Webstock in New Zealand

Webstock_2016_2I just want to say a huge thank you to the organ­isers of the 10th Web­stock Fest­iv­al in New Zea­l­and earli­er this month — def­in­itely worth the inter­min­able flights.

This is a tech-focused con­fer­ence that very much looks at the big­ger pic­ture and joins a whole num­ber of dif­fer­ent soci­et­al dots.

Plus they look after their “inspir­a­tion­al speak­ers” exceed­ingly well, with scary coach trips out of Wel­ling­ton and up the cliffs, a chance to appre­ci­ate the finer aspects of bowl­ing at a NZ work­ing men’s club, and a rip-roar­ing party at the end of the fest­iv­al. It was great to have the time to chat with so many amaz­ing people.

Oh, and I exper­i­enced my first earth­quake — 5.7 on the Richter Scale. Slightly dis­tant, but still impress­ive when you’re in a sway­ing 5th floor hotel room.  I ini­tially thought a bomb might have gone off in the base­ment.…  Thank­fully, NZ hotels are made of pli­able, if stern, stuff.

I was also shunted on to Radio New Zea­l­and for a half hour inter­view, dis­cuss­ing whis­tleblowers, spies, drugs and sur­veil­lance.  Here it is — it was fun to do — so thank you NZ.

Freedom Equals Surveillance

Here’s an inter­view I did for RT a while ago about the USA’s Orwellian NewS­peak about surveillance:

US_Freedom_Act_surveillance_act_in_disguise from Annie Machon on Vimeo.

Merkel NSA phone tapping

My inter­view today for RT about the Ger­man pro­sec­utor’s decision to stop the invest­ig­a­tion of the NSA tap­ping Chan­cel­lor Angela Merkel’s mobile phone, and much more:

End of Merkel NSA Spy Probe Case on RT Inter­na­tion­al from Annie Machon on Vimeo.

Re:publica — The War on Concepts

This week I made my first vis­it to the re:publica annu­al geek­fest in Ber­lin to do a talk called “The War on Con­cepts”. In my view this, to date, includes the four wars — on drugs, ter­ror, the inter­net, and whis­tleblowers. No doubt the num­ber will con­tin­ue to rise.

Here’s the video:

republica_2015_Annie_Machon_The_War_on_Concepts from Annie Machon on Vimeo.

No encryption? How very rude.

First pub­lished on RT Op-Edge.

It struck me today that when I email a new con­tact I now reflex­ively check to see if they are using PGP encryp­tion.  A hap­pily sur­pris­ing num­ber are doing so these days, but most people would prob­ably con­sider my circle of friends and acquaint­ance to be eclect­ic at the very least, if not down­right eccent­ric, but then that’s prob­ably why I like them.

There are still alarm­ing num­bers who are not using PGP though, par­tic­u­larly in journ­al­ist circles, and I have to admit that when this hap­pens I do feel a tad miffed, as if some basic mod­ern cour­tesy is being breached.

It’s not that I even expect every­body to use encryp­tion — yet — it’s just that I prefer to have the option to use it and be able to have the pri­vacy of my own com­mu­nic­a­tions at least con­sidered. After all I am old enough to remem­ber the era of let­ter writ­ing, and I always favoured a sealed envel­ope to a postcard.

And before you all leap on me with cries of “using only PGP is no guar­an­tee of secur­ity.…” I do know that you need a suite of tools to have a fight­ing chance of real pri­vacy in this NSA-sat­ur­ated age: open source soft­ware, PGP, TOR, Tails, OTR, old hard­ware, you name it.  But I do think the wide-spread adop­tion of PGP sets a good example and gets more people think­ing about these wider issues.  Per­haps more of us should insist on it before com­mu­nic­at­ing further.

Why is this in my mind at the moment?  Well, I am cur­rently work­ing with an old friend, Simon Dav­ies, the founder of Pri­vacy Inter­na­tion­al and the Big Broth­er Awards. He cut his first PGP key in 2000, but then left it to with­er on the vine. As we are in the pro­cess of set­ting up a new pri­vacy ini­ti­at­ive called Code Red (more of which next week) it seemed imper­at­ive for him to set a good example and “start using” again.

Any­way, with the help of one of the god­fath­ers of the Ber­lin crypto­parties, I am happy to report that the fath­er of the pri­vacy move­ment can now ensure your pri­vacy if you wish to com­mu­nic­ate with him.

I am proud to say that my aware­ness of PGP goes back even fur­ther.  The first time I heard of the concept was in 1998 while I was liv­ing in hid­ing in a remote farm­house in cent­ral France, on the run from MI5, with my then part­ner, Dav­id Shayler.

Our only means of com­mu­nic­a­tion with the out­side world was a com­puter and a dial-up con­nec­tion and Dav­id went on a steep learn­ing curve in all things geek to ensure a degree of pri­vacy.  He helped build his own web­site (sub­sequently hacked, pre­sum­ably by GCHQ or the NSA as it was a soph­ist­ic­ated attack by the stand­ards of the day) and also installed the newly-avail­able PGP. People com­plain now of the dif­fi­culties of installing encryp­tion, but way back then it was the equi­val­ent of scal­ing Mount Everest after a few light strolls in the park to limber up.  But he man­aged it.

Now, of course, it is rel­at­ively easy, espe­cially if you take the time to attend a Crypto­party — and there will be inev­it­ably be one hap­pen­ing near you some place soon.

Crypto­parties began in late 2012 on the ini­ti­at­ive of Ash­er Wolf in Aus­tralia.  The concept spread rap­idly, and after Snowden went pub­lic in May 2013, accel­er­ated glob­ally. Indeed, there have been vari­ous reports about the “Snowden Effect”.  Only last week there was an art­icle in the Guard­i­an news­pa­per say­ing that 72% of Brit­ish adults are now con­cerned about online pri­vacy. I hope the 72% are tak­ing advant­age of these geek gatherings.

The US-based comedi­an, John Oliv­er, also recently aired an inter­view with Edward Snowden.  While this was slightly pain­ful view­ing for any whis­tleblower — Oliv­er had done a vox pop in New York that he showed to Snowden, where most inter­viewees seemed unaware of him and uncar­ing about pri­vacy — there was a per­cept­ible shift of opin­ion when the issue of, shall we say, pic­tures of a sens­it­ive nature were being intercepted.

Offi­cially this spy pro­gramme is called Optic Nerve, an issue that many of us have been dis­cuss­ing to some effect over the last year.  In the Oliv­er inter­view this trans­mog­ri­fied into “the dick pic pro­gramme”.  Well, whatever gets the mes­sage out there effect­ively.… and it did.

We all have things we prefer to keep private — be it dick pics, bank accounts, going to the loo, talk­ing to our doc­tor, our sex lives, or even just talk­ing about fam­ily gos­sip over the phone.  This is not about hav­ing any­thing to hide, but most of us do have an innate sense of pri­vacy around our per­son­al issues and deal­ings and this is all now lost to us, as Edward Snowden has laid bare.

As I have also said before, there are wider soci­et­al implic­a­tions too — if we feel we are being watched in what we watch, read, say, write, organ­ise, and con­duct our rela­tion­ships, then we start to self-cen­sor.  And this is indeed already anoth­er of the quan­ti­fied Snowden effects. This is dele­ter­i­ous to the free flow of inform­a­tion and the cor­rect func­tion­ing of demo­crat­ic soci­et­ies.  This is pre­cisely why the right to pri­vacy is one of the core prin­ciples in the 1948 Uni­ver­sal Declar­a­tion of Human Rights.

Les­sons had then been learned from the Nazi book burn­ings and the Gestapo spy state, and pri­vacy was recog­nised as a pre-requis­ite of open demo­cracy. Yet now we see seni­or and sup­posedly well-informed US politi­cians call­ing for the mod­ern equi­val­ent of book burn­ings and fail­ing to rein in the glob­al abuses of the NSA.

How quickly the les­sons of his­tory can be for­got­ten and how care­lessly we can cast aside the hard-won rights of our ancestors.

Edward Snowden, at great per­son­al risk, gave us the neces­sary inform­a­tion to for­mu­late a push back. At the very least we can have enough respect for the sac­ri­fices he made and for the rights of our fel­low human beings to take basic steps to pro­tect both our own and their privacy.

So please start using open source encryp­tion at the very least. It would be rude not to.

Whistleblower panel discussion at Logan Symposium

Here is a pan­el dis­cus­sion I did about whis­tleblow­ing at the Logan Sym­posi­um in Lon­don last Novem­ber. With me on the pan­el are Eileen Chubb, a UK health care whis­tleblower who runs Com­pas­sion in Care and is cam­paign­ing for Edna’s Law, and Bea Edwards of the US Gov­ern­ment Account­ab­il­ity Pro­ject.  With thanks to @newsPeekers for film­ing this.

news­Peek­sLIVE whis­tleblower inter­view from Annie Machon on Vimeo.

US/UK intelligence agencies threaten Germany

Accord­ing to journ­al­ist Glenn Gre­en­wald, Ger­man Vice Chan­cel­lor Sig­mar Gab­ri­el has stated that the US and UK spy agen­cies threatened to cut Ger­many out of the intel­li­gence-shar­ing loop if it gave safe haven to NSA whis­tle­bower, Edward Snowden.

Here is my view of the situ­ation on RT today:

RT Inter­view about US/UK intel­li­gence threats to Ger­many from Annie Machon on Vimeo.

Jihadi John and MI5

So this week the mur­der­ous behead­er of the Islam­ic State, “Jihadi John”, has been unmasked.  His real iden­tity is appar­ently Mohammed Emwazi, born in Kuwait and now a Brit­ish cit­izen who was raised and edu­cated in west London

Much sound, fury and heated debate has been expen­ded over the last couple of days about how he became rad­ic­al­ised, who was to blame, with MI5 once more cast in the role of vil­lain. In such media sound-bite dis­cus­sions it is all too easy to fall into facile and polar­ised argu­ments. Let us try to break this down and reach a more nuanced  understanding.

First up is the now-notori­ous press con­fer­ence hos­ted by the cam­paign­ing group, Cage, in which the Research Dir­ect­or, Asim Qure­shi , claimed that MI5 har­ass­ment of Emwazi was the reas­on for his rad­ic­al­isa­tion. Emwazi had com­plained to Cage and appar­ently the Met­ro­pol­it­an Police that over the last six years MI5 had approached him and was pres­sur­ising him to work as an agent for them. Accord­ing to Cage, this har­ass­ment lead to Emwazi’s radicalisation.

Yet recruit­ment of such agents is a core MI5 func­tion, some­thing it used to do with sub­tlety and some suc­cess, by identi­fy­ing people with­in groups who poten­tially could be vul­ner­able to induce­ments or pres­sure to report back on tar­get organ­isa­tions.  In fact, Brit­ish intel­li­gence used to be much more focused on gath­er­ing “HUMINT”.  The very best intel­li­gence comes from an (ideally) will­ing but at least co-oper­at­ive human agent: they are mobile, they can gain the trust of and con­verse with tar­gets who may be wary of using elec­tron­ic com­mu­nic­a­tions, and they can be tasked to gath­er spe­cif­ic intel­li­gence rather than wait­ing for the lucky hit on intercept.

MI5 used to be good at this — spend­ing time to really invest­ig­ate and identi­fy the right recruit­ment tar­gets, with a con­sidered approach towards mak­ing the pitch.

How­ever, it appears since 9/11 and the start of the bru­tal “war on ter­ror” that two prob­lems have evolved, both of which ori­gin­ated in Amer­ica. Firstly, Brit­ish intel­li­gence seems to have fol­lowed their US coun­ter­parts down a mor­al hel­ter-skel­ter, becom­ing re-involved in counter-pro­duct­ive and bru­tal activ­it­ies such as kid­nap­ping, intern­ment and tor­ture. As MI5 had learned at least by the 1990s, such activ­it­ies inev­it­ably res­ult in blow-back, and can act as a recruit­ing drum to the ter­ror­ist cause of the day.

(Tan­gen­tially, the Home Office also instig­ated the Pre­vent pro­gramme — in concept to counter rad­ic­al Islam in vul­ner­able social com­munit­ies, but in prac­tice used and abused by the author­it­ies to intim­id­ate and coerce young Muslims in the UK.)

Secondly, Brit­ish intel­li­gence seems over the last dec­ade to have blindly fol­lowed the US spies down the path of pan­op­tic­an, drag-net elec­tron­ic sur­veil­lance.  All this has been long sus­pec­ted by a few, but con­firmed to the many by the dis­clos­ures of Edward Snowden over the last couple of years. Indeed it seems that GCHQ is not merely com­pli­cit but an act­ive facil­it­at­or and ena­bler of the NSA’s wilder ideas.  And what we now know is hor­rif­ic enough, yet it cur­rently remains just the tip of the iceberg.

This deluge of inform­a­tion cre­ates gar­gan­tu­an hay­stacks with­in which some genu­ine intel­li­gence needles might reside — to use the ter­min­o­logy of the spy agency cheer­lead­ers. How­ever, it con­cur­rently swamps the intel­li­gence agen­cies in use­less inform­a­tion, while also cer­tainly throw­ing up a per­cent­age of false-pos­it­ives.  Bear­ing in mind the sheer scale of the leg­ally dubi­ous snoop­ing, even a 0.001% of false pos­it­ives could poten­tially pro­duce thou­sands of erro­neous leads.

Curi­ous people now have a world of inform­a­tion at their fin­ger­tips. They may click on an intriguing link and find them­selves on a rad­ic­al web­site; even if they click out quickly, the pan­op­ticon will have logged their “interest”. Or they could donate money to an appar­ently legit­im­ate char­ity; “like” the wrong thing on Face­book; fol­low the wrong per­son on Twit­ter; have their email hacked, or whatever.…

The Big Broth­er Borg algorithms will crunch through all of this inform­a­tion pre­dict­ably and pre­dict­ively, with sub­tleties lost and mis­takes made. Mind you, that happened in a more lim­ited fash­ion too at the height of the Cold War sub­ver­sion para­noia in Bri­tain in the 1970s and 1980s, when school­boys writ­ing to the Com­mun­ist Party HQ for inform­a­tion for school pro­jects could end up with a MI5 file, and divor­cing couples could denounce each oth­er.  But at least, then, whole pop­u­la­tions were not under surveillance.

I think this may go some way towards explain­ing so many recent cases where “lone wolf” attack­ers around the world have been known to their nation­al intel­li­gence agen­cies and yet been left to roam free, either dis­coun­ted as too low level a threat in the flood of inform­a­tion or oth­er­wise sub­jec­ted to bungled recruit­ment approaches.

In the ana­logue era much time, research and thought would go into identi­fy­ing per­sons of interest, and more cru­cially how to approach a tar­get either for dis­rup­tion or recruit­ment.  I should think that the spy super-com­puters are now throw­ing up so many pos­sible leads that approaches are made in a more hur­ried, ill-informed and less con­sidered way.

And this can res­ult in cases such as Michael Ade­bolayo whom MI5 approached and allegedly har­assed years before he went on to murder Drum­mer Lee Rigby in Wool­wich in 2013. The same may well have happened with Mohammed Emwazi. Once someone has been tar­geted, they are going to feel para­noid and under sur­veil­lance, wheth­er rightly or wrongly, and this might res­ult in grow­ing resent­ment and push them into ever more extreme views.

How­ever, I would sug­gest that MI5 remains merely the tool, fol­low­ing the dir­ect­ives of the UK gov­ern­ment in response to the ever-expand­ing, ever-neb­u­lous war on ter­ror, just as MI6 fol­lowed the dir­ect­ives of the Blair gov­ern­ment in 2003 when it allowed its intel­li­gence to be politi­cised as a pre­text for an illeg­al war in Iraq. MI5 might be an occa­sion­al cata­lyst, but not the under­ly­ing cause of radicalisation.

Unfor­tu­nately, by immers­ing itself in the now-over­whelm­ing intel­li­gence detail, it appears to be miss­ing the big­ger pic­ture — just why are young Brit­ish people tak­ing an interest in the events of the Middle East, why are so many angry, why are so many drawn to rad­ic­al views and some drawn to extreme actions.

Surely the simplest way to under­stand their griev­ances is to listen to what the extrem­ist groups actu­ally say? Osama Bin Laden was clear in his views — he wanted US mil­it­ary bases out of Saudi Ara­bia and US med­dling across the Middle East gen­er­ally to stop; he also wanted a res­ol­u­tion to the Palestini­an conflict.

Jihadi John states in his ghastly snuff videos that he is met­ing out hor­ror to high­light the hor­rors daily inflic­ted across the Middle East by the US mil­it­ary — the bomb­ings, drone strikes, viol­ent death and mutilation.

To hear this and under­stand is not to be a sym­path­iser, but is vital if west­ern gov­ern­ments want to devel­op a more intel­li­gent, con­sidered and poten­tially more suc­cess­ful policies in response. Once you under­stand, you can nego­ti­ate, and that is the only sane way for­ward. Viol­ence used to counter viol­ence always escal­ates the situ­ation and every­one suffers.

The USA still needs to learn this les­son. The UK had learned it, res­ult­ing in the end of the war in North­ern Ire­land, but it now seems to have been for­got­ten. It is not rock­et sci­ence — even the former head of MI5, Lady Man­ning­ham-Buller, has said nego­ti­ation is the only suc­cess­ful long-term policy when deal­ing with terrorism.

Along with the UK, many oth­er European coun­tries have suc­cess­fully nego­ti­ated their way out of long-run­ning domest­ic ter­ror­ist cam­paigns. The tragedy for European coun­tries that have recently or will soon suf­fer the new mod­el of “lone wolf” atro­cit­ies, is that our gov­ern­ments are still in thrall to the failed US for­eign policy of “the war on ter­ror”, repeated daily in gory tech­ni­col­our across North Africa, the Middle East, cent­ral Asia, and now Ukraine.

Glob­al jihad is the inev­it­able response to USA glob­al expan­sion­ism, hege­mony and aggres­sion. As long as our gov­ern­ments and intel­li­gence agen­cies in Europe kow­tow to Amer­ic­an stra­tegic interests rather than pro­tect those of their own cit­izens, all our coun­tries will remain at risk.

Sam Adams Award for Integrity in Intelligence, Berlin 2015

Last week in Ber­lin the 2015 Sam Adams Award for Integ­rity in Intel­li­gence was presen­ted to the former Tech­nic­al Dir­ect­or of the NSA, whis­tleblower and tire­less pri­vacy advoc­ate, Wil­li­am Bin­ney.

A 36-year intel­li­gence agency vet­er­an, Bill Bin­ney resigned from the NSA in 2001 and became a whis­tleblower after dis­cov­er­ing that ele­ments of a data-mon­it­or­ing pro­gramme he had helped devel­op were being used to spy on Amer­ic­ans.  He explained that he “could not stay after the NSA began pur­pose­fully viol­at­ing the Constitution”.

Bill remains tire­less, pledging to spend the remainder of his years speak­ing out across the world and work­ing to reform the gross gov­ern­ment­al illeg­al­ity and stu­pid­ity of inter­cept­ing tril­lions and tril­lions of com­mu­nic­a­tions of inno­cent people’s phone calls, emails and oth­er forms of data. Bill states “it’s viol­ated every­one’s rights. It can be used to spy on the whole world.”

The Sam Adams Asso­ci­ates decided to hold the cere­mony in Ber­lin as it is cur­rently a glob­al hub for pri­vacy-minded indi­vidu­als — journ­al­ists, film-makers, tech­no­lo­gists, whis­tleblowers and campaigners.

Binney_at_BundestagHis­tory has made Ger­many much more sens­it­ive to the need for basic rights, such as pri­vacy, than many oth­er soi dis­ant west­ern demo­cra­cies, and the dis­clos­ures of Edward Snowden, includ­ing the col­lu­sion of Ger­man intel­li­gence agen­cies with the NSA as well as the bug­ging of Chan­cel­lor Angela Merkel’s mobile phone, have caused out­rage across the country.

Plus, only last year Bill Bin­ney was invited to give evid­ence to the Ger­man Bundestag’s NSA Inquiry Commission.

SAA_Photo_Berlin_2015Whis­tleblowers, former intel­li­gence officers, mil­it­ary officers, dip­lo­mats and law­yers flew in from around the world to hon­our Bill Bin­ney. The Sam Adams Asso­ci­ates attend­ing the event were Ray McGov­ern (CIA), Todd Pierce (US mil­it­ary law­yer), Coleen Row­ley (FBI), Eliza­beth Mur­ray (US nation­al intel­li­gence coun­cil), Craig Mur­ray (UK ambas­sad­or), Kath­er­ine Gun (GCHQ), Tom Drake (NSA), Jes­selyn Radack (US DoJ), Dav­id MacMi­chael (CIA), and myself (MI5).

We were also pleased that Edward Snowden was able to join us via live link to give a  power­ful speech hon­our­ing Bill Binney.

So, here is the film of a won­der­fully touch­ing cere­mony, and con­grat­u­la­tions to Bill Bin­ney for the cour­age he has already demon­strated and con­tin­ues to display:

Sam Adams Award Ber­lin 2015 from Annie Machon on Vimeo.

And here we have the text of the award cita­tion to Bill Binney:

The Sam Adams Asso­ci­ates for Integ­rity in Intelligence

Presents its INTEGRITY AWARD for 2015 to:

Wil­li­am Binney

Know all ye by these presents that Wil­li­am Bin­ney is hereby honored with the tra­di­tion­al Sam Adams Corner-Bright­en­er Can­dle­stick Hold­er, in sym­bol­ic recog­ni­tion of Mr. Binney’s cour­age in shin­ing light into dark places.

Bill Bin­ney rep­res­ents the pat­ri­ot­ic side of a duel between two unequal adversar­ies: an exceed­ingly power­ful and ruth­less state and Bill, an offi­cial who would not break his sol­emn oath to defend its Con­sti­tu­tion.  Like Tom Drake and Ed Snowden, he was determ­ined to pre­serve his integ­rity, his pri­vacy, and his per­son­al honor.

On both sides of the Atlantic we hear the man­tra: “After 9/11/2001 EVERYTHING CHANGED;” just like “everything changed” after the burn­ing of the Reich­stag on 2/27/1933.  That event led many Ger­mans into what the writer Sebasti­an Haffn­er called “sheep­ish sub­missive­ness” — with dis­astrous consequences.

As a young Ger­man law­yer in Ber­lin at the time, Haffn­er wrote in his diary one day after the Reich­stag fire that Ger­mans had suffered a nervous break­down.  “No one saw any­thing out of the ordin­ary in the fact that, from now on, one’s tele­phone would be tapped, one’s let­ters opened, and one’s desk might be broken into.”

What was miss­ing, wrote Haffn­er, was “a sol­id inner ker­nel that can­not be shaken by extern­al pres­sures and forces, some­thing noble and steely, a reserve of pride, prin­ciple, and dig­nity to be drawn on in the hour or trial.”

We are grate­ful that these traits were NOT miss­ing in Bill Bin­ney.  Nor were they miss­ing in Edward Snowden, whose pat­ri­ot­ic risk-tak­ing opened the way for Bill and his col­leagues to expose the col­lect-it-all fan­at­ics and the dam­age they do to pri­vacy everywhere.

What Ed Snowden called “turn­key tyranny” can still be pre­ven­ted.  But this can only hap­pen, if pat­ri­ots like Bill Bin­ney can jolt enough people out of “sheep­ish sub­missive­ness.” Goethe under­stood this 200 years ago when he warned, “No one is more a slave than he who thinks him­self free, but is not.”

Niemand ist mehr Sklave, als der sich für frei hält, ohne es zu sein*.

Presen­ted this 22nd day of Janu­ary 2015 in Ber­lin by admirers of the example set by the late CIA ana­lyst, Sam Adams.

And finally, here are some extra inter­views from the night with Bill Bin­ney, Tom Drake, Jes­selyn Radack, and Coleen Rowley:

With thanks to Ber­lin Moscow on Unter den Linden and the Dreger Group for host­ing the event, to pro­fes­sion­al pho­to­graph­er Johanna Hul­lar for all her great pic­tures of the ceremony.

Privacy as Innovation Interview

A recent inter­view I gave while in Stock­holm to the Pri­vacy as Innov­a­tion project:

privacy_innovation

Keynote at Internetdagarna, Stockholm, November 2014

Here is my key­note speech at the recent Inter­net­dagarna (Inter­net Days) con­fer­ence in Stock­holm, Sweden, dis­cuss­ing all things whis­tleblower, spy, sur­veil­lance, pri­vacy and TTIP:

internetdagarna

Interview on Swedish Aftonbladet TV

I’m cur­rently in Stock­holm to do a key­note tomor­row at the fant­ast­ic Inter­net Days con­fer­ence, an annu­al gath­er­ing organ­ised by Inter­net Infra­struc­ture Found­a­tion.

This morn­ing, I would say at the crack of dawn but it was still dark, I was invited on to Afton­bladet TV to talk about my story, the role of whis­tleblowers, the Sam Adams Award for Integ­rity in Intel­li­gence, and threats to the inter­net. Here is the interview:

Sweden — Afton­bladet TV Inter­view about whis­tleblowers from Annie Machon on Vimeo.

Germans end investigation into Merkel phone tapping

My recent inter­view on RT about the end­ing of the invest­ig­a­tion by the Ger­man author­it­ies into the appar­ently illeg­al bug­ging of Chan­cel­lor Angela Merkel’s phone, plus more on the wider com­pli­city of the Ger­man intel­li­gence services:

rt_merkel_spying

RT interview about GCHQ

Here is my recent inter­view on RT dis­cuss­ing the UK listen­ing post, GCHQ, its pros­ti­tu­tion to Amer­ica’s NSA, and the fail­ure of oversight:

rt_gchq_spying.cleaned