marketing and Innovation Officer Mark Chmiel said.

“We’re celebrating the Grand Slam this year,” Chmiel said. According to the company’s financial data, on January 15 Denny’s reported systemwide comparable-store sales for the fourth quarter were down 6.1 percent, compared to a 0.2 percent decline from the same period in 2007.

According to Robert Gonzalez, public relations company Hill & Knowlton spokesman, Denny’s has expected at least 2 million people to eat a free Grand Slam by the end of the promotion. “Every restaurant is packed with people and lines,” Gonzalez said. “Everything today is about fast. People are on the go, and they’re eating fast food. It’s cutting into sit-down dining,” he added.

“Each of the more than 1,500 Denny’s were planning to make about 100 Grand Slams an hour,” Denny’s spokeswoman Cori Rice said. It had predicted it will have served about 1,400 people per location, more than five times the normal volume. “Grand Slam Breakfast” is a four-item option on its menu, consisting of two pancakes, two eggs, two strips of bacon and two sausage links. It weighs in at 44 grams of fat, 56 carbohydrates and 770 calories.

Nationwide, Denny’s expected to sell about 2 million Grand Slams — about 15 percent of the annual tally. According to Mark Chmiel, chief marketing operator and executive vice president, the diner chain has reported approximately 2 million meals worth more than $12 million were given away nationwide and each Denny’s restaurant served an average of 130 Grand Slams per hour. It estimated it has earned about $50 million worth of public relations following the free Grand Slam campaign, Chmiel said.

The company is also experimenting with a Grand Slam Burrito and also has introduced for this year, a Grand Slamwich, which includes eggs, bacon, sausage and cheese between two slices of bread, with a teaspoon serving. “It already has shown strong consumer appeal,” said Chmiel. The company has received flood of e-mails and letters proving the positive impact of the Grand Slam campaign and commercials on its customers.

Chmiel also announced he’s planning a third major promotion in this year’s third quarter, which happens to include another major sporting event, the World Series. “That’s one we’re definitely looking at,” he said.

Jobless Paris Winslow of downtown San Francisco, California has joined the long line which stretched from the front door on Mission Street, between Fourth and Fifth streets, to the corner of Fourth and up the block. “The economy is getting kind of scary. This line looks like those pictures of soup kitchen lines during the 1929 Great Depression,” Winslow said.

“I came all the way from San Francisco for a free $6 meal, Isn’t that pathetic? A year ago, I never would have done this. These days I’m willing to put my ego on the back burner,” said Stephen Weller, a jobless contractor who waited with his dog, Emmett. California Denny’s restaurant managers have issued rain checks (for free chilled meals, as security backed by actual bacon) to anyone who failed to get in by the 2 p.m. deadline.

A big eater could also “Slam It Up” by adding any two additional items for 99 cents each to their meal. Customers on Tuesday were also handed “bounceback” coupon books that include offers for additional free menu items with purchases. Chicago Tribune reporter Kevin Pang has eaten five free Grand Slams on Tuesday at five different Denny’s Diners in four hours. He claims to have consumed 4,100 calories at Harwood Heights, 5:36 a.m, at Schiller Park, 6:22 a.m., at Franklin Park, 7:08 a.m., at Melrose Park, 7:41 a.m. and at Grand Slam No. 5 Oak Park, 8:57 a.m.

Denny’s Diner in Bangor, Maine, inspired by 1960 culture.

“The Grand Slam has always been a Denny’s favorite. This free offer is our way of reacquainting America with Denny’s real breakfast and with the Denny’s brand,” Denny’s CEO Nelson Marchioli said in a statement. In 1977s, the Grand Slam started as a baseball-related promotion in Atlanta, Georgia. Its normal price averages around $5.99. Marchioli said the event was also a way to kick-off its “Year of the Grand Slam” promotion. Denny’s claimed it has sold 12.5 million Grand Slams a year.

“The economy’s tough and people are jumping all the way to fast food to try to figure it out. We all use fast food, whether it’s for time or convenience or for money. But you can go to Denny’s and you don’t have to give up a real breakfast and that was the whole focus of our commercial,” Marchioli explained. McDonald’s (MCD, Fortune 500) has done well during this economic meltdown since the global recession pushes people toward less expensive dining options.

McDonald’s has announced plans Wednesday to open 175 new restaurants in China this year despite the global economic crisis, thereby increasing the number of outlets in China by 17 percent, from 1,050 currently. Last month, McDonald’s 2008 net profit has risen 80 percent from 2007 to 4.3 billion dollars.

Marchioli has also introduced Denny’s $4 Weekday Express Slam, which is a streamlined version of the Grand Slam. “I want to take back share. For too long, we have allowed others to take share, whether it was Starbucks or McDonald’s. They’re fine competitors and I don’t expect to take all their business from them, but I’d like a little bit back,” Marchioli noted.

According to Rafi Mohammed, author of “The Art of Pricing,” people love free. “It triggers a Pavlovian response in people,” said Mohammed. If Pavlov’s dogs salivate when a bell rings, Denny’s free Grand Slam breakfast has attracted 2 million hungry customers. “I believe free maximizes trial and doesn’t devalue a product as long as it is a rare event. Aside from the cost, the major downside is that it attracts customers who truly have no intention of coming back,” he added.

According to University of Portland consumer psychology professor Deana Julka, people flock to free promotions amid just a few dollars saving because there’s nothing in life for free. “So when there’s something out there that costs nothing, it creates a psychological rush. Especially in these times when people feel overtaxed or overburden, there’s an internal reward people feel by getting something for free,” she said. “It’s being thrifty and feeling like you beat the system. Free really hits the spot for a lot of people,” Julka added.

“Free is an emotional hot button. When free is concerned, there is no downside – or, at least, we don’t see the downside immediately. So we overvalue everything that is free. People love free stuff, particularly when money’s tight,” said Dan Ariely, a business professor at Duke University, author of “Predictably Irrational: The Hidden Forces That Shape Our Decisions.”

Experts, however, explained these moves need to be done sparingly, since giveaways can teeter in the balance between desperation and a well designed marketing ploy. “Giving your product away for free is not worth it because it undermines your brand value,” said branding expert Rob Frankel, saying people are attached to the idea of it being free, than the actual product itself.

Free giveaways are not anything new in the food industry. “It just feels good when you can get something for free and not have to worry about it coming out of your wallet,” Frankel noted. Dunkin’ Donuts and Panera Bread all have had free coffee and food promos last year. “In November, Starbucks gave away free cup of coffee to anyone who came in on Election Day. Have you taken a look at how Starbucks is doing now?” Last week it has announced it would shut down 300 stores, in addition to the 600 it already planned to close.

The U.S. Air Force Thunderbirds fly over Superbowl XLIII prior to kickoff in Tampa, Florida, February 1, 2009

On February 24, IHOP will be offering a free shortstack to every customer to encourage donations (in place of the cost) for Childrens Miracle Network. The International House of Pancakes (IHOP) is a United States-based restaurant chain that specializes in breakfast foods and is owned by DineEquity. The chain had more than 1950 restaurants in all 50 states, the U.S. Virgin Islands, Canada and Mexico. Since 2006, IHOP’s National Pancake Day celebration has raised over $1.85 million. In 2008, over 1.5 million pancakes (12 miles high if they were stacked) were given to customers for donations.

Denny’s (“Denny’s Diner”) is a full-service diner/family restaurant chain in the United States. It operates over 2,500 restaurants in the United States (including Puerto Rico), Canada, Curaçao, Costa Rica, El Salvador, Jamaica, Japan, Mexico, and New Zealand). The resto chain is known for always being open, serving breakfast, lunch, dinner, and dessert around the clock.

Today, Denny’s operates about 1,600 restaurants in all 50 U.S. states, Canada and Mexico. There are also about 578 Denny’s restaurants in Japan operated under a license by a subsidiary of Seven & I Holdings, seven Denny’s locations in New Zealand, and approximately 38 Denny’s diners in the United States. Denny’s headquarters is now located in Spartanburg, South Carolina, headquarters of the parent company Trans World Corporation that acquired Denny’s in 1987.

Denny’s was historically notable for offering a free meal to anyone on their birthday. The offer included a limited number of meal options from a special birthday menu. The promotional ritual ceased in 1993, though occasionally individual franchises will continue the tradition.

In 2008, Denny’s has ceased to be in the ranks among the top diner chains in the $83 billion breakfast market, whose top five firms — McDonald’s, Starbucks, Dunkin’ Donuts, Burger King and IHOP — accounted for 22 percent of the volume. “A lot of consumers have written Denny’s off their let’s-go-there list,” said Ron Paul, president of Technomic, a consulting firm.

Super Bowl XLIII was an American football game between the American Football Conference champion Pittsburgh Steelers (15–4) and the National Football Conference champion Arizona Cardinals (12–8) to decide the National Football League (NFL) champion for the 2008 NFL season. It was played on February 1, 2009, at Raymond James Stadiumin Tampa, Florida. It has an attendance of 70,774 and 98.7 million viewers. Pittsburgh earned its sixth Super Bowl win, thus securing sole possession of the record for most Super Bowl wins.

Retrieved from “https://en.wikinews.org/w/index.php?title=Denny%27s_Super_Bowl_free_%27Grand_Slam_Breakfast%27_brings_2_million_diners&oldid=1521034”
Posted in Uncategorized
<div class=ACLU, EFF challenging US ‘secret’ court orders seeking Twitter data
" />

ACLU, EFF challenging US ‘secret’ court orders seeking Twitter data

Thursday, April 7, 2011

Logo of the Electronic Frontier Foundation.
Logo of the American Civil Liberties Union.

Late last month, the American Civil Liberties Union (ACLU) and Electronic Frontier Foundation (EFF) filed objections to the United States Government’s ‘secret’ attempts to obtain Twitter account information relating to WikiLeaks. The ACLU and EFF cite First and Fourth amendment issues as overriding reasons to overturn government attempts to keep their investigation secret; and, that with Birgitta Jonsdottir being an Icelandic Parliamentarian, the issue has serious international implications.

The case, titled “In the Matter of the 2703(d) Order Relating to Twitter Accounts: Wikileaks, Rop_G, IOERROR; and BirgittaJ“, has been in the EFF’s sights since late last year when they became aware of the US government’s attempts to investigate WikiLeaks-related communications using the popular microblogging service.

2009 File photo of Bradley Manning. Image: Daniel Joseph Barnhart Clark.

The key objective of this US government investigation is to obtain data for the prosecution of Bradley Manning, alleged to have supplied classified data to WikiLeaks. In addition to Manning’s Twitter account, and that of WikiLeaks (@wikileaks), the following three accounts are subject to the order: @ioerror, @birgittaj, and @rop_g. These, respectively, belong to Jacob Apelbaum, Birgitta Jonsdottir, and Rop Gonggrijp.

Birgitta is not the only non-US citizen with their Twitter account targeted by the US Government; Gonggrijp, a Dutch ‘ex-hacker’-turned-security-expert, was one of the founders of XS4ALL – the first Internet Service Provider in the Netherlands available to the public. He has worked on a mobile phone that can encrypt conversations, and proven that electronic voting systems can readily be hacked.

In early March, a Virginia magistrate judge ruled that the government could have the sought records, and neither the targeted users, or the public, could see documents submitted to justify data being passed to the government. The data sought is as follows:

  1. Personal contact information, including addresses
  2. Financial data, including credit card or bank account numbers
  3. Twitter account activity information, including the “date, time, length, and method of connections” plus the “source and destination Internet Protocol address(es)”
  4. Direct Message (DM) information, including the email addresses and IP addresses of everyone with whom the Parties have exchanged DMs

The order demands disclosure of absolutely all such data from November 1, 2009 for the targeted accounts.

The ACLU and EFF are not only challenging this, but demanding that all submissions made by the US government to justify the Twitter disclosure are made public, plus details of any other such cases which have been processed in secret.

Gun camera footage of the airstrike of July 12, 2007 in Baghdad, showing the slaying of Namir Noor-Eldeen and a dozen other civilians by a U.S. helicopter. Image: WikiLeaks.

Bradley Manning, at the time a specialist from Maryland enlisted with the United States Army’s 2nd Brigade, 10th Mountain Division, was arrested in June last year in connection with the leaking of classified combat video to WikiLeaks.

The leaked video footage, taken from a US helicopter gunship, showed the deaths of Reuters staff Saeed Chmagh and Namir Noor-Eldeen during a U.S. assault in Baghdad, Iraq. The wire agency unsuccessfully attempted to get the footage released via a Freedom of Information Act request in 2007.

When WikiLeaks released the video footage it directly contradicted the official line taken by the U.S. Army asserting that the deaths of the two Reuters staff were “collateral damage” in an attack on Iraqi insurgents. The radio chatter associated with the AH-64 Apache video indicated the helicopter crews had mistakenly identified the journalists’ equipment as weaponry.

The US government also claims Manning is linked to CableGate; the passing of around a quarter of a million classified diplomatic cables to WikiLeaks. Manning has been in detention since July last year; in December allegations of torture were made to the United Nations High Commissioner for Human Rights regarding the conditions under which he was and is being detained.

Reports last month that he must now sleep naked and attend role call at the U.S. Marine facility in Quantico in the same state, raised further concern over his detention conditions. Philip J. Crowley, at-the-time a State Department spokesman, remarked on this whilst speaking at Massachusetts Institute of Technology; describing the current treatment of Manning as “ridiculous and counterproductive and stupid”, Crowley was, as a consequence, put in the position of having to tender his resignation to Secretary of State Hillary Clinton.

Logo of WikiLeaks.

Despite his native Australia finding, in December last year, that Assange’s WikiLeaks had not committed any criminal offences in their jurisdiction, the U.S. government has continued to make ongoing operations very difficult for the whistleblower website.

The result of the Australian Federal Police investigation left the country’s Prime Minister, Julia Gillard, having to retract a statement that WikiLeaks had acted “illegally”; instead, she characterised the site’s actions as “grossly irresponsible”.

Even with Australia finding no illegal activity on the part of WikiLeaks, and with founder Julian Assange facing extradition to Sweden, U.S. pressure sought to hobble WikiLeaks financially.

Based on a State Department letter, online payments site PayPal suspended WikiLeaks account in December. Their action was swiftly followed by Visa Europe and Mastercard ceasing to handle payments for WikiLeaks.

The online processing company, Datacell, threatened the two credit card giants with legal action over this. However, avenues of funding for the site were further curtailed when both Amazon.com and Swiss bank PostFinance joined the financial boycott of WikiLeaks.

Assange continues, to this day, to argue that his extradition to Sweden for questioning on alleged sexual offences is being orchestrated by the U.S. in an effort to discredit him, and thus WikiLeaks.

Logo of Twitter.

Wikinews consulted an IT and cryptography expert from the Belgian university which developed the current Advanced Encryption Standard; explaining modern communications, he stated: “Cryptography has developed to such a level that intercepting communications is no longer cost effective. That is, if any user uses the correct default settings, and makes sure that he/she is really connecting to Twitter it is highly unlikely that even the NSA can break the cryptography for a protocol such as SSL/TLS (used for https).”

Qualifying this, he commented that “the vulnerable parts of the communication are the end points.” To make his point, he cited the following quote from Gene Spafford: “Using encryption on the Internet is the equivalent of arranging an armored car to deliver credit card information from someone living in a cardboard box to someone living on a park bench.

Continuing, the Katholieke Universiteit Leuven (KUL) expert explained:

In the first place, the weak point is Twitter itself; the US government can go and ask for the data; companies such as Twitter and Google will typically store quite some information on their users, including IP addresses (it is known that Google deletes the last byte of the IP address after a few weeks, but it is not too hard for a motivated opponent to find out what this byte was).
In the second place, this is the computer of the user: by exploiting system weaknesses (with viruses, Trojan horses or backdoors in the operating system) a highly motivated opponent can enter your machine and record your keystrokes plus everything that is happening (e.g. the FBI is known to do this with the so-called Magic Lantern software). Such software is also commercially available, e.g. for a company to monitor its employees.
Seal of the Catholic University of Leuven.
It would also be possible for a higly motivated opponent to play “man-in-the-middle”; that means that instead of having a secure connection to Twitter.com, you have a secure connection to the attacker’s server, who impersonates Twitter’s and then relays your information to Twitter. This requires tricks such as spoofing DNS (this is getting harder with DNSsec), or misleading the user (e.g. the user clicks on a link and connects to tw!tter.com or Twitter.c0m, which look very similar in a URL window as Twitter.com). It is clear that the US government is capable of using these kind of tricks; e.g., a company has been linked to the US government that was recognized as legitimate signer in the major browsers, so it would not be too large for them to sign a legitimate certificate for such a spoofing webserver; this means that the probability that a user would detect a problem would be very low.
As for traffic analysis (finding out who you are talking to rather than finding out what you are telling to whom), NSA and GCHQ are known to have access to lots of traffic (part of this is obtained via the UK-USA agreement). Even if one uses strong encryption, it is feasible for them to log the IP addresses and email addresses of all the parties you are connecting to. If necessary, they can even make routers re-route your traffic to their servers. In addition, the European Data Retention directive forces all operators to store such traffic data.
Whether other companies would have complied with such requests: this is very hard to tell. I believe however that it is very plausible that companies such as Google, Skype or Facebook would comply with such requests if they came from a government.
In summary: unless you go through great lengths to log through to several computers in multiple countries, you work in a clean virtual machine, you use private browser settings (don’t accept cookies, no plugins for Firefox, etc.) and use tools such as Tor, it is rather easy for any service provider to identify you.
Finally: I prefer not to be quoted on any sentences in which I make statements on the capabilities or actions of any particular government.

Wikinews also consulted French IT security researcher Stevens Le Blond on the issues surrounding the case, and the state-of-the-art in monitoring, and analysing, communications online. Le Blond, currently presenting a research paper on attacks on Tor to USENIX audiences in North America, responded via email:

Wikinews

Were the US Government to obtain the sought data, it would seem reasonable the NSA would handle further investigation. How would you expect them to exploit the data and expand on what they receive from Twitter?

  • Le Blond: My understanding is that the DOJ is requesting the following information: 1) Connection records and session times 2) IP addresses 3) e-mail addresses 4) banking info
By requesting 1) and 2) for Birgitta and other people involved with WikiLeaks (WL) since 2009, one could derive 2 main [pieces of] information.
Logo of the Tor project.
First, he could tell the mobility of these people. Recent research in networking shows that you can map an IP address into a geographic location with a median error of 600 meters. So by looking at changes of IP addresses in time for a Twitter user, one could tell (or at least speculate about) where that person has been.
Second, by correlating locations of different people involved with WL in time, one could possibly derive their interactions and maybe even their level of involvement with WL. Whether it is possible to derive this information from 1) and 2) depends on how this people use Twitter. For example, do they log on Twitter often enough, long enough, and from enough places?
My research indicates that this is the case for other Internet services but I cannot tell whether it is the case for Twitter.
Note that even though IP logging, as done by Twitter, is similar to the logging done by GSM [mobile phone] operators, the major difference seems to be that Twitter is subject to US regulation, no matter the citizenship of its users. I find this rather disturbing.
Using 3), one could search for Birgitta on other Internet services, such as social networks, to find more information on her (e.g., hidden accounts). Recent research on privacy shows that people tend to use the same e-mail address to register an account on different social networks (even when they don’t want these accounts to be linked together). Obviously, one could then issue subpoenas for these accounts as well.
I do not have the expertise to comment on what could be done with 4).
((WN)) As I believe Jonsdottir to be involved in the Icelandic Modern Media Initiative (IMMI), what are the wider implications beyond the “WikiLeaks witchhunt”?
  • Le Blond: Personal data can be used to discredit, especially if the data is not public.

Having been alerted to the ongoing case through a joint press release by the ACLU and EFF, Wikinews sought clarification on the primary issues which the two non-profits saw as particularly important in challenging the U.S. Government over the ‘secret’ court orders. Rebecca Jeschke, Media Relations Director for the EFF, explained in more detail the points crucial to them, responding to a few questions from Wikinews on the case:

((WN)) As a worse-case, what precedents would be considered if this went to the Supreme Court?
  • Rebecca Jeschke: It’s extremely hard to know at this stage if this would go to the Supreme Court, and if it did, what would be at issue. However, some of the interesting questions about this case center on the rights of people around the world when they use US Internet services. This case questions the limits of US law enforcement, which may turn out to be very different from the limits in other countries.
((WN)) Since this is clearly a politicised attack on free speech with most chilling potential repercussions for the press, whistleblowers, and by-and-large anyone the relevant U.S. Government departments objects to the actions of, what action do you believe should be taken to protect free speech rights?
  • Jeschke: We believe that, except in very rare circumstances, the government should not be permitted to obtain information about individuals’ private Internet communications in secret. We also believe that Internet companies should, whenever possible, take steps to ensure their customers are notified about requests for information and have the opportunity to respond.
((WN)) Twitter via the web, in my experience, tends to use https:// connections. Are you aware of any possibility of the government cracking such connections? (I’m not up to date on the crypto arms race).
  • Jeschke: You don’t need to crack https, per se, to compromise its security. See this piece about fraudulent https certificates:
Iranian hackers obtain fraudulent httpsEFF website.
((WN)) And, do you believe that far, far more websites should – by default – employ https:// connections to protect people’s privacy?
  • Jeschke: We absolutely think that more websites should employ https! Here is a guide for site operators: (See external links, Ed.)

Finally, Wikinews approached the Icelandic politician, and WikiLeaks supporter, who has made this specific case a landmark in how the U.S. Government handles dealings with – supposedly – friendly governments and their elected representatives. A number of questions were posed, seeking the Icelandic Parliamentarian’s views:

((WN)) How did you feel when you were notified the US Government wanted your Twitter account, and message, details? Were you shocked?
Birgitta Jonsdottir’s Facebook profile picture.
  • Birgitta Jonsdottir: I felt angry but not shocked. I was expecting something like this to happen because of my involvement with WikiLeaks. My first reaction was to tweet about it.
((WN)) What do you believe is their reasoning in selecting you as a ‘target’?
  • Jonsdottir: It is quite clear to me that USA authorities are after Julian Assange and will use any means possible to get even with him. I think I am simply a pawn in a much larger context. I did of course both act as a spokesperson for WikiLeaks in relation to the Apache video and briefly for WikiLeaks, and I put my name to the video as a co-producer. I have not participated in any illegal activity and thus being a target doesn’t make me lose any sleep.
((WN)) Are you concerned that, as a Member of Parliament involved in the Icelandic Modern Media Initiative (IMMI), the US attempt to obtain your Twitter data is interfering with planned Icelandic government policy?
  • Jonsdottir: No
((WN)) In an earlier New York Times (NYT) article, you’re indicating there is nothing they can obtain about you that bothers you; but, how do you react to them wanting to know everyone you talk to?
  • Jonsdottir: It bothers me and according to top computer scientists the government should be required to obtain a search warrant to get our IP addresses from Twitter. I am, though, happy I am among the people DOJ is casting their nets around because of my parliamentary immunity; I have a greater protection then many other users and can use that immunity to raise the issue of lack of rights for those that use social media.
HAVE YOUR SAY
Do you believe the U.S. government should have the right to access data on foreign nationals using services such as Twitter?
Add or view comments
((WN)) The same NYT article describes you as a WikiLeaks supporter; is this still the case? What attracts you to their ‘radical transparency’?
  • Jonsdottir: I support the concept of WikiLeaks. While we don’t have a culture of protection for sources and whistleblowers we need sites like WikiLeaks. Plus, I think it is important to give WikiLeaks credit for raising awareness about in how bad shape freedom of information and expression is in our world and it is eroding at an alarming rate because of the fact that legal firms for corporations and corrupt politicians have understood the borderless nature of the legalities of the information flow online – we who feel it is important that people have access to information that should remain in the public domain need to step up our fight for those rights. WikiLeaks has played an important role in that context.I don’t support radical transparency – I understand that some things need to remain secret. It is the process of making things secret that needs to be both more transparent and in better consensus with nations.
((WN)) How do you think the Icelandic government would have reacted if it were tens of thousands of their diplomatic communications being leaked?
  • Jonsdottir: I am not sure – A lot of our dirty laundry has been aired via the USA cables – our diplomatic communications with USA were leaked in those cables, so far they have not stirred much debate nor shock. It is unlikely for tens of thousands of cables to leak from Iceland since we dont have the same influence or size as the USA, nor do we have a military.
((WN)) Your ambassador in the US has spoken to the Obama administration. Can you discuss any feedback from that? Do you have your party’s, and government’s, backing in challenging the ordered Twitter data release?
  • Jonsdottir: I have not had any feedback from that meeting, I did however receive a message from the DOJ via the USA ambassador in Iceland. The message stated three things: 1. I am free to travel to the USA. 2. If I would do so, I would not be a subject of involuntary interrogation. 3. I am not under criminal investigation. If this is indeed the reality I wonder why they are insisting on getting my personal details from Twitter. I want to stress that I understand the reasoning of trying to get to Assange through me, but I find it unacceptable since there is no foundation for criminal investigation against him. If WikiLeaks goes down, all the other media partners should go down at the same time. They all served similar roles. The way I see it is that WikiLeaks acted as the senior editor of material leaked to them. They could not by any means be considered a source. The source is the person that leaks the material to WikiLeaks. I am not sure if the media in our world understands how much is at stake for already shaky industry if WikiLeaks will carry on carrying the brunt of the attacks. I think it would be powerful if all the medias that have had access to WikiLeaks material would band together for their defence.
((WN)) Wikinews consulted a Belgian IT security expert who said it was most likely companies such as Facebook, Microsoft, and Google, would have complied with similar court orders *without advising the ‘targets*’. Does that disturb you?
  • Jonsdottir: This does disturb me for various reasons. The most obvious is that my emails are hosted at google/gmail and my search profile. I dont have anything to hide but it is important to note that many of the people that interact with me as a MP via both facebook and my various email accounts don’t always realize that there is no protection for them if they do so via those channels. I often get sensitive personal letters sent to me at facebook and gmail. In general most people are not aware of how little rights they have as users of social media. It is those of uttermost importance that those sites will create the legal disclaimers and agreements that state the most obvious rights we lose when we sign up to their services.
Wikinews
This exclusive interview features first-hand journalism by a Wikinews reporter. See the collaboration page for more details.
((WN)) Has there been any backlash within Iceland against US-based internet services in light of this? Do you expect such, or any increase in anti-American sentiments?
  • Jonsdottir: No, none what so ever. I dont think there is much anti-American sentiments in Iceland and I dont think this case will increase it. However I think it is important for everyone who does not live in the USA and uses social services to note that according to the ruling in my case, they dont have any protection of the 1st and 4th amendment, that only apply to USA citizens. Perhaps the legalities in relation to the borderless reality we live in online need to be upgraded in order for people to feel safe with using social media if it is hosted in the USA. Market tends to bend to simple rules.
((WN)) Does this make you more, or less, determined to see the IMMI succeed?
  • Jonsdottir: More. People have to realize that if we dont have freedom of information online we won’t have it offline. We have to wake up to the fact that our rights to access information that should be in the public domain is eroding while at the same time our rights as citizens online have now been undermined and we are only seen as consumers with consumers rights and in some cases our rights are less than of a product. This development needs to change and change fast before it is too late.

The U.S. Government continues to have issues internationally as a result of material passed to WikiLeaks, and subsequently published.

Within the past week, Ecuador has effectively declared the U.S. ambassador Heather Hodges persona-non-grata over corruption allegations brought to light in leaked cables. Asking the veteran diplomat to leave “as soon as possible”, the country may become the third in South America with no ambassadorial presence. Both Venezuela and Bolivia have no resident U.S. ambassador due to the two left-wing administrations believing the ejected diplomats were working with the opposition.

The U.S. State Department has cautioned Ecuador that a failure to speedily normalise diplomatic relations may jeapordise ongoing trade talks.

The United Kingdom is expected to press the Obama administration over the continuing detention of 23-year-old Manning, who also holds UK citizenship. British lawmakers are to discuss his ongoing detention conditions before again approaching the U.S. with their concerns that his solitary confinement, and treatment therein, is not acceptable.

The 22 charges brought against Manning are currently on hold whilst his fitness to stand trial is assessed.

Retrieved from “https://en.wikinews.org/w/index.php?title=ACLU,_EFF_challenging_US_%27secret%27_court_orders_seeking_Twitter_data&oldid=4515305”
Posted in Uncategorized
<div class=Bat for Lashes plays the Bowery Ballroom: an Interview with Natasha Khan
" />

Bat for Lashes plays the Bowery Ballroom: an Interview with Natasha Khan

Friday, September 28, 2007

Bat for Lashes is the doppelgänger band ego of one of the leading millennial lights in British music, Natasha Khan. Caroline Weeks, Abi Fry and Lizzy Carey comprise the aurora borealis that backs this haunting, shimmering zither and glockenspiel peacock, and the only complaint coming from the audience at the Bowery Ballroom last Tuesday was that they could not camp out all night underneath these celestial bodies.

We live in the age of the lazy tendency to categorize the work of one artist against another, and Khan has had endless exultations as the next Björk and Kate Bush; Sixousie Sioux, Stevie Nicks, Sinead O’Connor, the list goes on until it is almost meaningless as comparison does little justice to the sound and vision of the band. “I think Bat For Lashes are beyond a trend or fashion band,” said Jefferson Hack, publisher of Dazed & Confused magazine. “[Khan] has an ancient power…she is in part shamanic.” She describes her aesthetic as “powerful women with a cosmic edge” as seen in Jane Birkin, Nico and Cleopatra. And these women are being heard. “I love the harpsichord and the sexual ghost voices and bowed saws,” said Radiohead‘s Thom Yorke of the track Horse and I. “This song seems to come from the world of Grimm’s fairytales.”

Bat’s debut album, Fur And Gold, was nominated for the 2007 Mercury Prize, and they were seen as the dark horse favorite until it was announced Klaxons had won. Even Ladbrokes, the largest gambling company in the United Kingdom, had put their money on Bat for Lashes. “It was a surprise that Klaxons won,” said Khan, “but I think everyone up for the award is brilliant and would have deserved to win.”

Natasha recently spoke with David Shankbone about art, transvestism and drug use in the music business.


DS: Do you have any favorite books?

NK: [Laughs] I’m not the best about finishing books. What I usually do is I will get into a book for a period of time, and then I will dip into it and get the inspiration and transformation in my mind that I need, and then put it away and come back to it. But I have a select rotation of cool books, like Women Who Run With the Wolves by Clarissa Pinkola Estés and Little Birds by Anaïs Nin. Recently, Catching the Big Fish by David Lynch.

DS: Lynch just came out with a movie last year called Inland Empire. I interviewed John Vanderslice last night at the Bowery Ballroom and he raved about it!

NK: I haven’t seen it yet!

DS: Do you notice a difference between playing in front of British and American audiences?

NK: The U.S. audiences are much more full of expression and noises and jubilation. They are like, “Welcome to New York, Baby!” “You’re Awesome!” and stuff like that. Whereas in England they tend to be a lot more reserved. Well, the English are, but it is such a diverse culture you will get the Spanish and Italian gay guys at the front who are going crazy. I definitely think in America they are much more open and there is more excitement, which is really cool.

DS: How many instruments do you play and, please, include the glockenspiel in that number.

NK: [Laughs] I think the number is limitless, hopefully. I try my hand at anything I can contribute; I only just picked up the bass, really—

DS: –I have a great photo of you playing the bass.

NK: I don’t think I’m very good…

DS: You look cool with it!

NK: [Laughs] Fine. The glockenspiel…piano, mainly, and also the harp. Guitar, I like playing percussion and drumming. I usually speak with all my drummers so that I write my songs with them in mind, and we’ll have bass sounds, choir sounds, and then you can multi-task with all these orchestral sounds. Through the magic medium of technology I can play all kinds of sounds, double bass and stuff.

DS: Do you design your own clothes?

NK: All four of us girls love vintage shopping and charity shops. We don’t have a stylist who tells us what to wear, it’s all very much our own natural styles coming through. And for me, personally, I like to wear jewelery. On the night of the New York show that top I was wearing was made especially for me as a gift by these New York designers called Pepper + Pistol. And there’s also my boyfriend, who is an amazing musician—

DS: —that’s Will Lemon from Moon and Moon, right? There is such good buzz about them here in New York.

NK: Yes! They have an album coming out in February and it will fucking blow your mind! I think you would love it, it’s an incredible masterpiece. It’s really exciting, I’m hoping we can do a crazy double unfolding caravan show, the Bat for Lashes album and the new Moon and Moon album: that would be really theatrical and amazing! Will prints a lot of my T-shirts because he does amazing tapestries and silkscreen printing on clothes. When we play there’s a velvety kind of tapestry on the keyboard table that he made. So I wear a lot of his things, thrift store stuff, old bits of jewelry and antique pieces.

DS: You are often compared to Björk and Kate Bush; do those constant comparisons tend to bother you as an artist who is trying to define herself on her own terms?

NK: No, I mean, I guess that in the past it bothered me, but now I just feel really confident and sure that as time goes on my musical style and my writing is taking a pace of its own, and I think in time the music will speak for itself and people will see that I’m obviously doing something different. Those women are fantastic, strong, risk-taking artists—

DS: —as are you—

NK: —thank you, and that’s a great tradition to be part of, and when I look at artists like Björk and Kate Bush, I think of them as being like older sisters that have come before; they are kind of like an amazing support network that comes with me.

DS: I’d imagine it’s preferable to be considered the next Björk or Kate Bush instead of the next Britney.

NK: [Laughs] Totally! Exactly! I mean, could you imagine—oh, no I’m not going to try to offend anyone now! [Laughs] Let’s leave it there.

DS: Does music feed your artwork, or does you artwork feed your music more? Or is the relationship completely symbiotic?

NK: I think it’s pretty back-and-forth. I think when I have blocks in either of those area, I tend to emphasize the other. If I’m finding it really difficult to write something I know that I need to go investigate it in a more visual way, and I’ll start to gather images and take photographs and make notes and make collages and start looking to photographers and filmmakers to give me a more grounded sense of the place that I’m writing about, whether it’s in my imagination or in the characters. Whenever I’m writing music it’s a very visual place in my mind. It has a location full of characters and colors and landscapes, so those two things really compliment each other, and they help the other one to blossom and support the other. They are like brother and sister.

DS: When you are composing music, do you see notes and words as colors and images in your mind, and then you put those down on paper?

NK: Yes. When I’m writing songs, especially lately because I think the next album has a fairly strong concept behind it and I’m writing the songs, really imagining them, so I’m very immersed into the concept of the album and the story that is there through the album. It’s the same as when I’m playing live, I will imagine I see a forest of pine trees and sky all around me and the audience, and it really helps me. Or I’ll just imagine midnight blue and emerald green, those kind of Eighties colors, and they help me.

DS: Is it always pine trees that you see?

NK: Yes, pine trees and sky, I guess.

DS: What things in nature inspire you?

NK: I feel drained thematically if I’m in the city too long. I think that when I’m in nature—for example, I went to Big Sur last year on a road trip and just looking up and seeing dark shadows of trees and starry skies really gets me and makes me feel happy. I would sit right by the sea, and any time I have been a bit stuck I will go for a long walk along the ocean and it’s just really good to see vast horizons, I think, and epic, huge, all-encompassing visions of nature really humble you and give you a good sense of perspective and the fact that you are just a small particle of energy that is vibrating along with everything else. That really helps.

DS: Are there man-made things that inspire you?

NK: Things that are more cultural, like open air cinemas, old Peruvian flats and the Chelsea Hotel. Funny old drag queen karaoke bars…

DS: I photographed some of the famous drag queens here in New York. They are just such great creatures to photograph; they will do just about anything for the camera. I photographed a famous drag queen named Miss Understood who is the emcee at a drag queen restaurant here named Lucky Cheng’s. We were out in front of Lucky Cheng’s taking photographs and a bus was coming down First Avenue, and I said, “Go out and stop that bus!” and she did! It’s an amazing shot.

NK: Oh. My. God.

DS: If you go on her Wikipedia article it’s there.

NK: That’s so cool. I’m really getting into that whole psychedelic sixties and seventies Paris Is Burning and Jack Smith and the Destruction of Atlantis. Things like The Cockettes. There seems to be a bit of a revolution coming through that kind of psychedelic drag queen theater.

DS: There are just so few areas left where there is natural edge and art that is not contrived. It’s taking a contrived thing like changing your gender, but in the backdrop of how that is still so socially unacceptable.

NK: Yeah, the theatrics and creativity that go into that really get me. I’m thinking about The Fisher King…do you know that drag queen in The Fisher King? There’s this really bad and amazing drag queen guy in it who is so vulnerable and sensitive. He sings these amazing songs but he has this really terrible drug problem, I think, or maybe it’s a drink problem. It’s so bordering on the line between fabulous and those people you see who are so in love with the idea of beauty and elevation and the glitz and the glamor of love and beauty, but then there’s this really dark, tragic side. It’s presented together in this confusing and bewildering way, and it always just gets to me. I find it really intriguing.

DS: How are you received in the Pakistani community?

NK: [Laughs] I have absolutely no idea! You should probably ask another question, because I have no idea. I don’t have contact with that side of my family anymore.

DS: When you see artists like Pete Doherty or Amy Winehouse out on these suicidal binges of drug use, what do you think as a musician? What do you get from what you see them go through in their personal lives and with their music?

NK: It’s difficult. The drugs thing was never important to me, it was the music and expression and the way he delivered his music, and I think there’s a strange kind of romantic delusion in the media, and the music media especially, where they are obsessed with people who have terrible drug problems. I think that’s always been the way, though, since Billie Holiday. The thing that I’m questioning now is that it seems now the celebrity angle means that the lifestyle takes over from the actual music. In the past people who had musical genius, unfortunately their personal lives came into play, but maybe that added a level of romance, which I think is pretty uncool, but, whatever. I think that as long as the lifestyle doesn’t precede the talent and the music, that’s okay, but it always feels uncomfortable for me when people’s music goes really far and if you took away the hysteria and propaganda of it, would the music still stand up? That’s my question. Just for me, I’m just glad I don’t do heavy drugs and I don’t have that kind of problem, thank God. I feel that’s a responsibility you have, to present that there’s a power in integrity and strength and in the lifestyle that comes from self-love and assuredness and positivity. I think there’s a real big place for that, but it doesn’t really get as much of that “Rock n’ Roll” play or whatever.

DS: Is it difficult to come to the United States to play considering all the wars we start?

NK: As an English person I feel equally as responsible for that kind of shit. I think it is a collective consciousness that allows violence and those kinds of things to continue, and I think that our governments should be ashamed of themselves. But at the same time, it’s a responsibility of all of our countries, no matter where you are in the world to promote a peaceful lifestyle and not to consciously allow these conflicts to continue. At the same time, I find it difficult to judge because I think that the world is full of shades of light and dark, from spectrums of pure light and pure darkness, and that’s the way human nature and nature itself has always been. It’s difficult, but it’s just a process, and it’s the big creature that’s the world; humankind is a big creature that is learning all the time. And we have to go through these processes of learning to see what is right.
Retrieved from “https://en.wikinews.org/w/index.php?title=Bat_for_Lashes_plays_the_Bowery_Ballroom:_an_Interview_with_Natasha_Khan&oldid=2584606”
Posted in Uncategorized
<div class=Israeli PM Ariel Sharon undergoes emergency surgery
" />

Israeli PM Ariel Sharon undergoes emergency surgery

Saturday, February 11, 2006

Israeli Prime Minister Ariel Sharon underwent emergency surgery at Hadassah Medical Center in Israel to treat intestinal damage revealed by a recent computed tomography, better known as a CT scan. The Chief Surgeon said, “Sharon is out of danger, for the moment. His condition is stable and the surgery was a success.” Sharon is currently in the Intensive Care Unit (ICU) of the hospital.

Yesterday doctors treating Sharon had noticed a swollen abdomen and ordered a CT scan on his torso and found the damage to his intestine. Later tests had shown that part of the large intestine had developed necrosis and needed to be immediately removed.

Hospital director Shlomo Mor-Yosef stated a press conference that there were “no complications” during surgery. “His (Sharon’s) key problem is lack of consciousness. There is no significant change in his condition. Doctors did not find any occluded artery and there were no blood vessels blocked. He is stable but in critical condition at this time and he is in no immediate danger at this moment.”

Yosef also said that Sharon’s sons and family had met earlier and decided to go forward with the surgery and treatment.

Doctors removed at least 50cm of Sharon’s large intestine.

Yosef also said that possible reasons as to why Sharon’s intestine was damaged were, “maybe infection or decline of blood supply to the intestine.” Yosef also said that the surgery was both a “routine procedure” and “not a dramatic” one. “Hospitals perform these operations sometimes two or three times a day,” he added.

Yael Bossem-Levy, a spokesman for Hadassah Medical Center said earlier that, “the prime minister’s life is in danger. His condition is now very serious, or critical. Sharon’s digestive tract has undergone severe deterioration while he’s been unconscious, and there appears to be a blockage in his blood circulation. The restricted blood flow raised the possibility of necrosis, or death of tissue, in the intestines.”

Levy also stated that Sharon’s condition has “deteriorated to its most critical point since his admission.”

The 77 year-old leader has been hospitalized since January 4th, after suffering a massive stroke which left him comatose. This is his seventh surgery since his hospitalization.

Sharon has been hospitalized for thirty-nine days, and has been on a feeding tube for two weeks.

Retrieved from “https://en.wikinews.org/w/index.php?title=Israeli_PM_Ariel_Sharon_undergoes_emergency_surgery&oldid=4230545”
Posted in Uncategorized
<div class=Wikinews interviews Amir Abbas Fakhravar about Iranian nuclear intentions
" />

Wikinews interviews Amir Abbas Fakhravar about Iranian nuclear intentions

Tuesday, April 9, 2013

File:Amir Philly 2.jpg

Iran has been operating a nuclear program for years and announced opening a new uranium facility on Tuesday. Its claims over nuclear enrichment are for a nuclear power program, although this requires 5% enrichment as opposed to the 20% enrichment level they claim the right to pursue which is more commonly used in nuclear bombs.

Wikinews interviewed Amir Abbas Fakhravar, the President of the Iranian Freedom Institute which is based in Washington DC, United States, also a research fellow at the The Institute of World Politics, about the Iranian nuclear program in light of recent talks with this week with the P5+1 group of countries.

((Wikinews)) What is your role at the Iranian Freedom Institute?

Amir Abbas Fakhravar: I am the President and Founder of the Iranian Freedom Institute.

((WN)) Iran seems unwilling to give up its nuclear programme, do you think they will eventually given the UN [United Nations] sanctions?

AAF: The only way Islamic Regime in Iran will give up its nuclear program is either full operation and military attack by the West or total oil sanctions. 85–90% of the the Islamic Republic’s money comes from crude oil sales. This money does not go to the Iranian people, but instead funds the nuclear program, the Revolutionary Guards, basijis, Hezbollah, and other terror operations worldwide. The Islamic Republic will be forced into abandoning its nuclear program when oil sanctions dry up the money supply.

((WN)) Do you feel the Islamic Republic of Iran is trying to provoke a response from the Western nations (USA, UK, France, Germany)?

AAF: A limited military response from the West which will not be for a regime change would be a gift to the Islamic Republic, and would feed the narrative of “overreaching, imperialistic Western governments” perpetuated by the regime. The IR is well aware of the rapid decline in support from the Iranian people and is looking for a way to gain back some of that support, even superficially. An attack from the west would buoy the regime and damage the work being done by the opposition.

((WN)) What is the need for Iran to have a nuclear programme, are they doing it for energy or for weapons?

AAF: Iran makes clear its intentions for the nuclear program through its actions. The regime expresses desire to annihilate Israel almost daily, and has repeatedly refused negotiation and inspection of its nuclear sites. Also you can find several type of energies in Iran and at all they don’t need to have this expensive and dangerous nuclear energy. For sure Islamic republic of Iran wants to have Nuclear bomb.

((WN)) If Iran does not listen and change course with regards to its nuclear program, do you think that the United Nations will apply more sanctions?

AAF: It took a very long time to sanction the Islamic Republic to the extent it is now, and since the UN continues to send negotiators to the table to discuss Iran’s nuclear program, tighter sanctions at this point in time are unlikely. It is our responsibility at Iranian opposition to inform United Nations about this regime’s threat to international community. We should move much more organize[d] and faster to cut Islamic Republic’s diplomatic relationship with the world. Our campaign on oil sanctions showed us it is possible.

((WN)) Do you think that the United States is particularly unhappy and international relations are poor considering that Iran recently captured a drone and refused to return it?

AAF: While a failure militarily and with regard to foreign policy, the captured drone incident is a relatively small event in the context of ongoing tensions between the United States and the Islamic Republic.
Retrieved from “https://en.wikinews.org/w/index.php?title=Wikinews_interviews_Amir_Abbas_Fakhravar_about_Iranian_nuclear_intentions&oldid=4635268”
Posted in Uncategorized
<div class=ACLU, EFF challenging US ‘secret’ court orders seeking Twitter data
" />

ACLU, EFF challenging US ‘secret’ court orders seeking Twitter data

Thursday, April 7, 2011

Late last month, the American Civil Liberties Union (ACLU) and Electronic Frontier Foundation (EFF) filed objections to the United States Government’s ‘secret’ attempts to obtain Twitter account information relating to WikiLeaks. The ACLU and EFF cite First and Fourth amendment issues as overriding reasons to overturn government attempts to keep their investigation secret; and, that with Birgitta Jonsdottir being an Icelandic Parliamentarian, the issue has serious international implications.

The case, titled “In the Matter of the 2703(d) Order Relating to Twitter Accounts: Wikileaks, Rop_G, IOERROR; and BirgittaJ“, has been in the EFF’s sights since late last year when they became aware of the US government’s attempts to investigate WikiLeaks-related communications using the popular microblogging service.

The key objective of this US government investigation is to obtain data for the prosecution of Bradley Manning, alleged to have supplied classified data to WikiLeaks. In addition to Manning’s Twitter account, and that of WikiLeaks (@wikileaks), the following three accounts are subject to the order: @ioerror, @birgittaj, and @rop_g. These, respectively, belong to Jacob Apelbaum, Birgitta Jonsdottir, and Rop Gonggrijp.

Birgitta is not the only non-US citizen with their Twitter account targeted by the US Government; Gonggrijp, a Dutch ‘ex-hacker’-turned-security-expert, was one of the founders of XS4ALL – the first Internet Service Provider in the Netherlands available to the public. He has worked on a mobile phone that can encrypt conversations, and proven that electronic voting systems can readily be hacked.

In early March, a Virginia magistrate judge ruled that the government could have the sought records, and neither the targeted users, or the public, could see documents submitted to justify data being passed to the government. The data sought is as follows:

  1. Personal contact information, including addresses
  2. Financial data, including credit card or bank account numbers
  3. Twitter account activity information, including the “date, time, length, and method of connections” plus the “source and destination Internet Protocol address(es)”
  4. Direct Message (DM) information, including the email addresses and IP addresses of everyone with whom the Parties have exchanged DMs

The order demands disclosure of absolutely all such data from November 1, 2009 for the targeted accounts.

The ACLU and EFF are not only challenging this, but demanding that all submissions made by the US government to justify the Twitter disclosure are made public, plus details of any other such cases which have been processed in secret.

Bradley Manning, at the time a specialist from Maryland enlisted with the United States Army’s 2nd Brigade, 10th Mountain Division, was arrested in June last year in connection with the leaking of classified combat video to WikiLeaks.

The leaked video footage, taken from a US helicopter gunship, showed the deaths of Reuters staff Saeed Chmagh and Namir Noor-Eldeen during a U.S. assault in Baghdad, Iraq. The wire agency unsuccessfully attempted to get the footage released via a Freedom of Information Act request in 2007.

When WikiLeaks released the video footage it directly contradicted the official line taken by the U.S. Army asserting that the deaths of the two Reuters staff were “collateral damage” in an attack on Iraqi insurgents. The radio chatter associated with the AH-64 Apache video indicated the helicopter crews had mistakenly identified the journalists’ equipment as weaponry.

The US government also claims Manning is linked to CableGate; the passing of around a quarter of a million classified diplomatic cables to WikiLeaks. Manning has been in detention since July last year; in December allegations of torture were made to the United Nations High Commissioner for Human Rights regarding the conditions under which he was and is being detained.

Reports last month that he must now sleep naked and attend role call at the U.S. Marine facility in Quantico in the same state, raised further concern over his detention conditions. Philip J. Crowley, at-the-time a State Department spokesman, remarked on this whilst speaking at Massachusetts Institute of Technology; describing the current treatment of Manning as “ridiculous and counterproductive and stupid”, Crowley was, as a consequence, put in the position of having to tender his resignation to Secretary of State Hillary Clinton.

Despite his native Australia finding, in December last year, that Assange’s WikiLeaks had not committed any criminal offences in their jurisdiction, the U.S. government has continued to make ongoing operations very difficult for the whistleblower website.

The result of the Australian Federal Police investigation left the country’s Prime Minister, Julia Gillard, having to retract a statement that WikiLeaks had acted “illegally”; instead, she characterised the site’s actions as “grossly irresponsible”.

Even with Australia finding no illegal activity on the part of WikiLeaks, and with founder Julian Assange facing extradition to Sweden, U.S. pressure sought to hobble WikiLeaks financially.

Based on a State Department letter, online payments site PayPal suspended WikiLeaks account in December. Their action was swiftly followed by Visa Europe and Mastercard ceasing to handle payments for WikiLeaks.

The online processing company, Datacell, threatened the two credit card giants with legal action over this. However, avenues of funding for the site were further curtailed when both Amazon.com and Swiss bank PostFinance joined the financial boycott of WikiLeaks.

Assange continues, to this day, to argue that his extradition to Sweden for questioning on alleged sexual offences is being orchestrated by the U.S. in an effort to discredit him, and thus WikiLeaks.

Wikinews consulted an IT and cryptography expert from the Belgian university which developed the current Advanced Encryption Standard; explaining modern communications, he stated: “Cryptography has developed to such a level that intercepting communications is no longer cost effective. That is, if any user uses the correct default settings, and makes sure that he/she is really connecting to Twitter it is highly unlikely that even the NSA can break the cryptography for a protocol such as SSL/TLS (used for https).”

Qualifying this, he commented that “the vulnerable parts of the communication are the end points.” To make his point, he cited the following quote from Gene Spafford: “Using encryption on the Internet is the equivalent of arranging an armored car to deliver credit card information from someone living in a cardboard box to someone living on a park bench.

Continuing, the Katholieke Universiteit Leuven (KUL) expert explained:

In the first place, the weak point is Twitter itself; the US government can go and ask for the data; companies such as Twitter and Google will typically store quite some information on their users, including IP addresses (it is known that Google deletes the last byte of the IP address after a few weeks, but it is not too hard for a motivated opponent to find out what this byte was).
In the second place, this is the computer of the user: by exploiting system weaknesses (with viruses, Trojan horses or backdoors in the operating system) a highly motivated opponent can enter your machine and record your keystrokes plus everything that is happening (e.g. the FBI is known to do this with the so-called Magic Lantern software). Such software is also commercially available, e.g. for a company to monitor its employees.
It would also be possible for a higly motivated opponent to play “man-in-the-middle”; that means that instead of having a secure connection to Twitter.com, you have a secure connection to the attacker’s server, who impersonates Twitter’s and then relays your information to Twitter. This requires tricks such as spoofing DNS (this is getting harder with DNSsec), or misleading the user (e.g. the user clicks on a link and connects to tw!tter.com or Twitter.c0m, which look very similar in a URL window as Twitter.com). It is clear that the US government is capable of using these kind of tricks; e.g., a company has been linked to the US government that was recognized as legitimate signer in the major browsers, so it would not be too large for them to sign a legitimate certificate for such a spoofing webserver; this means that the probability that a user would detect a problem would be very low.
As for traffic analysis (finding out who you are talking to rather than finding out what you are telling to whom), NSA and GCHQ are known to have access to lots of traffic (part of this is obtained via the UK-USA agreement). Even if one uses strong encryption, it is feasible for them to log the IP addresses and email addresses of all the parties you are connecting to. If necessary, they can even make routers re-route your traffic to their servers. In addition, the European Data Retention directive forces all operators to store such traffic data.
Whether other companies would have complied with such requests: this is very hard to tell. I believe however that it is very plausible that companies such as Google, Skype or Facebook would comply with such requests if they came from a government.
In summary: unless you go through great lengths to log through to several computers in multiple countries, you work in a clean virtual machine, you use private browser settings (don’t accept cookies, no plugins for Firefox, etc.) and use tools such as Tor, it is rather easy for any service provider to identify you.
Finally: I prefer not to be quoted on any sentences in which I make statements on the capabilities or actions of any particular government.

Wikinews also consulted French IT security researcher Stevens Le Blond on the issues surrounding the case, and the state-of-the-art in monitoring, and analysing, communications online. Le Blond, currently presenting a research paper on attacks on Tor to USENIX audiences in North America, responded via email:

Were the US Government to obtain the sought data, it would seem reasonable the NSA would handle further investigation. How would you expect them to exploit the data and expand on what they receive from Twitter?

  • Le Blond: My understanding is that the DOJ is requesting the following information: 1) Connection records and session times 2) IP addresses 3) e-mail addresses 4) banking info
By requesting 1) and 2) for Birgitta and other people involved with WikiLeaks (WL) since 2009, one could derive 2 main [pieces of] information.
First, he could tell the mobility of these people. Recent research in networking shows that you can map an IP address into a geographic location with a median error of 600 meters. So by looking at changes of IP addresses in time for a Twitter user, one could tell (or at least speculate about) where that person has been.
Second, by correlating locations of different people involved with WL in time, one could possibly derive their interactions and maybe even their level of involvement with WL. Whether it is possible to derive this information from 1) and 2) depends on how this people use Twitter. For example, do they log on Twitter often enough, long enough, and from enough places?
My research indicates that this is the case for other Internet services but I cannot tell whether it is the case for Twitter.
Note that even though IP logging, as done by Twitter, is similar to the logging done by GSM [mobile phone] operators, the major difference seems to be that Twitter is subject to US regulation, no matter the citizenship of its users. I find this rather disturbing.
Using 3), one could search for Birgitta on other Internet services, such as social networks, to find more information on her (e.g., hidden accounts). Recent research on privacy shows that people tend to use the same e-mail address to register an account on different social networks (even when they don’t want these accounts to be linked together). Obviously, one could then issue subpoenas for these accounts as well.
I do not have the expertise to comment on what could be done with 4).
((WN)) As I believe Jonsdottir to be involved in the Icelandic Modern Media Initiative (IMMI), what are the wider implications beyond the “WikiLeaks witchhunt”?
  • Le Blond: Personal data can be used to discredit, especially if the data is not public.

Having been alerted to the ongoing case through a joint press release by the ACLU and EFF, Wikinews sought clarification on the primary issues which the two non-profits saw as particularly important in challenging the U.S. Government over the ‘secret’ court orders. Rebecca Jeschke, Media Relations Director for the EFF, explained in more detail the points crucial to them, responding to a few questions from Wikinews on the case:

((WN)) As a worse-case, what precedents would be considered if this went to the Supreme Court?
  • Rebecca Jeschke: It’s extremely hard to know at this stage if this would go to the Supreme Court, and if it did, what would be at issue. However, some of the interesting questions about this case center on the rights of people around the world when they use US Internet services. This case questions the limits of US law enforcement, which may turn out to be very different from the limits in other countries.
((WN)) Since this is clearly a politicised attack on free speech with most chilling potential repercussions for the press, whistleblowers, and by-and-large anyone the relevant U.S. Government departments objects to the actions of, what action do you believe should be taken to protect free speech rights?
  • Jeschke: We believe that, except in very rare circumstances, the government should not be permitted to obtain information about individuals’ private Internet communications in secret. We also believe that Internet companies should, whenever possible, take steps to ensure their customers are notified about requests for information and have the opportunity to respond.
((WN)) Twitter via the web, in my experience, tends to use https:// connections. Are you aware of any possibility of the government cracking such connections? (I’m not up to date on the crypto arms race).
  • Jeschke: You don’t need to crack https, per se, to compromise its security. See this piece about fraudulent https certificates:
Iranian hackers obtain fraudulent httpsEFF website.
((WN)) And, do you believe that far, far more websites should – by default – employ https:// connections to protect people’s privacy?
  • Jeschke: We absolutely think that more websites should employ https! Here is a guide for site operators: (See external links, Ed.)

Finally, Wikinews approached the Icelandic politician, and WikiLeaks supporter, who has made this specific case a landmark in how the U.S. Government handles dealings with – supposedly – friendly governments and their elected representatives. A number of questions were posed, seeking the Icelandic Parliamentarian’s views:

((WN)) How did you feel when you were notified the US Government wanted your Twitter account, and message, details? Were you shocked?
  • Birgitta Jonsdottir: I felt angry but not shocked. I was expecting something like this to happen because of my involvement with WikiLeaks. My first reaction was to tweet about it.
((WN)) What do you believe is their reasoning in selecting you as a ‘target’?
  • Jonsdottir: It is quite clear to me that USA authorities are after Julian Assange and will use any means possible to get even with him. I think I am simply a pawn in a much larger context. I did of course both act as a spokesperson for WikiLeaks in relation to the Apache video and briefly for WikiLeaks, and I put my name to the video as a co-producer. I have not participated in any illegal activity and thus being a target doesn’t make me lose any sleep.
((WN)) Are you concerned that, as a Member of Parliament involved in the Icelandic Modern Media Initiative (IMMI), the US attempt to obtain your Twitter data is interfering with planned Icelandic government policy?
  • Jonsdottir: No
((WN)) In an earlier New York Times (NYT) article, you’re indicating there is nothing they can obtain about you that bothers you; but, how do you react to them wanting to know everyone you talk to?
  • Jonsdottir: It bothers me and according to top computer scientists the government should be required to obtain a search warrant to get our IP addresses from Twitter. I am, though, happy I am among the people DOJ is casting their nets around because of my parliamentary immunity; I have a greater protection then many other users and can use that immunity to raise the issue of lack of rights for those that use social media.
HAVE YOUR SAY
Do you believe the U.S. government should have the right to access data on foreign nationals using services such as Twitter?
Add or view comments
((WN)) The same NYT article describes you as a WikiLeaks supporter; is this still the case? What attracts you to their ‘radical transparency’?
  • Jonsdottir: I support the concept of WikiLeaks. While we don’t have a culture of protection for sources and whistleblowers we need sites like WikiLeaks. Plus, I think it is important to give WikiLeaks credit for raising awareness about in how bad shape freedom of information and expression is in our world and it is eroding at an alarming rate because of the fact that legal firms for corporations and corrupt politicians have understood the borderless nature of the legalities of the information flow online – we who feel it is important that people have access to information that should remain in the public domain need to step up our fight for those rights. WikiLeaks has played an important role in that context.I don’t support radical transparency – I understand that some things need to remain secret. It is the process of making things secret that needs to be both more transparent and in better consensus with nations.
((WN)) How do you think the Icelandic government would have reacted if it were tens of thousands of their diplomatic communications being leaked?
  • Jonsdottir: I am not sure – A lot of our dirty laundry has been aired via the USA cables – our diplomatic communications with USA were leaked in those cables, so far they have not stirred much debate nor shock. It is unlikely for tens of thousands of cables to leak from Iceland since we dont have the same influence or size as the USA, nor do we have a military.
((WN)) Your ambassador in the US has spoken to the Obama administration. Can you discuss any feedback from that? Do you have your party’s, and government’s, backing in challenging the ordered Twitter data release?
  • Jonsdottir: I have not had any feedback from that meeting, I did however receive a message from the DOJ via the USA ambassador in Iceland. The message stated three things: 1. I am free to travel to the USA. 2. If I would do so, I would not be a subject of involuntary interrogation. 3. I am not under criminal investigation. If this is indeed the reality I wonder why they are insisting on getting my personal details from Twitter. I want to stress that I understand the reasoning of trying to get to Assange through me, but I find it unacceptable since there is no foundation for criminal investigation against him. If WikiLeaks goes down, all the other media partners should go down at the same time. They all served similar roles. The way I see it is that WikiLeaks acted as the senior editor of material leaked to them. They could not by any means be considered a source. The source is the person that leaks the material to WikiLeaks. I am not sure if the media in our world understands how much is at stake for already shaky industry if WikiLeaks will carry on carrying the brunt of the attacks. I think it would be powerful if all the medias that have had access to WikiLeaks material would band together for their defence.
((WN)) Wikinews consulted a Belgian IT security expert who said it was most likely companies such as Facebook, Microsoft, and Google, would have complied with similar court orders *without advising the ‘targets*’. Does that disturb you?
  • Jonsdottir: This does disturb me for various reasons. The most obvious is that my emails are hosted at google/gmail and my search profile. I dont have anything to hide but it is important to note that many of the people that interact with me as a MP via both facebook and my various email accounts don’t always realize that there is no protection for them if they do so via those channels. I often get sensitive personal letters sent to me at facebook and gmail. In general most people are not aware of how little rights they have as users of social media. It is those of uttermost importance that those sites will create the legal disclaimers and agreements that state the most obvious rights we lose when we sign up to their services.
This exclusive interview features first-hand journalism by a Wikinews reporter. See the collaboration page for more details.
((WN)) Has there been any backlash within Iceland against US-based internet services in light of this? Do you expect such, or any increase in anti-American sentiments?
  • Jonsdottir: No, none what so ever. I dont think there is much anti-American sentiments in Iceland and I dont think this case will increase it. However I think it is important for everyone who does not live in the USA and uses social services to note that according to the ruling in my case, they dont have any protection of the 1st and 4th amendment, that only apply to USA citizens. Perhaps the legalities in relation to the borderless reality we live in online need to be upgraded in order for people to feel safe with using social media if it is hosted in the USA. Market tends to bend to simple rules.
((WN)) Does this make you more, or less, determined to see the IMMI succeed?
  • Jonsdottir: More. People have to realize that if we dont have freedom of information online we won’t have it offline. We have to wake up to the fact that our rights to access information that should be in the public domain is eroding while at the same time our rights as citizens online have now been undermined and we are only seen as consumers with consumers rights and in some cases our rights are less than of a product. This development needs to change and change fast before it is too late.

The U.S. Government continues to have issues internationally as a result of material passed to WikiLeaks, and subsequently published.

Within the past week, Ecuador has effectively declared the U.S. ambassador Heather Hodges persona-non-grata over corruption allegations brought to light in leaked cables. Asking the veteran diplomat to leave “as soon as possible”, the country may become the third in South America with no ambassadorial presence. Both Venezuela and Bolivia have no resident U.S. ambassador due to the two left-wing administrations believing the ejected diplomats were working with the opposition.

The U.S. State Department has cautioned Ecuador that a failure to speedily normalise diplomatic relations may jeapordise ongoing trade talks.

The United Kingdom is expected to press the Obama administration over the continuing detention of 23-year-old Manning, who also holds UK citizenship. British lawmakers are to discuss his ongoing detention conditions before again approaching the U.S. with their concerns that his solitary confinement, and treatment therein, is not acceptable.

The 22 charges brought against Manning are currently on hold whilst his fitness to stand trial is assessed.

Retrieved from “https://en.wikinews.org/w/index.php?title=ACLU,_EFF_challenging_US_%27secret%27_court_orders_seeking_Twitter_data&oldid=4515305”
Posted in Uncategorized
<div class=ACLU, EFF challenging US ‘secret’ court orders seeking Twitter data
" />

ACLU, EFF challenging US ‘secret’ court orders seeking Twitter data

Thursday, April 7, 2011

Late last month, the American Civil Liberties Union (ACLU) and Electronic Frontier Foundation (EFF) filed objections to the United States Government’s ‘secret’ attempts to obtain Twitter account information relating to WikiLeaks. The ACLU and EFF cite First and Fourth amendment issues as overriding reasons to overturn government attempts to keep their investigation secret; and, that with Birgitta Jonsdottir being an Icelandic Parliamentarian, the issue has serious international implications.

The case, titled “In the Matter of the 2703(d) Order Relating to Twitter Accounts: Wikileaks, Rop_G, IOERROR; and BirgittaJ“, has been in the EFF’s sights since late last year when they became aware of the US government’s attempts to investigate WikiLeaks-related communications using the popular microblogging service.

The key objective of this US government investigation is to obtain data for the prosecution of Bradley Manning, alleged to have supplied classified data to WikiLeaks. In addition to Manning’s Twitter account, and that of WikiLeaks (@wikileaks), the following three accounts are subject to the order: @ioerror, @birgittaj, and @rop_g. These, respectively, belong to Jacob Apelbaum, Birgitta Jonsdottir, and Rop Gonggrijp.

Birgitta is not the only non-US citizen with their Twitter account targeted by the US Government; Gonggrijp, a Dutch ‘ex-hacker’-turned-security-expert, was one of the founders of XS4ALL – the first Internet Service Provider in the Netherlands available to the public. He has worked on a mobile phone that can encrypt conversations, and proven that electronic voting systems can readily be hacked.

In early March, a Virginia magistrate judge ruled that the government could have the sought records, and neither the targeted users, or the public, could see documents submitted to justify data being passed to the government. The data sought is as follows:

  1. Personal contact information, including addresses
  2. Financial data, including credit card or bank account numbers
  3. Twitter account activity information, including the “date, time, length, and method of connections” plus the “source and destination Internet Protocol address(es)”
  4. Direct Message (DM) information, including the email addresses and IP addresses of everyone with whom the Parties have exchanged DMs

The order demands disclosure of absolutely all such data from November 1, 2009 for the targeted accounts.

The ACLU and EFF are not only challenging this, but demanding that all submissions made by the US government to justify the Twitter disclosure are made public, plus details of any other such cases which have been processed in secret.

Bradley Manning, at the time a specialist from Maryland enlisted with the United States Army’s 2nd Brigade, 10th Mountain Division, was arrested in June last year in connection with the leaking of classified combat video to WikiLeaks.

The leaked video footage, taken from a US helicopter gunship, showed the deaths of Reuters staff Saeed Chmagh and Namir Noor-Eldeen during a U.S. assault in Baghdad, Iraq. The wire agency unsuccessfully attempted to get the footage released via a Freedom of Information Act request in 2007.

When WikiLeaks released the video footage it directly contradicted the official line taken by the U.S. Army asserting that the deaths of the two Reuters staff were “collateral damage” in an attack on Iraqi insurgents. The radio chatter associated with the AH-64 Apache video indicated the helicopter crews had mistakenly identified the journalists’ equipment as weaponry.

The US government also claims Manning is linked to CableGate; the passing of around a quarter of a million classified diplomatic cables to WikiLeaks. Manning has been in detention since July last year; in December allegations of torture were made to the United Nations High Commissioner for Human Rights regarding the conditions under which he was and is being detained.

Reports last month that he must now sleep naked and attend role call at the U.S. Marine facility in Quantico in the same state, raised further concern over his detention conditions. Philip J. Crowley, at-the-time a State Department spokesman, remarked on this whilst speaking at Massachusetts Institute of Technology; describing the current treatment of Manning as “ridiculous and counterproductive and stupid”, Crowley was, as a consequence, put in the position of having to tender his resignation to Secretary of State Hillary Clinton.

Despite his native Australia finding, in December last year, that Assange’s WikiLeaks had not committed any criminal offences in their jurisdiction, the U.S. government has continued to make ongoing operations very difficult for the whistleblower website.

The result of the Australian Federal Police investigation left the country’s Prime Minister, Julia Gillard, having to retract a statement that WikiLeaks had acted “illegally”; instead, she characterised the site’s actions as “grossly irresponsible”.

Even with Australia finding no illegal activity on the part of WikiLeaks, and with founder Julian Assange facing extradition to Sweden, U.S. pressure sought to hobble WikiLeaks financially.

Based on a State Department letter, online payments site PayPal suspended WikiLeaks account in December. Their action was swiftly followed by Visa Europe and Mastercard ceasing to handle payments for WikiLeaks.

The online processing company, Datacell, threatened the two credit card giants with legal action over this. However, avenues of funding for the site were further curtailed when both Amazon.com and Swiss bank PostFinance joined the financial boycott of WikiLeaks.

Assange continues, to this day, to argue that his extradition to Sweden for questioning on alleged sexual offences is being orchestrated by the U.S. in an effort to discredit him, and thus WikiLeaks.

Wikinews consulted an IT and cryptography expert from the Belgian university which developed the current Advanced Encryption Standard; explaining modern communications, he stated: “Cryptography has developed to such a level that intercepting communications is no longer cost effective. That is, if any user uses the correct default settings, and makes sure that he/she is really connecting to Twitter it is highly unlikely that even the NSA can break the cryptography for a protocol such as SSL/TLS (used for https).”

Qualifying this, he commented that “the vulnerable parts of the communication are the end points.” To make his point, he cited the following quote from Gene Spafford: “Using encryption on the Internet is the equivalent of arranging an armored car to deliver credit card information from someone living in a cardboard box to someone living on a park bench.

Continuing, the Katholieke Universiteit Leuven (KUL) expert explained:

In the first place, the weak point is Twitter itself; the US government can go and ask for the data; companies such as Twitter and Google will typically store quite some information on their users, including IP addresses (it is known that Google deletes the last byte of the IP address after a few weeks, but it is not too hard for a motivated opponent to find out what this byte was).
In the second place, this is the computer of the user: by exploiting system weaknesses (with viruses, Trojan horses or backdoors in the operating system) a highly motivated opponent can enter your machine and record your keystrokes plus everything that is happening (e.g. the FBI is known to do this with the so-called Magic Lantern software). Such software is also commercially available, e.g. for a company to monitor its employees.
It would also be possible for a higly motivated opponent to play “man-in-the-middle”; that means that instead of having a secure connection to Twitter.com, you have a secure connection to the attacker’s server, who impersonates Twitter’s and then relays your information to Twitter. This requires tricks such as spoofing DNS (this is getting harder with DNSsec), or misleading the user (e.g. the user clicks on a link and connects to tw!tter.com or Twitter.c0m, which look very similar in a URL window as Twitter.com). It is clear that the US government is capable of using these kind of tricks; e.g., a company has been linked to the US government that was recognized as legitimate signer in the major browsers, so it would not be too large for them to sign a legitimate certificate for such a spoofing webserver; this means that the probability that a user would detect a problem would be very low.
As for traffic analysis (finding out who you are talking to rather than finding out what you are telling to whom), NSA and GCHQ are known to have access to lots of traffic (part of this is obtained via the UK-USA agreement). Even if one uses strong encryption, it is feasible for them to log the IP addresses and email addresses of all the parties you are connecting to. If necessary, they can even make routers re-route your traffic to their servers. In addition, the European Data Retention directive forces all operators to store such traffic data.
Whether other companies would have complied with such requests: this is very hard to tell. I believe however that it is very plausible that companies such as Google, Skype or Facebook would comply with such requests if they came from a government.
In summary: unless you go through great lengths to log through to several computers in multiple countries, you work in a clean virtual machine, you use private browser settings (don’t accept cookies, no plugins for Firefox, etc.) and use tools such as Tor, it is rather easy for any service provider to identify you.
Finally: I prefer not to be quoted on any sentences in which I make statements on the capabilities or actions of any particular government.

Wikinews also consulted French IT security researcher Stevens Le Blond on the issues surrounding the case, and the state-of-the-art in monitoring, and analysing, communications online. Le Blond, currently presenting a research paper on attacks on Tor to USENIX audiences in North America, responded via email:

Were the US Government to obtain the sought data, it would seem reasonable the NSA would handle further investigation. How would you expect them to exploit the data and expand on what they receive from Twitter?

  • Le Blond: My understanding is that the DOJ is requesting the following information: 1) Connection records and session times 2) IP addresses 3) e-mail addresses 4) banking info
By requesting 1) and 2) for Birgitta and other people involved with WikiLeaks (WL) since 2009, one could derive 2 main [pieces of] information.
First, he could tell the mobility of these people. Recent research in networking shows that you can map an IP address into a geographic location with a median error of 600 meters. So by looking at changes of IP addresses in time for a Twitter user, one could tell (or at least speculate about) where that person has been.
Second, by correlating locations of different people involved with WL in time, one could possibly derive their interactions and maybe even their level of involvement with WL. Whether it is possible to derive this information from 1) and 2) depends on how this people use Twitter. For example, do they log on Twitter often enough, long enough, and from enough places?
My research indicates that this is the case for other Internet services but I cannot tell whether it is the case for Twitter.
Note that even though IP logging, as done by Twitter, is similar to the logging done by GSM [mobile phone] operators, the major difference seems to be that Twitter is subject to US regulation, no matter the citizenship of its users. I find this rather disturbing.
Using 3), one could search for Birgitta on other Internet services, such as social networks, to find more information on her (e.g., hidden accounts). Recent research on privacy shows that people tend to use the same e-mail address to register an account on different social networks (even when they don’t want these accounts to be linked together). Obviously, one could then issue subpoenas for these accounts as well.
I do not have the expertise to comment on what could be done with 4).
((WN)) As I believe Jonsdottir to be involved in the Icelandic Modern Media Initiative (IMMI), what are the wider implications beyond the “WikiLeaks witchhunt”?
  • Le Blond: Personal data can be used to discredit, especially if the data is not public.

Having been alerted to the ongoing case through a joint press release by the ACLU and EFF, Wikinews sought clarification on the primary issues which the two non-profits saw as particularly important in challenging the U.S. Government over the ‘secret’ court orders. Rebecca Jeschke, Media Relations Director for the EFF, explained in more detail the points crucial to them, responding to a few questions from Wikinews on the case:

((WN)) As a worse-case, what precedents would be considered if this went to the Supreme Court?
  • Rebecca Jeschke: It’s extremely hard to know at this stage if this would go to the Supreme Court, and if it did, what would be at issue. However, some of the interesting questions about this case center on the rights of people around the world when they use US Internet services. This case questions the limits of US law enforcement, which may turn out to be very different from the limits in other countries.
((WN)) Since this is clearly a politicised attack on free speech with most chilling potential repercussions for the press, whistleblowers, and by-and-large anyone the relevant U.S. Government departments objects to the actions of, what action do you believe should be taken to protect free speech rights?
  • Jeschke: We believe that, except in very rare circumstances, the government should not be permitted to obtain information about individuals’ private Internet communications in secret. We also believe that Internet companies should, whenever possible, take steps to ensure their customers are notified about requests for information and have the opportunity to respond.
((WN)) Twitter via the web, in my experience, tends to use https:// connections. Are you aware of any possibility of the government cracking such connections? (I’m not up to date on the crypto arms race).
  • Jeschke: You don’t need to crack https, per se, to compromise its security. See this piece about fraudulent https certificates:
Iranian hackers obtain fraudulent httpsEFF website.
((WN)) And, do you believe that far, far more websites should – by default – employ https:// connections to protect people’s privacy?
  • Jeschke: We absolutely think that more websites should employ https! Here is a guide for site operators: (See external links, Ed.)

Finally, Wikinews approached the Icelandic politician, and WikiLeaks supporter, who has made this specific case a landmark in how the U.S. Government handles dealings with – supposedly – friendly governments and their elected representatives. A number of questions were posed, seeking the Icelandic Parliamentarian’s views:

((WN)) How did you feel when you were notified the US Government wanted your Twitter account, and message, details? Were you shocked?
  • Birgitta Jonsdottir: I felt angry but not shocked. I was expecting something like this to happen because of my involvement with WikiLeaks. My first reaction was to tweet about it.
((WN)) What do you believe is their reasoning in selecting you as a ‘target’?
  • Jonsdottir: It is quite clear to me that USA authorities are after Julian Assange and will use any means possible to get even with him. I think I am simply a pawn in a much larger context. I did of course both act as a spokesperson for WikiLeaks in relation to the Apache video and briefly for WikiLeaks, and I put my name to the video as a co-producer. I have not participated in any illegal activity and thus being a target doesn’t make me lose any sleep.
((WN)) Are you concerned that, as a Member of Parliament involved in the Icelandic Modern Media Initiative (IMMI), the US attempt to obtain your Twitter data is interfering with planned Icelandic government policy?
  • Jonsdottir: No
((WN)) In an earlier New York Times (NYT) article, you’re indicating there is nothing they can obtain about you that bothers you; but, how do you react to them wanting to know everyone you talk to?
  • Jonsdottir: It bothers me and according to top computer scientists the government should be required to obtain a search warrant to get our IP addresses from Twitter. I am, though, happy I am among the people DOJ is casting their nets around because of my parliamentary immunity; I have a greater protection then many other users and can use that immunity to raise the issue of lack of rights for those that use social media.
HAVE YOUR SAY
Do you believe the U.S. government should have the right to access data on foreign nationals using services such as Twitter?
Add or view comments
((WN)) The same NYT article describes you as a WikiLeaks supporter; is this still the case? What attracts you to their ‘radical transparency’?
  • Jonsdottir: I support the concept of WikiLeaks. While we don’t have a culture of protection for sources and whistleblowers we need sites like WikiLeaks. Plus, I think it is important to give WikiLeaks credit for raising awareness about in how bad shape freedom of information and expression is in our world and it is eroding at an alarming rate because of the fact that legal firms for corporations and corrupt politicians have understood the borderless nature of the legalities of the information flow online – we who feel it is important that people have access to information that should remain in the public domain need to step up our fight for those rights. WikiLeaks has played an important role in that context.I don’t support radical transparency – I understand that some things need to remain secret. It is the process of making things secret that needs to be both more transparent and in better consensus with nations.
((WN)) How do you think the Icelandic government would have reacted if it were tens of thousands of their diplomatic communications being leaked?
  • Jonsdottir: I am not sure – A lot of our dirty laundry has been aired via the USA cables – our diplomatic communications with USA were leaked in those cables, so far they have not stirred much debate nor shock. It is unlikely for tens of thousands of cables to leak from Iceland since we dont have the same influence or size as the USA, nor do we have a military.
((WN)) Your ambassador in the US has spoken to the Obama administration. Can you discuss any feedback from that? Do you have your party’s, and government’s, backing in challenging the ordered Twitter data release?
  • Jonsdottir: I have not had any feedback from that meeting, I did however receive a message from the DOJ via the USA ambassador in Iceland. The message stated three things: 1. I am free to travel to the USA. 2. If I would do so, I would not be a subject of involuntary interrogation. 3. I am not under criminal investigation. If this is indeed the reality I wonder why they are insisting on getting my personal details from Twitter. I want to stress that I understand the reasoning of trying to get to Assange through me, but I find it unacceptable since there is no foundation for criminal investigation against him. If WikiLeaks goes down, all the other media partners should go down at the same time. They all served similar roles. The way I see it is that WikiLeaks acted as the senior editor of material leaked to them. They could not by any means be considered a source. The source is the person that leaks the material to WikiLeaks. I am not sure if the media in our world understands how much is at stake for already shaky industry if WikiLeaks will carry on carrying the brunt of the attacks. I think it would be powerful if all the medias that have had access to WikiLeaks material would band together for their defence.
((WN)) Wikinews consulted a Belgian IT security expert who said it was most likely companies such as Facebook, Microsoft, and Google, would have complied with similar court orders *without advising the ‘targets*’. Does that disturb you?
  • Jonsdottir: This does disturb me for various reasons. The most obvious is that my emails are hosted at google/gmail and my search profile. I dont have anything to hide but it is important to note that many of the people that interact with me as a MP via both facebook and my various email accounts don’t always realize that there is no protection for them if they do so via those channels. I often get sensitive personal letters sent to me at facebook and gmail. In general most people are not aware of how little rights they have as users of social media. It is those of uttermost importance that those sites will create the legal disclaimers and agreements that state the most obvious rights we lose when we sign up to their services.
This exclusive interview features first-hand journalism by a Wikinews reporter. See the collaboration page for more details.
((WN)) Has there been any backlash within Iceland against US-based internet services in light of this? Do you expect such, or any increase in anti-American sentiments?
  • Jonsdottir: No, none what so ever. I dont think there is much anti-American sentiments in Iceland and I dont think this case will increase it. However I think it is important for everyone who does not live in the USA and uses social services to note that according to the ruling in my case, they dont have any protection of the 1st and 4th amendment, that only apply to USA citizens. Perhaps the legalities in relation to the borderless reality we live in online need to be upgraded in order for people to feel safe with using social media if it is hosted in the USA. Market tends to bend to simple rules.
((WN)) Does this make you more, or less, determined to see the IMMI succeed?
  • Jonsdottir: More. People have to realize that if we dont have freedom of information online we won’t have it offline. We have to wake up to the fact that our rights to access information that should be in the public domain is eroding while at the same time our rights as citizens online have now been undermined and we are only seen as consumers with consumers rights and in some cases our rights are less than of a product. This development needs to change and change fast before it is too late.

The U.S. Government continues to have issues internationally as a result of material passed to WikiLeaks, and subsequently published.

Within the past week, Ecuador has effectively declared the U.S. ambassador Heather Hodges persona-non-grata over corruption allegations brought to light in leaked cables. Asking the veteran diplomat to leave “as soon as possible”, the country may become the third in South America with no ambassadorial presence. Both Venezuela and Bolivia have no resident U.S. ambassador due to the two left-wing administrations believing the ejected diplomats were working with the opposition.

The U.S. State Department has cautioned Ecuador that a failure to speedily normalise diplomatic relations may jeapordise ongoing trade talks.

The United Kingdom is expected to press the Obama administration over the continuing detention of 23-year-old Manning, who also holds UK citizenship. British lawmakers are to discuss his ongoing detention conditions before again approaching the U.S. with their concerns that his solitary confinement, and treatment therein, is not acceptable.

The 22 charges brought against Manning are currently on hold whilst his fitness to stand trial is assessed.

Retrieved from “https://en.wikinews.org/w/index.php?title=ACLU,_EFF_challenging_US_%27secret%27_court_orders_seeking_Twitter_data&oldid=4515305”
Posted in Uncategorized
The One Stop Destination For The Pet Food Supplies

The One Stop Destination For The Pet Food Supplies

You can set the supplies for the pet food from the perfect warehouse. These are places that have the understanding about how hectic and a beautiful time pet feeding is. That said, you can get the opportunity to energise the dog by giving nutritional foods while also improving the psychological behaviour of the pet. You can give the food plenty of ingredients with the right amount of nutritional benefits for showing love for your faithful companion. You can get plenty of ingredients in the form of the food from the pet food stores.

The assortment of the food types

You will be getting the range of the meals that turn out to be the best one. Even if you want the platters with the no grain formula, from the top-notch brands. The excellent food supplies for the different kinds of the pet turns out to be the best in terms of the essential nutrients like vitamins, minerals, carbohydrates, fats, proteins, everything in the optimal level. The perfect supplements that will be working for giving them a solid body and good mental stability, you can get the availability of the same. Different species has different need of the nutrients. Hence the store will provide you with required food.

[youtube]http://www.youtube.com/watch?v=GSfTvUh9JGs[/youtube]

The meals from pet food stores are also available for your cats. You can get plenty of pet food that will be giving that taste and nutrition at the same time. . You can get the secure shopping option with the store as well. Even if you’re looking for the handpicked meals from pet food stores that will be perfect enough for the canine or feline companion, you can pick the meals with the proper nutrition. A huge lot of the foods for fish, Mouse, reptiles, dogs or anything else that turns out to be the best will be in stock.

Get the right foods from pet food storesthat are loaded with protein supplements in the right way. So be ready to give the perfect way of functioning life. Food like meat, proteins, and sustenance is always there at your fingertips. The best part is that these food are labelled with no GMO, no additive and the no false flavour kind of the food. Each of these is available in the ideal eating regimen.

When you provide the pets with the foods these foods, it will be making sure of giving the 100% nutritional benefits. It’s a well-known fact that pets always require the right amount of protein in Daily Meal. That said, you should always give the right amount of nutrients, minerals and cancer prevention agents.

Healthy foods from the perfect store

The best part is that you can give the assortment of the taste with the wholesome advantages to make sure that the dishes are packed with flavour. Even if you want the high protein choice that will be taking care of the animal in the perfect way, you can get the availability of similar options. Extraordinary nutritional fact foods are also best enough for keeping away the chances of dehydration, hypersensitivity and any other such stomach issues. These meals give a significant amount of improvement in the pet for meeting the individual requirements.

The food types from pet food stores are good enough in terms of correct value of nutrients. You can offer the foods to the goat, sheep, fish and the poultry. The nourishment is fit because the foods are packed with mineral nutrients. With such beautiful platters, you can care for the well-being and the prosperity of your pets at your home.

<div class=Pigs fed contaminated pet food; meat sold to consumers
" />

Pigs fed contaminated pet food; meat sold to consumers

Saturday, April 21, 2007

The contaminated pet food that was recalled after it was found to contain a harmful industrial chemical called melamine, has been used as pig feed at a hog farm in Ceres, California, located in the United States.

At least seven urine samples taken from pigs at the American Hog Farm, were tested and the results came back positive for the chemical melamine. At least three samples from the feed used to feed the pigs were tested and those results also came back positive for melamine.

Reports say that at least 100 pigs from the farm were slaughtered and sold from the “custom slaughterhouse” that is operated on the farms site. The meat is then sold to different places as “individual orders” and is not sold commercially for supermarkets. The affected meat goes as far back as April 3 and the company is asking anyone who bought it to return the product or throw it out.

Despite the sale, California State Veterinarian Dr. Richard Breitmeyer says that no evidence has turned up to suggest that the meat that was sold entered the human consumption chain.

“There is no evidence that any products from this farm have entered the food supply. The risk to people right now is minimal,” said Breitmeyer who also said that pet food from bags or boxes that have been torn or ripped, is sometimes reused as feed for small farms.

California’s Department of Food and Agriculture investigated the company and found that it had received the contaminated pet food from Diamond Pet Foods, which supplies retailers with the pet food Natural Balance, one of the over 100 recalled brands of pet food. Authorities then quarantined the farm to further investigate the situation.

At least 1,500 pigs are on the farm.

As of the moment, no other farms are being investigated, but officials say that other farms may also be affected.

“In the course of our investigation, we may find similar situations in other parts of the country,” said head of the Center for Veterinary Medicine at the U.S. Food and Drug Administration, Stephen Sundlof.

The FDA is continuing to investigate and Sundlof says that there is a possibility that the contamination of the pet food may be intentional.

“It would certainly lend credibility to the theory that it may be intentional. That will be one of the theories we will pursue when we get into the plants in China,” said Sundlof.

Last month, Menu Foods was the first to recall all of its 60 million products of dry and wet dog and cat food after pets began to fall ill and in some cases died of kidney failure. The FDA found melamine in samples of Menu Foods pet food and in samples of wheat gluten, imported from China, which was used as an ingredient.

Retrieved from “https://en.wikinews.org/w/index.php?title=Pigs_fed_contaminated_pet_food;_meat_sold_to_consumers&oldid=1982810”
Posted in Uncategorized
<div class=ACLU, EFF challenging US ‘secret’ court orders seeking Twitter data
" />

ACLU, EFF challenging US ‘secret’ court orders seeking Twitter data

Thursday, April 7, 2011

Late last month, the American Civil Liberties Union (ACLU) and Electronic Frontier Foundation (EFF) filed objections to the United States Government’s ‘secret’ attempts to obtain Twitter account information relating to WikiLeaks. The ACLU and EFF cite First and Fourth amendment issues as overriding reasons to overturn government attempts to keep their investigation secret; and, that with Birgitta Jonsdottir being an Icelandic Parliamentarian, the issue has serious international implications.

The case, titled “In the Matter of the 2703(d) Order Relating to Twitter Accounts: Wikileaks, Rop_G, IOERROR; and BirgittaJ“, has been in the EFF’s sights since late last year when they became aware of the US government’s attempts to investigate WikiLeaks-related communications using the popular microblogging service.

The key objective of this US government investigation is to obtain data for the prosecution of Bradley Manning, alleged to have supplied classified data to WikiLeaks. In addition to Manning’s Twitter account, and that of WikiLeaks (@wikileaks), the following three accounts are subject to the order: @ioerror, @birgittaj, and @rop_g. These, respectively, belong to Jacob Apelbaum, Birgitta Jonsdottir, and Rop Gonggrijp.

Birgitta is not the only non-US citizen with their Twitter account targeted by the US Government; Gonggrijp, a Dutch ‘ex-hacker’-turned-security-expert, was one of the founders of XS4ALL – the first Internet Service Provider in the Netherlands available to the public. He has worked on a mobile phone that can encrypt conversations, and proven that electronic voting systems can readily be hacked.

In early March, a Virginia magistrate judge ruled that the government could have the sought records, and neither the targeted users, or the public, could see documents submitted to justify data being passed to the government. The data sought is as follows:

  1. Personal contact information, including addresses
  2. Financial data, including credit card or bank account numbers
  3. Twitter account activity information, including the “date, time, length, and method of connections” plus the “source and destination Internet Protocol address(es)”
  4. Direct Message (DM) information, including the email addresses and IP addresses of everyone with whom the Parties have exchanged DMs

The order demands disclosure of absolutely all such data from November 1, 2009 for the targeted accounts.

The ACLU and EFF are not only challenging this, but demanding that all submissions made by the US government to justify the Twitter disclosure are made public, plus details of any other such cases which have been processed in secret.

Bradley Manning, at the time a specialist from Maryland enlisted with the United States Army’s 2nd Brigade, 10th Mountain Division, was arrested in June last year in connection with the leaking of classified combat video to WikiLeaks.

The leaked video footage, taken from a US helicopter gunship, showed the deaths of Reuters staff Saeed Chmagh and Namir Noor-Eldeen during a U.S. assault in Baghdad, Iraq. The wire agency unsuccessfully attempted to get the footage released via a Freedom of Information Act request in 2007.

When WikiLeaks released the video footage it directly contradicted the official line taken by the U.S. Army asserting that the deaths of the two Reuters staff were “collateral damage” in an attack on Iraqi insurgents. The radio chatter associated with the AH-64 Apache video indicated the helicopter crews had mistakenly identified the journalists’ equipment as weaponry.

The US government also claims Manning is linked to CableGate; the passing of around a quarter of a million classified diplomatic cables to WikiLeaks. Manning has been in detention since July last year; in December allegations of torture were made to the United Nations High Commissioner for Human Rights regarding the conditions under which he was and is being detained.

Reports last month that he must now sleep naked and attend role call at the U.S. Marine facility in Quantico in the same state, raised further concern over his detention conditions. Philip J. Crowley, at-the-time a State Department spokesman, remarked on this whilst speaking at Massachusetts Institute of Technology; describing the current treatment of Manning as “ridiculous and counterproductive and stupid”, Crowley was, as a consequence, put in the position of having to tender his resignation to Secretary of State Hillary Clinton.

Despite his native Australia finding, in December last year, that Assange’s WikiLeaks had not committed any criminal offences in their jurisdiction, the U.S. government has continued to make ongoing operations very difficult for the whistleblower website.

The result of the Australian Federal Police investigation left the country’s Prime Minister, Julia Gillard, having to retract a statement that WikiLeaks had acted “illegally”; instead, she characterised the site’s actions as “grossly irresponsible”.

Even with Australia finding no illegal activity on the part of WikiLeaks, and with founder Julian Assange facing extradition to Sweden, U.S. pressure sought to hobble WikiLeaks financially.

Based on a State Department letter, online payments site PayPal suspended WikiLeaks account in December. Their action was swiftly followed by Visa Europe and Mastercard ceasing to handle payments for WikiLeaks.

The online processing company, Datacell, threatened the two credit card giants with legal action over this. However, avenues of funding for the site were further curtailed when both Amazon.com and Swiss bank PostFinance joined the financial boycott of WikiLeaks.

Assange continues, to this day, to argue that his extradition to Sweden for questioning on alleged sexual offences is being orchestrated by the U.S. in an effort to discredit him, and thus WikiLeaks.

Wikinews consulted an IT and cryptography expert from the Belgian university which developed the current Advanced Encryption Standard; explaining modern communications, he stated: “Cryptography has developed to such a level that intercepting communications is no longer cost effective. That is, if any user uses the correct default settings, and makes sure that he/she is really connecting to Twitter it is highly unlikely that even the NSA can break the cryptography for a protocol such as SSL/TLS (used for https).”

Qualifying this, he commented that “the vulnerable parts of the communication are the end points.” To make his point, he cited the following quote from Gene Spafford: “Using encryption on the Internet is the equivalent of arranging an armored car to deliver credit card information from someone living in a cardboard box to someone living on a park bench.

Continuing, the Katholieke Universiteit Leuven (KUL) expert explained:

In the first place, the weak point is Twitter itself; the US government can go and ask for the data; companies such as Twitter and Google will typically store quite some information on their users, including IP addresses (it is known that Google deletes the last byte of the IP address after a few weeks, but it is not too hard for a motivated opponent to find out what this byte was).
In the second place, this is the computer of the user: by exploiting system weaknesses (with viruses, Trojan horses or backdoors in the operating system) a highly motivated opponent can enter your machine and record your keystrokes plus everything that is happening (e.g. the FBI is known to do this with the so-called Magic Lantern software). Such software is also commercially available, e.g. for a company to monitor its employees.
It would also be possible for a higly motivated opponent to play “man-in-the-middle”; that means that instead of having a secure connection to Twitter.com, you have a secure connection to the attacker’s server, who impersonates Twitter’s and then relays your information to Twitter. This requires tricks such as spoofing DNS (this is getting harder with DNSsec), or misleading the user (e.g. the user clicks on a link and connects to tw!tter.com or Twitter.c0m, which look very similar in a URL window as Twitter.com). It is clear that the US government is capable of using these kind of tricks; e.g., a company has been linked to the US government that was recognized as legitimate signer in the major browsers, so it would not be too large for them to sign a legitimate certificate for such a spoofing webserver; this means that the probability that a user would detect a problem would be very low.
As for traffic analysis (finding out who you are talking to rather than finding out what you are telling to whom), NSA and GCHQ are known to have access to lots of traffic (part of this is obtained via the UK-USA agreement). Even if one uses strong encryption, it is feasible for them to log the IP addresses and email addresses of all the parties you are connecting to. If necessary, they can even make routers re-route your traffic to their servers. In addition, the European Data Retention directive forces all operators to store such traffic data.
Whether other companies would have complied with such requests: this is very hard to tell. I believe however that it is very plausible that companies such as Google, Skype or Facebook would comply with such requests if they came from a government.
In summary: unless you go through great lengths to log through to several computers in multiple countries, you work in a clean virtual machine, you use private browser settings (don’t accept cookies, no plugins for Firefox, etc.) and use tools such as Tor, it is rather easy for any service provider to identify you.
Finally: I prefer not to be quoted on any sentences in which I make statements on the capabilities or actions of any particular government.

Wikinews also consulted French IT security researcher Stevens Le Blond on the issues surrounding the case, and the state-of-the-art in monitoring, and analysing, communications online. Le Blond, currently presenting a research paper on attacks on Tor to USENIX audiences in North America, responded via email:

Were the US Government to obtain the sought data, it would seem reasonable the NSA would handle further investigation. How would you expect them to exploit the data and expand on what they receive from Twitter?

  • Le Blond: My understanding is that the DOJ is requesting the following information: 1) Connection records and session times 2) IP addresses 3) e-mail addresses 4) banking info
By requesting 1) and 2) for Birgitta and other people involved with WikiLeaks (WL) since 2009, one could derive 2 main [pieces of] information.
First, he could tell the mobility of these people. Recent research in networking shows that you can map an IP address into a geographic location with a median error of 600 meters. So by looking at changes of IP addresses in time for a Twitter user, one could tell (or at least speculate about) where that person has been.
Second, by correlating locations of different people involved with WL in time, one could possibly derive their interactions and maybe even their level of involvement with WL. Whether it is possible to derive this information from 1) and 2) depends on how this people use Twitter. For example, do they log on Twitter often enough, long enough, and from enough places?
My research indicates that this is the case for other Internet services but I cannot tell whether it is the case for Twitter.
Note that even though IP logging, as done by Twitter, is similar to the logging done by GSM [mobile phone] operators, the major difference seems to be that Twitter is subject to US regulation, no matter the citizenship of its users. I find this rather disturbing.
Using 3), one could search for Birgitta on other Internet services, such as social networks, to find more information on her (e.g., hidden accounts). Recent research on privacy shows that people tend to use the same e-mail address to register an account on different social networks (even when they don’t want these accounts to be linked together). Obviously, one could then issue subpoenas for these accounts as well.
I do not have the expertise to comment on what could be done with 4).
((WN)) As I believe Jonsdottir to be involved in the Icelandic Modern Media Initiative (IMMI), what are the wider implications beyond the “WikiLeaks witchhunt”?
  • Le Blond: Personal data can be used to discredit, especially if the data is not public.

Having been alerted to the ongoing case through a joint press release by the ACLU and EFF, Wikinews sought clarification on the primary issues which the two non-profits saw as particularly important in challenging the U.S. Government over the ‘secret’ court orders. Rebecca Jeschke, Media Relations Director for the EFF, explained in more detail the points crucial to them, responding to a few questions from Wikinews on the case:

((WN)) As a worse-case, what precedents would be considered if this went to the Supreme Court?
  • Rebecca Jeschke: It’s extremely hard to know at this stage if this would go to the Supreme Court, and if it did, what would be at issue. However, some of the interesting questions about this case center on the rights of people around the world when they use US Internet services. This case questions the limits of US law enforcement, which may turn out to be very different from the limits in other countries.
((WN)) Since this is clearly a politicised attack on free speech with most chilling potential repercussions for the press, whistleblowers, and by-and-large anyone the relevant U.S. Government departments objects to the actions of, what action do you believe should be taken to protect free speech rights?
  • Jeschke: We believe that, except in very rare circumstances, the government should not be permitted to obtain information about individuals’ private Internet communications in secret. We also believe that Internet companies should, whenever possible, take steps to ensure their customers are notified about requests for information and have the opportunity to respond.
((WN)) Twitter via the web, in my experience, tends to use https:// connections. Are you aware of any possibility of the government cracking such connections? (I’m not up to date on the crypto arms race).
  • Jeschke: You don’t need to crack https, per se, to compromise its security. See this piece about fraudulent https certificates:
Iranian hackers obtain fraudulent httpsEFF website.
((WN)) And, do you believe that far, far more websites should – by default – employ https:// connections to protect people’s privacy?
  • Jeschke: We absolutely think that more websites should employ https! Here is a guide for site operators: (See external links, Ed.)

Finally, Wikinews approached the Icelandic politician, and WikiLeaks supporter, who has made this specific case a landmark in how the U.S. Government handles dealings with – supposedly – friendly governments and their elected representatives. A number of questions were posed, seeking the Icelandic Parliamentarian’s views:

((WN)) How did you feel when you were notified the US Government wanted your Twitter account, and message, details? Were you shocked?
  • Birgitta Jonsdottir: I felt angry but not shocked. I was expecting something like this to happen because of my involvement with WikiLeaks. My first reaction was to tweet about it.
((WN)) What do you believe is their reasoning in selecting you as a ‘target’?
  • Jonsdottir: It is quite clear to me that USA authorities are after Julian Assange and will use any means possible to get even with him. I think I am simply a pawn in a much larger context. I did of course both act as a spokesperson for WikiLeaks in relation to the Apache video and briefly for WikiLeaks, and I put my name to the video as a co-producer. I have not participated in any illegal activity and thus being a target doesn’t make me lose any sleep.
((WN)) Are you concerned that, as a Member of Parliament involved in the Icelandic Modern Media Initiative (IMMI), the US attempt to obtain your Twitter data is interfering with planned Icelandic government policy?
  • Jonsdottir: No
((WN)) In an earlier New York Times (NYT) article, you’re indicating there is nothing they can obtain about you that bothers you; but, how do you react to them wanting to know everyone you talk to?
  • Jonsdottir: It bothers me and according to top computer scientists the government should be required to obtain a search warrant to get our IP addresses from Twitter. I am, though, happy I am among the people DOJ is casting their nets around because of my parliamentary immunity; I have a greater protection then many other users and can use that immunity to raise the issue of lack of rights for those that use social media.
HAVE YOUR SAY
Do you believe the U.S. government should have the right to access data on foreign nationals using services such as Twitter?
Add or view comments
((WN)) The same NYT article describes you as a WikiLeaks supporter; is this still the case? What attracts you to their ‘radical transparency’?
  • Jonsdottir: I support the concept of WikiLeaks. While we don’t have a culture of protection for sources and whistleblowers we need sites like WikiLeaks. Plus, I think it is important to give WikiLeaks credit for raising awareness about in how bad shape freedom of information and expression is in our world and it is eroding at an alarming rate because of the fact that legal firms for corporations and corrupt politicians have understood the borderless nature of the legalities of the information flow online – we who feel it is important that people have access to information that should remain in the public domain need to step up our fight for those rights. WikiLeaks has played an important role in that context.I don’t support radical transparency – I understand that some things need to remain secret. It is the process of making things secret that needs to be both more transparent and in better consensus with nations.
((WN)) How do you think the Icelandic government would have reacted if it were tens of thousands of their diplomatic communications being leaked?
  • Jonsdottir: I am not sure – A lot of our dirty laundry has been aired via the USA cables – our diplomatic communications with USA were leaked in those cables, so far they have not stirred much debate nor shock. It is unlikely for tens of thousands of cables to leak from Iceland since we dont have the same influence or size as the USA, nor do we have a military.
((WN)) Your ambassador in the US has spoken to the Obama administration. Can you discuss any feedback from that? Do you have your party’s, and government’s, backing in challenging the ordered Twitter data release?
  • Jonsdottir: I have not had any feedback from that meeting, I did however receive a message from the DOJ via the USA ambassador in Iceland. The message stated three things: 1. I am free to travel to the USA. 2. If I would do so, I would not be a subject of involuntary interrogation. 3. I am not under criminal investigation. If this is indeed the reality I wonder why they are insisting on getting my personal details from Twitter. I want to stress that I understand the reasoning of trying to get to Assange through me, but I find it unacceptable since there is no foundation for criminal investigation against him. If WikiLeaks goes down, all the other media partners should go down at the same time. They all served similar roles. The way I see it is that WikiLeaks acted as the senior editor of material leaked to them. They could not by any means be considered a source. The source is the person that leaks the material to WikiLeaks. I am not sure if the media in our world understands how much is at stake for already shaky industry if WikiLeaks will carry on carrying the brunt of the attacks. I think it would be powerful if all the medias that have had access to WikiLeaks material would band together for their defence.
((WN)) Wikinews consulted a Belgian IT security expert who said it was most likely companies such as Facebook, Microsoft, and Google, would have complied with similar court orders *without advising the ‘targets*’. Does that disturb you?
  • Jonsdottir: This does disturb me for various reasons. The most obvious is that my emails are hosted at google/gmail and my search profile. I dont have anything to hide but it is important to note that many of the people that interact with me as a MP via both facebook and my various email accounts don’t always realize that there is no protection for them if they do so via those channels. I often get sensitive personal letters sent to me at facebook and gmail. In general most people are not aware of how little rights they have as users of social media. It is those of uttermost importance that those sites will create the legal disclaimers and agreements that state the most obvious rights we lose when we sign up to their services.
This exclusive interview features first-hand journalism by a Wikinews reporter. See the collaboration page for more details.
((WN)) Has there been any backlash within Iceland against US-based internet services in light of this? Do you expect such, or any increase in anti-American sentiments?
  • Jonsdottir: No, none what so ever. I dont think there is much anti-American sentiments in Iceland and I dont think this case will increase it. However I think it is important for everyone who does not live in the USA and uses social services to note that according to the ruling in my case, they dont have any protection of the 1st and 4th amendment, that only apply to USA citizens. Perhaps the legalities in relation to the borderless reality we live in online need to be upgraded in order for people to feel safe with using social media if it is hosted in the USA. Market tends to bend to simple rules.
((WN)) Does this make you more, or less, determined to see the IMMI succeed?
  • Jonsdottir: More. People have to realize that if we dont have freedom of information online we won’t have it offline. We have to wake up to the fact that our rights to access information that should be in the public domain is eroding while at the same time our rights as citizens online have now been undermined and we are only seen as consumers with consumers rights and in some cases our rights are less than of a product. This development needs to change and change fast before it is too late.

The U.S. Government continues to have issues internationally as a result of material passed to WikiLeaks, and subsequently published.

Within the past week, Ecuador has effectively declared the U.S. ambassador Heather Hodges persona-non-grata over corruption allegations brought to light in leaked cables. Asking the veteran diplomat to leave “as soon as possible”, the country may become the third in South America with no ambassadorial presence. Both Venezuela and Bolivia have no resident U.S. ambassador due to the two left-wing administrations believing the ejected diplomats were working with the opposition.

The U.S. State Department has cautioned Ecuador that a failure to speedily normalise diplomatic relations may jeapordise ongoing trade talks.

The United Kingdom is expected to press the Obama administration over the continuing detention of 23-year-old Manning, who also holds UK citizenship. British lawmakers are to discuss his ongoing detention conditions before again approaching the U.S. with their concerns that his solitary confinement, and treatment therein, is not acceptable.

The 22 charges brought against Manning are currently on hold whilst his fitness to stand trial is assessed.

Retrieved from “https://en.wikinews.org/w/index.php?title=ACLU,_EFF_challenging_US_%27secret%27_court_orders_seeking_Twitter_data&oldid=4515305”
Posted in Uncategorized