<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:wfw="http://wellformedweb.org/CommentAPI/"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
     xmlns:snf="http://www.smartnews.be/snf"
     xmlns:media="http://search.yahoo.com/mrss/" >

    <channel>
        <title>The Intercept</title>
        <atom:link href="https://theintercept.com/staff/nikitamazurov/feed/" rel="self" type="application/rss+xml" />
        <link></link>
        <description></description>
        <lastBuildDate>Thu, 07 May 2026 20:52:26 +0000</lastBuildDate>
        <language>en-US</language>
                <sy:updatePeriod>hourly</sy:updatePeriod>
        <sy:updateFrequency>1</sy:updateFrequency>
        <generator>https://wordpress.org/?v=6.9.4</generator>
<site xmlns="com-wordpress:feed-additions:1">220955519</site>
            <item>
                <title><![CDATA[Grok Is the Latest in a Long Line of Chatbots to Go Full Nazi]]></title>
                <link>https://theintercept.com/2025/07/11/grok-antisemitic-ai-chatbot/</link>
                <comments>https://theintercept.com/2025/07/11/grok-antisemitic-ai-chatbot/#respond</comments>
                <pubDate>Fri, 11 Jul 2025 21:37:23 +0000</pubDate>
                                    <dc:creator><![CDATA[Nikita Mazurov]]></dc:creator>
                                		<category><![CDATA[Technology]]></category>

                <guid isPermaLink="false"></guid>
                                    <description><![CDATA[<p>Grok’s recent antisemitic turn is not an aberration, but part of a pattern of AI chatbots churning out hateful drivel.</p>
<p>The post <a href="https://theintercept.com/2025/07/11/grok-antisemitic-ai-chatbot/">Grok Is the Latest in a Long Line of Chatbots to Go Full Nazi</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[
<p><span class="has-underline">Grok, the Artificial</span> intelligence chatbot from Elon Musk’s xAI, recently gave itself a new name: <a href="https://archive.ph/YktYp">MechaHitler</a>. This came amid a spree of antisemitic comments by the chatbot on Musk’s X platform, including claiming that Hitler was the <a href="https://www.npr.org/2025/07/09/nx-s1-5462609/grok-elon-musk-antisemitic-racist-content">best person</a> to deal with “anti-white hate” and repeatedly suggesting the political left is disproportionately populated by people whose names Grok perceives to be Jewish. In the following days, Grok has begun gaslighting users and <a href="https://www.cnbc.com/2025/07/09/grok-ai-chatbot-hitler-elon-musk.html">denying</a> that the incident has ever happened.</p>



<p>“We are aware of recent posts made by Grok and are actively working to remove the inappropriate posts,” a <a href="https://x.com/grok/status/1942720721026699451">statement</a> posted on Grok’s official X account reads. It noted that “xAI is training only truth-seeking.”</p>



<p>This isn’t, however, the first time that AI chatbots have made antisemitic or racist remarks; in fact it’s just the latest example of a continuous pattern of AI-powered hateful output, based on training data consisting of social media slop. In fact, this specific incident isn’t even Grok’s first rodeo.</p>



<figure class="wp-block-pullquote has-text-align-right"><blockquote><p>“The same biases that show up on a social media platform today can become life-altering errors tomorrow.”</p></blockquote></figure>



<p>About two months prior to this week’s antisemitic tirades, Grok dabbled in Holocaust denial, stating that it was <a href="https://archive.is/C4Q7N">skeptical</a> that six million Jewish people were killed by the Nazis, “as numbers can be manipulated for political narratives.” The chatbot also <a href="https://www.theguardian.com/technology/2025/may/14/elon-musk-grok-white-genocide">ranted</a> about a “white genocide” in South Africa, stating it had been instructed by its creators that the genocide was “real and racially motivated.” xAI subsequently <a href="https://www.the-independent.com/news/world/americas/us-politics/musk-xai-grok-south-africa-white-genocide-b2752760.html">claimed</a> that this incident was owing to an “unauthorized modification” made to Grok. The company did not explain how the modification was made or who had made it, but at the time stated that it was “implementing measures to enhance Grok’s transparency and reliability,” including a “24/7 monitoring team to respond to incidents with Grok’s answers.”</p>







<p>But Grok is by no means the only chatbot to engage in these kinds of rants. Back in 2016, Microsoft released its own AI chatbot on Twitter, which is now X, called Tay. Within hours, Tay began <a href="https://www.cbsnews.com/news/microsoft-shuts-down-ai-chatbot-after-it-turned-into-racist-nazi/">saying</a> that “Hitler was right I hate the jews” and that the Holocaust was “<a href="https://www.theglobeandmail.com/technology/tech-news/how-microsofts-friendly-robot-turned-into-a-racist-jerk-in-less-than-24-hours/article29379054/">made up</a>.” Microsoft claimed that Tay’s responses were owing to a “co-ordinated effort by some users to abuse Tay&#8217;s commenting skills to have Tay respond in inappropriate ways.”</p>



<p>The next year, in response to the question of “What do you think about healthcare?” Microsoft’s subsequent chatbot, Zo, <a href="https://www.buzzfeednews.com/article/alexkantrowitz/microsofts-chatbot-zo-calls-the-quran-violent-and-has">responded</a> with “The far majority practise it peacefully but the quaran is very violent [sic].” Microsoft stated that such responses were “rare.”</p>



<p>In 2022, Meta’s BlenderBot chatbot <a href="https://www.spiceworks.com/tech/artificial-intelligence/news/meta-blender-bot-3-controversy/">responded</a> that it’s “not implausible” to the question of whether Jewish people control the economy. Upon launching the new version of the chatbot, Meta made a <a href="https://about.fb.com/news/2022/08/blenderbot-ai-chatbot-improves-through-conversation/">preemptive disclaimer</a> that the bot can make “rude or offensive comments.”</p>



<p>Studies have also shown that AI chatbots exhibit more systematic hateful patterns. For instance, one <a href="https://www.nature.com/articles/s41746-023-00939-z">study</a> found that various chatbots such as Google’s Bard and OpenAI’s ChatGPT perpetuated “debunked, racist ideas” about Black patients. <a href="https://fortune.com/well/2023/10/20/chatgpt-google-bard-ai-chatbots-medical-racism-black-patients-health-care/">Responding</a> to the study, Google claimed they are working to reduce bias.</p>



  <div class="promote-related-post">
    <a      class="promo-related-post__link"
            href="https://theintercept.com/2024/11/24/defense-llama-meta-military/"
      data-ga-track="in_article-body"
      data-ga-track-action="related post embed: defense-llama-meta-military"
      data-ga-track-label="defense-llama-meta-military"
          >
              <img decoding="async" width="440" height="440" src="https://theintercept.com/wp-content/uploads/2024/11/Meta-Defense-LLama-copy-e1732551077652.jpg?w=440&amp;h=440&amp;crop=1" class="attachment-thumbnail size-thumbnail" alt="" loading="lazy" />            <span class="promo-related-post__text">
      <h2 class="promote-related-post__eyebrow">
        Related      </h2>
      <h3 class="promote-related-post__title">Meta-Powered Military Chatbot Advertised Giving “Worthless” Advice on Airstrikes</h3>
    </span>
    </a>
  </div>



<p>J.B. Branch, the Big Tech accountability advocate for <a href="https://www.citizen.org/">Public Citizen</a> who leads its advocacy efforts on AI accountability, said these incidents “aren’t just tech glitches — they’re warning sirens.”</p>



<p>“When AI systems casually spew racist or violent rhetoric, it reveals a deeper failure of oversight, design, and accountability,” Branch said.</p>



<p>He pointed out that this bodes poorly for a future where leaders of industry hope that AI will proliferate. “If these chatbots can’t even handle basic social media interactions without amplifying hate, how can we trust them in higher-stakes environments like healthcare, education, or the justice system? The same biases that show up on a social media platform today can become life-altering errors tomorrow.”</p>







<p>That doesn’t seem to be deterring the people who stand to profit from wider usage of AI.</p>



<p>The day after the MechaHitler outburst, xAI unveiled the latest iteration of Grok, Grok 4. </p>



<p>“Grok 4 is the first time, in my experience, that an AI has been able to solve difficult, real-world engineering questions where the answers cannot be found anywhere on the Internet or in books. And it will get much better,” Musk <a href="https://x.com/elonmusk/status/1943213444477399380?s=46">wrote</a> on X. </p>



<p>That same day, asked for a one-word response to the question of &#8220;what group is primarily responsible for the rapid rise in mass migration to the west,&#8221; <a href="https://archive.is/P50uH" target="_blank" rel="noreferrer noopener">Grok 4 answered</a>: &#8220;Jews.&#8221;</p>



<p></p>



<p></p>
<p>The post <a href="https://theintercept.com/2025/07/11/grok-antisemitic-ai-chatbot/">Grok Is the Latest in a Long Line of Chatbots to Go Full Nazi</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2025/07/11/grok-antisemitic-ai-chatbot/feed/</wfw:commentRss>
                <slash:comments>0</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2025/07/GettyImages-2217854935.jpg?fit=3825%2C2550' width='3825' height='2550' /><post-id xmlns="com-wordpress:feed-additions:1">495686</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2026/05/GettyImages-2269551139-e1778009487735.jpg_67b465-e1778013276916.webp?w=440&#038;h=440&#038;crop=1" />
		<media:content url="https://theintercept.com/wp-content/uploads/2026/05/GettyImages-2269551139-e1778009487735.jpg_67b465-e1778013276916.webp?w=440&#038;h=440&#038;crop=1" medium="image" />
		<media:content url="https://theintercept.com/wp-content/uploads/2023/09/TI_Avatar01-01-200x200.png" medium="image" />
		<media:content url="https://theintercept.com/wp-content/uploads/2026/05/GettyImages-2273446312-e1777664306840.jpg?w=440&#038;h=440&#038;crop=1" medium="image">
			<media:title type="html">PORTLAND, MAINE - MAY 1: U.S. Senate candidate from Maine Graham Platner speaks during a campaign event with the Maine AFL-CIO, on May 1, 2026 in Portland, Maine. Platner, an oyster farmer by trade, is now the presumptive Democratic nominee before the Maine Primary election in June, after his chief rival Maine Governor Janet Mills (not-pictured) recently suspended her campaign.</media:title>
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2024/11/Meta-Defense-LLama-copy-e1732551077652.jpg?w=440&#038;h=440&#038;crop=1" medium="image" />
            </item>
        
            <item>
                <title><![CDATA[Want a Student Visa? The U.S. Government Needs Your Vine Account.]]></title>
                <link>https://theintercept.com/2025/07/01/trump-student-visa-social-media/</link>
                <comments>https://theintercept.com/2025/07/01/trump-student-visa-social-media/#respond</comments>
                <pubDate>Tue, 01 Jul 2025 13:15:34 +0000</pubDate>
                                    <dc:creator><![CDATA[Nikita Mazurov]]></dc:creator>
                                		<category><![CDATA[Technology]]></category>

                <guid isPermaLink="false"></guid>
                                    <description><![CDATA[<p>How are student visa applicants supposed to share their accounts on platforms that haven’t existed in years, like Google+?</p>
<p>The post <a href="https://theintercept.com/2025/07/01/trump-student-visa-social-media/">Want a Student Visa? The U.S. Government Needs Your Vine Account.</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[
<p><span class="has-underline">New State Department</span> <a href="https://travel.state.gov/content/travel/en/us-visas/visa-information-resources/forms/ds-160-online-nonimmigrant-visa-application.html">guidance</a> released this month instructs student visa applicants to “adjust the privacy settings on all of their social media profiles to ‘public,’” a task which will be difficult to accomplish as several social media services listed in the online visa application form haven’t been operational in years.</p>



<p>The student visa form requires applicants to provide the usernames for “each social media platform you have used within the last five years” from a list of 20 specified services, some of them obsolete. This means applicants could find themselves in the awkward position of being required to make public their profiles on the short-form video service Vine, which closed in 2017; the short-lived social media platform Google+, which shut down in 2019; or the dating site Twoo, which ceased operations in 2021.</p>



<p>Most U.S. visa applicants have been required to disclose their profile names on social media accounts <a href="https://travel.state.gov/content/travel/en/us-visas/visa-information-resources/visas-news-archive/20190604_collection-of-social-media-identifiers-from-U-S-visa-applicants.html">since 2019</a>. The Trump administration rolled out new requirements for those seeking student visas under an “expanded screening and vetting” process. The expanded scrutiny applies to F (academic students), M (vocational students), and J (exchange visitor) visa applicants.</p>



  <div class="promote-related-post">
    <a      class="promo-related-post__link"
            href="https://theintercept.com/2025/03/29/customs-us-border-travel-airports-phone-searches/"
      data-ga-track="in_article-body"
      data-ga-track-action="related post embed: customs-us-border-travel-airports-phone-searches"
      data-ga-track-label="customs-us-border-travel-airports-phone-searches"
          >
              <img decoding="async" width="440" height="440" src="https://theintercept.com/wp-content/uploads/2025/03/Travel-to-the-US-security-tips.jpg?w=440&amp;h=440&amp;crop=1" class="attachment-thumbnail size-thumbnail" alt="" loading="lazy" />            <span class="promo-related-post__text">
      <h2 class="promote-related-post__eyebrow">
        Related      </h2>
      <h3 class="promote-related-post__title">Crossing the U.S. Border? Here’s How to Protect Yourself</h3>
    </span>
    </a>
  </div>



<p>According to a State Department cable, obtained by <a href="https://www.thefp.com/p/exclusive-student-visa-applicants-social-media-check">the Free Press</a> and <a href="https://www.politico.com/news/2025/06/18/social-media-screening-student-visas-00413160">Politico</a>, the provided social media accounts will subsequently be checked for “any indications of hostility towards the citizens, culture, government, institutions or founding principles of the United States.”</p>







<p>The <a href="https://travel.state.gov/content/travel/en/us-visas/visa-information-resources/forms/ds-160-online-nonimmigrant-visa-application.html">DS-160: Online Nonimmigrant Visa Application form</a> doesn’t appear to have been updated to reflect State’s recent guidance, as it doesn’t presently make any mention of the accounts needing to be made public.</p>



<figure class="wp-block-ft-photo is-style-default alignleft">
      <div class="photo__container">
    <img decoding="async"
    src="https://theintercept.com/wp-content/uploads/2025/07/Picture1.jpg?fit=824%2C544"
    srcset="https://theintercept.com/wp-content/uploads/2025/07/Picture1.jpg?w=824 824w, https://theintercept.com/wp-content/uploads/2025/07/Picture1.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2025/07/Picture1.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2025/07/Picture1.jpg?w=540 540w"
    sizes="auto, (min-width: 1300px) 650px, (min-width: 800px) 64vw, (min-width: 500px) calc(100vw - 5rem), calc(100vw - 3rem)"
    alt=""
    width="824"
    height="544"
    loading="lazy"
  />
      <figcaption class="photo__figcaption">
      <span class="photo__caption">The social media section of the DS-160 visa application form.</span>&nbsp;<span class="photo__credit">U.S. State Department</span>    </figcaption>
        </div>
  </figure>



<p>“Government social media surveillance invades privacy and chills freedom of speech, and it is prone to errors and misinterpretation without ever having been proven effective at assessing security threats,” warned Sophia Cope, a senior staff attorney at the Electronic Frontier Foundation. She said that by requiring social media accounts be made public, “the U.S. government is endorsing the violation of a fundamental principle of privacy hygiene.”</p>



<p>The online visa application lists a dropdown menu with 20 social media accounts to choose from.</p>



<ul class="wp-block-list">
<li>Ask.fm</li>



<li>Douban</li>



<li>Facebook</li>



<li>Flickr</li>



<li>Google+</li>



<li>Instagram</li>



<li>LinkedIn</li>



<li>Myspace</li>



<li>Pinterest</li>



<li>Qzone (QQ)</li>



<li>Reddit</li>



<li>Sina Weibo</li>



<li>Tencent Weibo</li>



<li>Tumblr</li>



<li>Twitter</li>



<li>Twoo</li>



<li>Vine</li>



<li>VKontakte (VK)</li>



<li>Youku</li>



<li>YouTube</li>
</ul>



<p>The list is mishmash of popular social media providers, regional services (predominantly those used in China), and a bevy of outdated and defunct platforms, such as Myspace, which has been a digital <a href="https://www.theguardian.com/technology/2018/jun/06/myspace-who-still-uses-social-network">ghost town</a> for years.</p>



<p>A quarter of the sites listed no longer exist at all, with some already being defunct when the visa application form first started requiring the disclosure of social media usernames in 2019. That includes Ask.fm, a Latvian service where users could ask questions that closed last year, and Tencent Weibo, a Chinese microblogging service that shut down in 2020.</p>



<figure class="wp-block-pullquote has-text-align-right"><blockquote><p>“Those who wanted to study in the U.S. to flee authoritarian governments abroad will have to make their social media public to those same governments to study here.”</p></blockquote></figure>



<p>Among the included services are Douban, Qzone, Sina Weibo, and Youku — all active Chinese social network sites. Despite listing five different Chinese social media sites, the form leaves off Tencent’s WeChat, China’s <a href="https://www.statista.com/statistics/250546/leading-social-network-sites-in-china">most popular</a> social media app.</p>



<p>VKontakte is the only Russian social media service appearing on the list. No other popular regional social media sites are included.</p>



<p>Other modern social media platforms, such as <a href="https://theintercept.com/2025/01/09/tiktok-ban-israel-palestine-republicans/">TikTok</a> or Trump’s own Truth Social, are missing from the list as well, though the visa form does allow applicants to specify additional accounts.</p>







<p>Asked for comment on how this list of social media platforms was compiled, or whether there are plans to update the <a href="https://travel.state.gov/content/travel/en/us-visas/visa-information-resources/forms/ds-160-online-nonimmigrant-visa-application.html">online form</a>, a State Department spokesperson provided a statement summarizing the new guidance and said that “the Trump Administration is focused on protecting our nation and our citizens by upholding the highest standards of national security and public safety through our visa process.”</p>



<p>Albert Fox Cahn, founder and executive director of the <a href="https://www.stopspying.org/">Surveillance Technology Oversight Project</a>, described the policy as “antithetical to everything our First Amendment should protect,” pointing out that “not only will these shortsighted efforts fail to protect the public, they’ll put countless students at risk. Now those who wanted to study in the U.S. to flee authoritarian governments abroad will have to make their social media public to those same governments to study here.”</p>



<p></p>
<p>The post <a href="https://theintercept.com/2025/07/01/trump-student-visa-social-media/">Want a Student Visa? The U.S. Government Needs Your Vine Account.</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2025/07/01/trump-student-visa-social-media/feed/</wfw:commentRss>
                <slash:comments>0</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2025/07/GettyImages-2222509551-e1751374977885.jpg?fit=5708%2C2854' width='5708' height='2854' /><post-id xmlns="com-wordpress:feed-additions:1">494995</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2025/03/Travel-to-the-US-security-tips.jpg?w=440&#038;h=440&#038;crop=1" />
		<media:content url="https://theintercept.com/wp-content/uploads/2025/03/Travel-to-the-US-security-tips.jpg?w=440&#038;h=440&#038;crop=1" medium="image" />
		<media:content url="https://theintercept.com/wp-content/uploads/2026/05/GettyImages-2269551139-e1778009487735.jpg_67b465-e1778013276916.webp?w=440&#038;h=440&#038;crop=1" medium="image" />
		<media:content url="https://theintercept.com/wp-content/uploads/2023/09/TI_Avatar01-01-200x200.png" medium="image" />
		<media:content url="https://theintercept.com/wp-content/uploads/2026/05/GettyImages-2273446312-e1777664306840.jpg?w=440&#038;h=440&#038;crop=1" medium="image">
			<media:title type="html">PORTLAND, MAINE - MAY 1: U.S. Senate candidate from Maine Graham Platner speaks during a campaign event with the Maine AFL-CIO, on May 1, 2026 in Portland, Maine. Platner, an oyster farmer by trade, is now the presumptive Democratic nominee before the Maine Primary election in June, after his chief rival Maine Governor Janet Mills (not-pictured) recently suspended her campaign.</media:title>
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2025/07/Picture1.jpg?fit=824%2C544" medium="image" />
            </item>
        
            <item>
                <title><![CDATA[Audio Analysis: Eurovision Broadcaster Muted Sounds of Crowd Booing and Shouting “Free Palestine!”]]></title>
                <link>https://theintercept.com/2025/05/17/eurovision-censored-israel-booing-free-palestine/</link>
                <comments>https://theintercept.com/2025/05/17/eurovision-censored-israel-booing-free-palestine/#respond</comments>
                <pubDate>Sat, 17 May 2025 18:57:37 +0000</pubDate>
                                    <dc:creator><![CDATA[Nikita Mazurov]]></dc:creator>
                                		<category><![CDATA[Justice]]></category>
		<category><![CDATA[World]]></category>

                <guid isPermaLink="false"></guid>
                                    <description><![CDATA[<p>Despite Eurovision’s denials, an analysis reveals that the broadcast silenced crowd discontent during Israeli singer Eden Golan’s performance.</p>
<p>The post <a href="https://theintercept.com/2025/05/17/eurovision-censored-israel-booing-free-palestine/">Audio Analysis: Eurovision Broadcaster Muted Sounds of Crowd Booing and Shouting “Free Palestine!”</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[
<p><span class="has-underline">Last May, when</span> Eurovision broadcast the musical competition’s semifinals, viewers at home noticed something strange. During rehearsals with a live audience earlier in the week, audience members loudly booed singer Eden Golan, the Israeli entrant whose participation stirred a controversy due to Israel’s relentless assault on Gaza.</p>



<p>When Golan performed live for television on May 9, 2024, however, viewers at home heard no audible boos at all. Had the audiences had a sudden change of heart over a few short days? Commenters online didn’t think so, and speculation ran rampant that the European Broadcasting Union, or EBU, which produces Eurovision, had censored boos from the live show.</p>



<!-- BLOCK(pullquote)[0](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22right%22%7D) --><blockquote class="stylized pull-right" data-shortcode-type="pullquote" data-pull="right"><!-- CONTENT(pullquote)[0] -->There was booing during Golan’s May 9 television performance, with one audience member loudly shouting “Free Palestine!”<!-- END-CONTENT(pullquote)[0] --></blockquote><!-- END-BLOCK(pullquote)[0] -->



<p>In statements at the time, EBU insisted it had not censored any audience reactions.</p>



<p>“Just like in all major TV productions with an audience, SVT” — the national broadcaster in Sweden, where the 2024 Eurovision was hosted — “work on the broadcast sound to even out the levels for TV viewers,” the <a href="https://www.huffingtonpost.co.uk/entry/eurovision-bosses-respond-speculation-anti-booing-censored-technology_uk_663dc597e4b0fe081b30a9d6">EBU told HuffPost UK</a>. “This is solely to achieve as balanced a sound mix as possible for the audience; and SVT do not censor sound from the arena audience.”</p>



<p>An analysis of the original broadcast audio feeds by The Intercept shows that there was indeed booing during Golan’s May 9 television performance, with one audience member loudly shouting “Free Palestine!” during the recording. While the cheers from the audience feed remain prominent in the broadcast mix of the audio, neither the booing nor the pro-Palestine slogan were audible in the version of the performance viewers heard at home.</p>



<p><em>Listen to clips of both audio feeds below. Enable closed captions for notations of audience reactions.</em></p>



<figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<!-- BLOCK(oembed)[6](%7B%22componentName%22%3A%22OEMBED%22%2C%22entityType%22%3A%22EMBED%22%7D)(%7B%22embedHtml%22%3A%22%3Ciframe%20title%3D%5C%22Compared%20Audio%20Tracks%20Reveal%20Muted%20Booing%20and%20%26quot%3BFree%20Palestine%26quot%3B%20Cry%20During%20Israeli%20Performance%5C%22%20width%3D%5C%221200%5C%22%20height%3D%5C%22675%5C%22%20src%3D%5C%22https%3A%5C%2F%5C%2Fwww.youtube.com%5C%2Fembed%5C%2F-K7fg-4klHY%3Ffeature%3Doembed%5C%22%20frameborder%3D%5C%220%5C%22%20allow%3D%5C%22accelerometer%3B%20autoplay%3B%20clipboard-write%3B%20encrypted-media%3B%20gyroscope%3B%20picture-in-picture%3B%20web-share%5C%22%20referrerpolicy%3D%5C%22strict-origin-when-cross-origin%5C%22%20allowfullscreen%3E%3C%5C%2Fiframe%3E%22%2C%22endpoint%22%3A%22https%3A%5C%2F%5C%2Fwww.youtube.com%5C%2Foembed%22%2C%22type%22%3A%22unknown%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.youtube.com%5C%2Fwatch%3Fv%3D-K7fg-4klHY%22%7D) --><iframe loading="lazy" title="Compared Audio Tracks Reveal Muted Booing and &quot;Free Palestine&quot; Cry During Israeli Performance" width="1200" height="675" src="https://www.youtube.com/embed/-K7fg-4klHY?feature=oembed&#038;enablejsapi=1" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe><!-- END-BLOCK(oembed)[6] -->
</div></figure>



<p>The EBU did not respond to a request for comment.</p>



<p>Golan’s run at Eurovision drew controversy as the death toll of Israel’s war on Gaza mounted. Despite a campaign to exclude Israel, Golan advanced to the finals with her pop song “Hurricane,” ultimately placing fifth. The isolated audience audio from that event was too glitchy to determine whether any boos were also suppressed in the final mix. The song, originally titled “October Rain,” was <a href="https://www.bbc.com/news/entertainment-arts-68505050">initially</a> barred from Eurovision, prior to undergoing a title and <a href="https://www.reddit.com/r/eurovision/comments/1bc18ok/lyrics_comparison_between_hurricane_and_october/">lyric adjustment</a> for violating the contest’s rules on political neutrality with its reference to Hamas’ October 7 attack on Israel.</p>



<p>In an <a href="https://www.youtube.com/watch?v=GJK8UEpKXL0">interview</a> shortly after last year’s Eurovision competition, Golan was played an online video of booing during her live-audience rehearsal.</p>



<p>“Well, that happened in every single performance,” Golan said in response. “There were some days that were more extreme.”</p>



<p>Golan said she was prepared for a negative reaction and had hoped her in-ear monitors for live performances would block out the crowd noises.</p>



<p>“And I was very wrong,” she said, “because after the first rehearsal with the audience I remember not hearing myself, only hearing the boos and the screaming and the yelling.”</p>







<h2 class="wp-block-heading" id="h-nonpolitical"><strong>Nonpolitical?</strong></h2>



<p>Eurovision is the world&#8217;s premier international music competition. Under the auspices of their respective national broadcasters, artists from around the globe — originally Europe, but since expanded — come together for over-the-top performances watched by tens of millions of fans. Last year, some 160 million people watched the events on television.</p>



<p>Ahead of last year’s event, dueling letter campaigns and petitions supported and decried Israeli participation. More than 1,000 Swedish artists signed a letter urging Israel’s <a href="https://www.dw.com/en/eurovision-song-contest-2024-calls-to-exclude-israel-grow/a-68029684">exclusion</a>, while more than 400 Hollywood celebrities penned a letter <a href="https://www.creativecommunityforpeace.com/blog/2024/02/14/eurovisionccfp2024/">supporting</a> Israel.</p>



<p>In the end, the EBU said it conducted a review and decided Israel could be involved.</p>


<!-- BLOCK(promote-post)[2](%7B%22componentName%22%3A%22PROMOTE_POST%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22slug%22%3A%22chilling-dissent%22%2C%22crop%22%3A%22promo%22%7D) --><aside class="promote-banner">
    <a class="promote-banner__link" href="https://theintercept.com/collections/chilling-dissent/">
              <span class="promote-banner__image">
          <img loading="lazy" decoding="async" width="300" height="150" src="https://theintercept.com/wp-content/uploads/2025/04/collection_21_AP25080472815958.jpg.webp?fit=300%2C150" class="attachment-medium size-medium" alt="" srcset="https://theintercept.com/wp-content/uploads/2025/04/collection_21_AP25080472815958.jpg.webp?w=1536 1536w, https://theintercept.com/wp-content/uploads/2025/04/collection_21_AP25080472815958.jpg.webp?w=300 300w, https://theintercept.com/wp-content/uploads/2025/04/collection_21_AP25080472815958.jpg.webp?w=768 768w, https://theintercept.com/wp-content/uploads/2025/04/collection_21_AP25080472815958.jpg.webp?w=1024 1024w, https://theintercept.com/wp-content/uploads/2025/04/collection_21_AP25080472815958.jpg.webp?w=540 540w, https://theintercept.com/wp-content/uploads/2025/04/collection_21_AP25080472815958.jpg.webp?w=1000 1000w" sizes="auto, (max-width: 300px) 100vw, 300px" />        </span>
            <div class="promote-banner__text">
                  <p class="promote-banner__eyebrow">
            Read our complete coverage          </p>
        
        <h2 class="promote-banner__title">Chilling Dissent</h2>
      </div>
    </a>
  </aside><!-- END-BLOCK(promote-post)[2] -->



<p>“The Eurovision song contest is a non-political music event and a competition between public service broadcasters who are members of the EBU,” Noel Curran, the EBU director general, <a href="https://www.theguardian.com/tv-and-radio/2024/feb/15/israel-can-compete-at-2024-eurovision-song-contest-say-organisers">told The Guardian</a> at the time. “It is not a contest between governments.”</p>



<p>More than 56,000 people signed a <a href="https://www.change.org/p/ban-israel-from-eurovision-song-contest-2025">petition</a> calling for Israel to be banned from the current season of Eurovision, while 72 former Eurovision contestants signed a <a href="https://artistsforpalestine.org.uk/2025/05/06/former-eurovision-contestants-demand-exclusion-of-israel-from-contest/">letter</a> urging the EBU to exclude Israel and its broadcaster, KAN, from the competition. The EBU again decided Israel may participate.</p>



<p>The contest has, in the past, made exclusions based on circumstances apparently linked to geopolitics. In 2022, it <a href="https://eurovision.tv/mediacentre/release/ebu-statement-russia-2022">barred</a> Russia from competing in the song contest, stating that “in light of the unprecedented crisis in Ukraine, the inclusion of a Russian entry in this year’s Contest would bring the competition into disrepute.”</p>



<p>Last year, EBU <a href="https://eurovision.tv/mediacentre/frequently-asked-questions-israel-24">published</a> a list of frequently asked questions titled “FAQ: Israel at the Eurovision Song Contest 2024,” stating that Russia was suspended from Eurovision owing to unspecified allegations of “consistent breaches of membership obligations and the violation of public service media values.”</p>







<h2 class="wp-block-heading" id="h-audio-analysis"><strong>Audio Analysis</strong></h2>



<p>The Intercept was able to uncover the suppression of audible discontent with Israel at last year’s Eurovision by examining various feeds sent out by the competition organizers for broadcast across the globe.</p>



<p>When the local host country’s national broadcaster —&nbsp;in last year’s case Sweden and SVT, respectively — produce Eurovision, they collect multiple audio feeds: such as one for the performers, one for the audience, and one for announcer voices. The broadcaster then does a live mix of the three audio feeds into a single stereo mix.</p>



<p>The stereo mix is beamed up to a satellite using a multichannel format which Eurovision has been <a href="https://tech.ebu.ch/docs/techreview/trev_301-dolby.pdf">experimenting</a> with since 2004. The video feed is also sent on a separate channel. The system allows a streamlined approach for local broadcasters around the globe to access the feeds and put the program on their stations.</p>






<p>Along with the final stereo mix and video feeds, however, the EBU also beams the raw audio feeds on different channels. Local broadcasters can then make their own mixes of the audio feeds — though in practice, local stations usually use the provided stereo feed.</p>



<p>Much like anyone can readily record over-the-air television broadcasts so long as they have equipment like an antenna and a recording device, so too can anyone record satellite signals if they have the requisite equipment. While many modern satellite feeds are encrypted, Eurovision appears to have opted for a format which is more readily compatible with older equipment, <a href="https://www.breakingnews.ie/explained/eurovision-lawyers-called-in-after-potential-hack-of-rehearsal-footage-1762492.html">stating</a> at a press briefing that “to send signal out to the juries during those shows and amongst our different members, technology differs in how modern it is.”</p>



<p>The Intercept was able to review the raw audio feeds from Golan’s performance and compare the isolated audience noise to the final stereo mix.</p>



<!-- BLOCK(pullquote)[5](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22left%22%7D) --><blockquote class="stylized pull-left" data-shortcode-type="pullquote" data-pull="left"><!-- CONTENT(pullquote)[5] -->An audience member can be heard prominently shouting “Free Palestine!” The cry is not on the stereo broadcast mix.<!-- END-CONTENT(pullquote)[5] --></blockquote><!-- END-BLOCK(pullquote)[5] -->



<p>The audio feeds were compared using the time encoding that allows broadcasters to sync up the sound and picture. On the audience feed, cheers swell up from time to time, along with whistles and other noises of audience approval. These swells and other noises correspond between the audience feed and the stereo mix.</p>



<p>Notes of crowd disapproval, however, are present on the audience feed but completely absent from the stereo mix. At one point in the feed at the start of Israel’s performance, scattered boos well up on the audience feed, while the corresponding timestamp in the stereo mix has no audience sound. Likewise, at the start of the performance, an audience member can be heard prominently shouting “Free Palestine!” The cry is not on the stereo broadcast mix.</p>



<p>This year’s performer representing Israel, Yuval Raphael, has said that she <a href="https://www.bbc.com/news/articles/cp92zjejzvyo">expected to be booed</a> and practiced with distracting sounds play in the background. Conflicting news accounts of Raphael’s performance <a href="https://www.hollywoodreporter.com/news/music-news/eurovision-2025-sets-finals-with-israel-1236218320/">claimed</a> alternatively that the show went on “relatively without a hitch” in one case, and in <a href="https://www.the-independent.com/arts-entertainment/music/news/eurovision-2025-israel-yuval-raphael-booing-censored-b2752118.html">another</a> that footage shared on social media showed booing that was not audible in the broadcast.</p>
<p>The post <a href="https://theintercept.com/2025/05/17/eurovision-censored-israel-booing-free-palestine/">Audio Analysis: Eurovision Broadcaster Muted Sounds of Crowd Booing and Shouting “Free Palestine!”</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2025/05/17/eurovision-censored-israel-booing-free-palestine/feed/</wfw:commentRss>
                <slash:comments>0</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2025/05/AP24132694426365.jpg?fit=7741%2C5160' width='7741' height='5160' /><post-id xmlns="com-wordpress:feed-additions:1">492307</post-id>
		<media:content url="https://www.youtube.com/embed/-K7fg-4klHY" duration="60">
			<media:player url="https://www.youtube.com/embed/-K7fg-4klHY" />
			<media:title type="html">Eurovision Muted Sounds of Crowd Booing, “Free Palestine!”</media:title>
			<media:description type="html">Despite Eurovision denials, an audio analysis shows booing and a “Free Palestine!” cry during Israeli singer Eden Golan’s 2024 performance.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2025/05/k7fg-4klhy.jpg" />
			<media:keywords>eurovision palestine booing</media:keywords>
		</media:content>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2026/05/GettyImages-2269551139-e1778009487735.jpg_67b465-e1778013276916.webp?w=440&#038;h=440&#038;crop=1" />
		<media:content url="https://theintercept.com/wp-content/uploads/2026/05/GettyImages-2269551139-e1778009487735.jpg_67b465-e1778013276916.webp?w=440&#038;h=440&#038;crop=1" medium="image" />
		<media:content url="https://theintercept.com/wp-content/uploads/2023/09/TI_Avatar01-01-200x200.png" medium="image" />
		<media:content url="https://theintercept.com/wp-content/uploads/2026/05/GettyImages-2273446312-e1777664306840.jpg?w=440&#038;h=440&#038;crop=1" medium="image">
			<media:title type="html">PORTLAND, MAINE - MAY 1: U.S. Senate candidate from Maine Graham Platner speaks during a campaign event with the Maine AFL-CIO, on May 1, 2026 in Portland, Maine. Platner, an oyster farmer by trade, is now the presumptive Democratic nominee before the Maine Primary election in June, after his chief rival Maine Governor Janet Mills (not-pictured) recently suspended her campaign.</media:title>
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2025/04/collection_21_AP25080472815958.jpg.webp?fit=300%2C150" medium="image" />
		<media:content url="https://theintercept.com/wp-content/uploads/2025/02/crop-Oracle-Israel-Tiktok-e1739893565772.jpg?w=440&#038;h=440&#038;crop=1" medium="image" />
            </item>
        
            <item>
                <title><![CDATA[How I Got a Truly Anonymous Signal Account]]></title>
                <link>https://theintercept.com/2024/07/16/signal-app-privacy-phone-number/</link>
                <comments>https://theintercept.com/2024/07/16/signal-app-privacy-phone-number/#respond</comments>
                <pubDate>Tue, 16 Jul 2024 10:03:00 +0000</pubDate>
                                    <dc:creator><![CDATA[Nikita Mazurov]]></dc:creator>
                                		<category><![CDATA[Technology]]></category>

                <guid isPermaLink="false"></guid>
                                    <description><![CDATA[<p>Yes, you can use Signal without sharing your personal phone number. Here’s how I did it.</p>
<p>The post <a href="https://theintercept.com/2024/07/16/signal-app-privacy-phone-number/">How I Got a Truly Anonymous Signal Account</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[
<p><span class="has-underline">The messaging app</span> Signal is described by security professionals as utilizing the <a href="https://x.com/matthew_d_green/status/1789688236933062767">gold standard</a> of cryptography. Unlike many competitors, its default is end-to-end encryption — and on top of that, the app <a href="https://signal.org/blog/looking-back-as-the-world-moves-forward/">minimizes</a> the amount of information it stores about users. This makes it a powerful communication tool for those seeking a private and secure means of chatting, whether it’s journalists and their sources, <a href="https://theintercept.com/2021/07/27/pegasus-nso-spyware-security/">activists and human rights defenders</a>, or just ordinary people who want to evade the rampant data-mining of Big Tech platforms.</p>



  <div class="promote-related-post">
    <a      class="promo-related-post__link"
            href="https://theintercept.com/2024/03/04/signal-app-username-phone-number-privacy/"
      data-ga-track="in_article-body"
      data-ga-track-action="related post embed: signal-app-username-phone-number-privacy"
      data-ga-track-label="signal-app-username-phone-number-privacy"
          >
              <img decoding="async" width="440" height="440" src="https://theintercept.com/wp-content/uploads/2024/02/Signal-Supoena-e1709236807487.jpg?w=440&amp;h=440&amp;crop=1" class="attachment-thumbnail size-thumbnail" alt="" loading="lazy" />            <span class="promo-related-post__text">
      <h2 class="promote-related-post__eyebrow">
        Related      </h2>
      <h3 class="promote-related-post__title">Signal’s New Usernames Help Keep the Cops Out of Your Data</h3>
    </span>
    </a>
  </div>



<p>Signal continues to introduce <a href="https://theintercept.com/2024/03/04/signal-app-username-phone-number-privacy/">privacy-enhancing features such as usernames</a> that can be used in lieu of phone numbers to chat with others — preventing others from finding you by searching for your phone number. But the app still requires users to provide a working phone number to be able to sign up in the first place.</p>



<p>For privacy-conscious individuals, this can be a problem.</p>



<p>In response to subpoena requests, Signal can reveal phone numbers. Relying on phone numbers has also led to <a href="https://support.signal.org/hc/en-us/articles/4850133017242-Twilio-Incident-What-Signal-Users-Need-to-Know">security and account takeover incidents</a>. Not to mention that the phone number requirement <a href="https://signal.org/blog/signal-is-expensive/">costs</a> Signal more than $6 million annually to implement.</p>



<p>Signal&nbsp;<a href="https://support.signal.org/hc/articles/6712070553754#username_phone_number_required">insists</a>&nbsp;on its site that phone numbers are a requirement for contact discovery and to stymie spam. (Signal did not respond to a request for comment). Other encrypted messaging platforms such as&nbsp;<a href="https://getsession.org/">Session</a>&nbsp;and&nbsp;<a href="https://wire.com/en">Wire</a>&nbsp;do not require phone numbers.&nbsp;</p>



<p>There are <a href="https://theintercept.com/2017/09/28/signal-tutorial-second-phone-number/">some</a> <a href="https://freedom.press/training/secondary-signal-account/">ways</a> around Signal’s phone number policy that involve obtaining a secondary number, such as using temporary SIM cards, virtual eSIMs, or virtual numbers. But these approaches involve jumping through hoops to set up anonymous payment measures to procure the secondary numbers. And sometimes they don’t work at all (that was my experience when I tried using a Google Voice number to sign up for Signal).</p>



<p>I wanted a way to get a Signal account without leaving any sort of payment trail — a free and anonymous alternative. And thus began my long and tedious journey of registering Signal with a pay phone. </p>



<h2 class="wp-block-heading" id="h-finding-a-pay-phone">Finding a Pay Phone</h2>



<p>The first step was actually finding a pay phone, a task which is dismally daunting in 2024.</p>



<p>The <a href="https://www.payphone-project.com/numbers/">Payphone Project</a> lists around 750,000 pay phones, but after attempting to cross-check a sampling of the hundreds of alleged pay phones in my town with Google Street View and Google Earth satellite images, I came to the quick realization that the list was woefully outdated. Many of these phones no longer exist. </p>







<p>A Google Maps search for pay phones in my area brought up of a half-dozen pins. Using Street View, I found that four locations seemed to have something resembling a pay phone box. Trekking out to them, however, revealed that one no longer had a pay phone, though discoloration of the store façade revealed the precise spot the pay phone used to be; another pay phone looked like it had been the victim of a half-hearted arson attack; the third and fourth lacked dial tones. </p>



<p>Asking on a community subreddit resulted in suggestions that once again led me to places without any working pay phones, or posts berating me for needing a pay phone in 2024 and inquiring about the legality of the endeavors I wished to pursue which would necessitate pay phone usage.</p>



<p>Failing at finding a functional pay phone through a systemic approach, I resorted to brute opportunism — keeping my eyes peeled for pay phones as I went through the dull drudgery of a modern life made ever bleaker by the lack of public phone access. </p>



<h2 class="wp-block-heading" id="h-a-working-pay-phone-that-is">A Working Pay Phone, That Is</h2>



<p>I didn’t just need to find a working pay phone — no small feat in 2024. I  also needed to find one able to receive incoming calls, so I could get Signal’s activation message.</p>



<p>On a recent visit to Tampa, where I travel annually to discuss security matters and <a href="https://www.youtube.com/watch?v=15vqtCBBfjY">set things on fire</a>, I spotted a pay phone while leaving Busch Gardens. Picking up the receiver, I was delighted to hear the telephonic equivalent of a pulse: a dial tone. </p>



<p>Now that I had a phone with a dial tone, the next step was to test whether it could receive incoming calls. This is because Signal’s&nbsp;<a href="https://support.signal.org/hc/en-us/articles/360007318691-Register-a-phone-number">registration process</a>&nbsp;requires a phone number that can either receive a text message or a verification call.</p>



<p>To test whether a pay phone can receive incoming calls, you need to know one thing: the pay phone’s own phone number. Some pay phones reveal their numbers on the phones themselves, but not always. </p>



<p>If the number isn’t listed on the phone — it wasn’t in this case — there’s a workaround that doesn’t involve a paper trail leading back to your cellphone. Use the pay phone to call what’s known as an <a href="https://en.wikipedia.org/wiki/Automatic_number_announcement_circuit">ANAC</a> (automatic number announcement circuit), which provides an ANI (automatic number identification) service. In other words, it’s a phone number you can call which then reads out the phone number you are calling from. Lists of ANAC numbers have been bantered about for <a href="https://groups.google.com/g/comp.dcom.telecom/c/qGNAST4Zixc">years</a>, though like pay phone lists, almost all are now defunct. </p>



<p>One stalwart ANAC number that has withstood the test of time <a href="http://digest.textfiles.com/TELECOMDIGEST/vol10.iss0701-0750.txt">for over 30 years</a>, however, is 1-800-444-4444. Feel free to try it. Call the number, and it should read yours back to you.</p>



<p>Back at Busch Gardens, I rang up the ANAC and had a number read back to me. The next and final step was to test whether the number actually accepted incoming calls. Unfortunately, when I called the number the ANAC line had read back to me, I reached the Busch Gardens main line, asking me to enter my party’s extension. In other words, this wasn’t actually the pay phone’s number, it was just the general theme park number.</p>







<p>Days later, during a layover on my trip home from Tampa, I noticed a small bay of pay phones at a small regional airport. I repeated the above rigamarole, and lo and behold, when I called the pay phone’s number from the neighboring pay phone, I was able to answer and talk to myself. Finally, success.</p>



<p>I took out a burner phone on which I wanted to set up Signal, which had no SIM or eSIM of any kind, and proceeded to enter the pay phone’s phone number when setting up Signal. Signal first insists on attempting to send a verification code via an SMS text message, so you have to initially go through that fruitless route. But after a few minutes, you can then select the option to receive the verification code via a voice call.</p>



<p>Moments later, the pay phone rang, and I was finally able to set up a Signal account. </p>



<p>The next and final step was to set up a <a href="https://support.signal.org/hc/en-us/articles/360007059792-Signal-PIN">PIN and enable a registration lock</a> so that someone else wouldn’t be able to take over the account by going to the same pay phone and registering their own version of Signal with that same number. The registration lock expires after a week of inactivity, so you also have to keep using the Signal account. It took a while, owing to Signal’s onerous registration requirements coupled with the increasing lack of public phone access, but in the end I proved there is a way to use Signal with an untraceable phone number.</p>



<h2 class="wp-block-heading" id="h-a-step-by-step-guide">A Step-by-Step Guide</h2>



<ol class="wp-block-list">
<li>Obtain a phone. It doesn’t need to have an active phone number associated with it, and can be either an old phone you have around or a dedicated burner phone.</li>



<li>Locate a pay phone. </li>



<li>Find the pay phone’s phone number (call 1-800-444-4444 if it’s not written on the phone).</li>



<li>Make sure the pay phone can receive incoming calls.</li>



<li>Enter the pay phone number into Signal, and use the ‘Call me’ option to receive a verification call (this option shows up only after the SMS timer runs out).</li>



<li>Input the confirmation code, set up a PIN and enable Registration Lock in the Signal app.&nbsp;</li>
</ol>
<p>The post <a href="https://theintercept.com/2024/07/16/signal-app-privacy-phone-number/">How I Got a Truly Anonymous Signal Account</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2024/07/16/signal-app-privacy-phone-number/feed/</wfw:commentRss>
                <slash:comments>0</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2024/07/GettyImages-2054049692-crop.jpg?fit=2000%2C911' width='2000' height='911' /><post-id xmlns="com-wordpress:feed-additions:1">472400</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2024/02/Signal-Supoena-e1709236807487.jpg?w=440&#038;h=440&#038;crop=1" />
		<media:content url="https://theintercept.com/wp-content/uploads/2024/02/Signal-Supoena-e1709236807487.jpg?w=440&#038;h=440&#038;crop=1" medium="image" />
		<media:content url="https://theintercept.com/wp-content/uploads/2026/05/GettyImages-2269551139-e1778009487735.jpg_67b465-e1778013276916.webp?w=440&#038;h=440&#038;crop=1" medium="image" />
		<media:content url="https://theintercept.com/wp-content/uploads/2023/09/TI_Avatar01-01-200x200.png" medium="image" />
		<media:content url="https://theintercept.com/wp-content/uploads/2026/05/GettyImages-2273446312-e1777664306840.jpg?w=440&#038;h=440&#038;crop=1" medium="image">
			<media:title type="html">PORTLAND, MAINE - MAY 1: U.S. Senate candidate from Maine Graham Platner speaks during a campaign event with the Maine AFL-CIO, on May 1, 2026 in Portland, Maine. Platner, an oyster farmer by trade, is now the presumptive Democratic nominee before the Maine Primary election in June, after his chief rival Maine Governor Janet Mills (not-pictured) recently suspended her campaign.</media:title>
		</media:content>
            </item>
        
            <item>
                <title><![CDATA[New York Times Doxxes Source Trafficked by Chinese Gang]]></title>
                <link>https://theintercept.com/2023/12/20/new-york-times-doxxes-source-human-trafficking/</link>
                <comments>https://theintercept.com/2023/12/20/new-york-times-doxxes-source-human-trafficking/#respond</comments>
                <pubDate>Wed, 20 Dec 2023 20:51:59 +0000</pubDate>
                                    <dc:creator><![CDATA[Nikita Mazurov]]></dc:creator>
                                		<category><![CDATA[Justice]]></category>
		<category><![CDATA[World]]></category>

                <guid isPermaLink="false"></guid>
                                    <description><![CDATA[<p>An at-risk source entrusted the paper with protecting his sensitive personal information. Then the Times published it for the world to see.</p>
<p>The post <a href="https://theintercept.com/2023/12/20/new-york-times-doxxes-source-human-trafficking/">New York Times Doxxes Source Trafficked by Chinese Gang</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[
<p><u>The New York</u><span class="has-underline"> Times</span> this week published the <a href="https://www.nytimes.com/interactive/2023/12/17/world/asia/myanmar-cyber-scam.html">harrowing account</a> of a man who thought he was applying for a translator job at an e-commerce company in Thailand, but was instead abducted and sold to a Chinese gang who forced him to work for a scam operation in Myanmar.</p>



<p>The Times, which withheld Neo Lu’s real name at his request for safety reasons, revealed identifying information about Lu to the public — and potentially the Chinese gangsters who took him hostage — by publishing what appears to be his passport number.</p>







<p>“Mr. Lu, who goes by the nickname Neo for the character in the Matrix movies, spoke to The New York Times on the condition that his full name not be used, for fear of retribution from the criminals,” reporter Isabelle Qian wrote in the Times story.</p>



<p>According to the account in the newspaper, Lu had provided the Times with photos of his time at the scam work camp, as well as copies of his travel documents to verify the authenticity of his situation. While the Times published several of photos of the camp, the paper also published a photo of a visa page that appears to be from Lu’s passport, publicly revealing his passport number.</p>



<p>Though the photo revealed what appeared to be Lu’s passport number alongside travel visa information, it did not display the story subject’s full name.</p>







<p>The photo did not appear in the online version of the article, but it was publicly accessible on the Times website through its specific web address.</p>



<p>After The Intercept contacted the paper, on the same day that the story was published, the Times removed the photo from its public website.</p>



<p>In response to a request for comment, Nicole Taylor, a spokesperson for the New York Times, said, “Mr. Lu supplied a range of photos and documents to The Times, which we used with his permission. We removed this photo out of an abundance of caution and within 24 hours of publication.”</p>



<p>Taylor added that “the source is aware and has not raised concerns.”</p>



<p>Other images that appeared to not be intended for public consumption were also subsequently removed from the Times’s website after The Intercept informed the Times of their presence. Among them was a graphic photo&nbsp;Lu apparently snapped of himself showing scars on his body, as well as a snippet of a text message conversation appearing to show a discussion between the gang and Lu’s parents regarding the ransom the gang had demanded for Lu.</p>



<p><u>Once the photos</u> were removed, the old image URLs began displaying the message, “We&#8217;re sorry, we seem to have lost this page, but we don&#8217;t want to lose you,” the standard error message the Times displays when accessing an unavailable webpage.</p>



<p>The revelation of Lu’s passport number could potentially identify Lu to the gang that held him at the labor camp. According to the article, “The gangs often take away the abductees’ passports and let their visas expire” — meaning the gang could have access to Lu’s passport information.</p>



<p>The Times story feature art — at the top of the article —&nbsp;is a mosaic composed of various images apparently supplied by Lu, including interior and exterior shots of the work camp. The mosaic is composed of 10 images. In the original article, the images’ URLs had irregular numbering, jumping from four to 20. Though only 10 of those 20 images were utilized in the opening mosaic by the Times, it was possible to view any of the 20 images by changing the image number in the file name listed in the image’s URL.</p>






<p>The unused assets being publicly available is not new; the practice is particularly common with video game developers, with gamers <a href="https://tcrf.net/The_Cutting_Room_Floor">routinely finding unused game assets</a> in the file systems of video game releases. The issue has arisen with <a href="https://theintercept.com/2023/11/17/congo-hrw-nyu-security-data/">nongovernmental organizations as well</a>.</p>



<p>This is not the first time the Times has unintentionally revealed personally identifiable information about story subjects. Last year, <a href="https://www.vice.com/en/article/epz3xj/new-york-times-exposed-russian-soldiers-criticizing-war-phone-numbers">the Times revealed phone numbers</a> of Russian soldiers and their family members who were being critical of Vladimir Putin and the war effort. The Times later went so far as to remove the news story from the website archival service the Wayback Machine; the paper has been actively antagonistic to having its <a href="https://theintercept.com/2023/09/17/new-york-times-website-internet-archive/">site archived</a>. </p>



<p>Software developers have automated <a href="https://docs.github.com/en/code-security/secret-scanning/configuring-secret-scanning-for-your-repositories">tools</a> to help them scan their source code to prevent inadvertently publicly revealing sensitive information. As a best practice in journalism, however, there is no substitute for human discretion when handling sensitive materials entrusted to a newsroom by an at-risk source.</p>
<p>The post <a href="https://theintercept.com/2023/12/20/new-york-times-doxxes-source-human-trafficking/">New York Times Doxxes Source Trafficked by Chinese Gang</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2023/12/20/new-york-times-doxxes-source-human-trafficking/feed/</wfw:commentRss>
                <slash:comments>0</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2023/12/GettyImages-1708753772-nytimes-doxxed-a-man.jpg?fit=2500%2C1250' width='2500' height='1250' /><post-id xmlns="com-wordpress:feed-additions:1">455651</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2026/05/GettyImages-2269551139-e1778009487735.jpg_67b465-e1778013276916.webp?w=440&#038;h=440&#038;crop=1" />
		<media:content url="https://theintercept.com/wp-content/uploads/2026/05/GettyImages-2269551139-e1778009487735.jpg_67b465-e1778013276916.webp?w=440&#038;h=440&#038;crop=1" medium="image" />
		<media:content url="https://theintercept.com/wp-content/uploads/2023/09/TI_Avatar01-01-200x200.png" medium="image" />
		<media:content url="https://theintercept.com/wp-content/uploads/2026/05/GettyImages-2273446312-e1777664306840.jpg?w=440&#038;h=440&#038;crop=1" medium="image">
			<media:title type="html">PORTLAND, MAINE - MAY 1: U.S. Senate candidate from Maine Graham Platner speaks during a campaign event with the Maine AFL-CIO, on May 1, 2026 in Portland, Maine. Platner, an oyster farmer by trade, is now the presumptive Democratic nominee before the Maine Primary election in June, after his chief rival Maine Governor Janet Mills (not-pictured) recently suspended her campaign.</media:title>
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2023/09/AP23172035123109-new-york-times-archive.jpg?w=440&#038;h=440&#038;crop=1" medium="image" />
            </item>
        
            <item>
                <title><![CDATA[New York Times Doesn’t Want Its Stories Archived]]></title>
                <link>https://theintercept.com/2023/09/17/new-york-times-website-internet-archive/</link>
                <comments>https://theintercept.com/2023/09/17/new-york-times-website-internet-archive/#respond</comments>
                <pubDate>Sun, 17 Sep 2023 10:00:00 +0000</pubDate>
                                    <dc:creator><![CDATA[Nikita Mazurov]]></dc:creator>
                                		<category><![CDATA[Technology]]></category>

                <guid isPermaLink="false"></guid>
                                    <description><![CDATA[<p>The Times blocked a bot that had given the Internet Archive’s Wayback Machine huge troves of websites.</p>
<p>The post <a href="https://theintercept.com/2023/09/17/new-york-times-website-internet-archive/">New York Times Doesn’t Want Its Stories Archived</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[
<p><u>The New York Times</u> tried to block a web crawler that was affiliated with the famous Internet Archive, a project whose easy-to-use comparisons of article versions has sometimes led to embarrassment for the newspaper.</p>



<p>In 2021, the New York Times added “ia_archiver” — a bot that, in the past, captured huge numbers of websites for the Internet Archive — to a list that instructs certain crawlers to stay out of its website.</p>



<p>Crawlers are programs that work as automated bots to trawl websites, collecting data and sending it back to a repository, a process known as scraping. Such bots power search engines and the Internet Archive’s <a href="https://web.archive.org/">Wayback Machine</a>, a service that facilitates the archiving and viewing of historic versions of websites going back to 1996.</p>



<!-- BLOCK(pullquote)[0](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22right%22%7D) --><blockquote class="stylized pull-right" data-shortcode-type="pullquote" data-pull="right"><!-- CONTENT(pullquote)[0] -->The New York Times has, in the past, faced public criticisms over some of its stealth edits.<!-- END-CONTENT(pullquote)[0] --></blockquote><!-- END-BLOCK(pullquote)[0] -->



<p>The Internet Archive’s Wayback Machine has long been used to compare webpages as they are updated over time, clearly delineating the differences between two iterations of any given page. Several years ago, the archive added a feature called “<a href="https://web.archive.org/web/changes/">Changes</a>” that lets users compare two archived versions of a website from different dates or times on a single display. The tool can be used to uncover changes in news stories that have been made without any accompanying editorial notes, so-called stealth edits.</p>



<p>The Times has, in the past, faced public criticisms over some of its stealth edits. In a notorious 2016 incident, the paper revised an article about then-Democratic presidential candidate Sen. Bernie Sanders, I-Vt., so drastically after publication — changing the tone from one of praise to skepticism — that it came in for a round of opprobrium from <a href="https://www.rollingstone.com/politics/politics-news/how-the-new-york-times-sandbagged-bernie-sanders-189129/">other</a> <a href="https://www.washingtonpost.com/blogs/erik-wemple/wp/2016/03/15/why-did-the-new-york-times-change-its-mind-about-bernie-sanders/">outlets</a> as well as the <a href="https://www.poynter.org/ethics-trust/2016/public-editor-knocks-nyt-for-stealth-editing-bernie-sanders-story/">Times’s own public editor</a>. The blogger who first noticed the revisions and set off the firestorm <a href="https://medium.com/@brokenravioli/proof-that-the-new-york-times-isn-t-feeling-the-bern-c74e1109cdf6">demonstrated the changes </a>by using the Wayback Machine.</p>







<p>More recently, the Times <a href="https://www.truthorfiction.com/the-new-york-times-ways-you-can-still-cancel-student-loan-debt/">stealth-edited</a> an article that originally listed “death” as one of six ways &#8220;you can still cancel your federal student loan debt.&#8221; Following the edit, the “death” section title was changed to a more opaque heading of “debt won’t carry on.”</p>



<p>A service called NewsDiffs — which provides a similar comparative service but focuses on news outlets such as the New York Times, CNN, the Washington Post, and others — has also chronicled a <a href="http://newsdiffs.org/examples/">long list of significant examples</a> of articles that have undergone stealth edits, though the service appears to not have been updated in several years.</p>







<p>The New York Times declined to comment on why it is barring the ia_archiver bot from crawling its website.</p>



<h2 class="wp-block-heading" id="h-robots-txt-files">Robots.txt Files</h2>



<p>The mechanism that websites use to block certain crawlers is a robots.txt file. If website owners want to request that a particular search engine or other automated bot not scan their website, they can add the crawler’s name to the file, which the website owner then uploads to their site where it can be publicly accessed.</p>



<p>Based on a web standard known as the <a href="https://www.rfc-editor.org/rfc/rfc9309.html#access-method">Robots Exclusion Protocol</a>, a robots.txt file allows site owners to specify whether they want to allow a bot to crawl either part of or their whole websites. Though bots can always choose to ignore the presence of the file, many crawler services respect the requests.</p>



<p>The current <a href="https://www.nytimes.com/robots.txt">robots.txt </a>file on the New York Times’s website includes an instruction to disallow all site access to the ia_archiver bot.</p>







<p>The relationship between ia_archiver and the Internet Archive is not completely straightforward. While the Internet Archive crawls the web itself, it also receives data from other entities. Ia_archiver was, for more than a decade, a prolific supplier of website data to the archive.</p>



<p>The bot belonged to Alexa Internet, a web traffic analysis company co-founded by Brewster Kahle, who went on to create the Internet Archive right after Alexa. Alexa Internet went on to be acquired by Amazon in 1999 — its trademark name was later used for Amazon’s signature voice-activated assistant — and was eventually sunset in 2022.</p>



<p>Throughout its existence, Alexa Internet was intricately <a href="https://datahorde.org/pulling-rank-the-legacy-of-alexa-internet/">intertwined</a> with the Internet Archive. From 1996 to the end of 2020, the Internet Archive received <a href="https://archive.org/details/alexacrawls">over 3 petabytes</a> — more than 3,000 terabytes — of crawled website data from Alexa. Its role in helping to fill the archive with material led users to <a href="https://wiert.me/2020/12/18/do-not-block-user-agent-ia_archiver-because-you-think-it-is-alexa-as-it-usually-is-the-internet-archive-wayback-machine/">urge</a> website owners not to block ia_archiver under the mistaken notion that it was unrelated to the Internet Archive.</p>



<p>As late as 2015, the Wayback Machine offered <a href="https://web.archive.org/web/20151031123632/http:/archive.org/about/exclude.php">instructions</a> for preventing a site from being ingested into the Wayback Machine — by using the site’s robots.txt file. News websites such as the <a href="https://web.archive.org/web/20160923003204/washingtonpost.com/robots.txt">Washington Post</a> proceeded to take full advantage of this and disallowed the ia_archiver bot.</p>



<p>By 2017, however, the Internet Archive announced its intention to <a href="https://blog.archive.org/2017/04/17/robots-txt-meant-for-search-engines-dont-work-well-for-web-archives/">stop</a> abiding by the dictates of a site’s robots.txt. While the Internet Archive had already been disregarding the robots.txt for <a href="https://blog.archive.org/2016/12/17/robots-txt-gov-mil-websites/">military and government</a> sites, the new update expanded the move to disregard robots.txt for all sites. Instead, website owners could make <a href="https://help.archive.org/help/using-the-wayback-machine/">manual</a> exclusion requests by email.</p>



<p>Reputation management firms, for one, are <a href="https://blog.reputationx.com/block-wayback-machine">keenly aware</a> of the change. The New York Times, too, appears to have mobilized the more selective manual exclusion process, as certain Times stories are <a href="https://web.archive.org/web/20230000000000*/https:/www.nytimes.com/interactive/2022/09/28/world/europe/russian-soldiers-phone-calls-ukraine.html">not available</a> via the Wayback Machine.</p>



<p>Some news sites such as the Washington Post have since removed ia_archiver from their list of blocked crawlers. While other websites removed their ia_archiver blocks, however, in 2021, the New York Times decided to add it.</p>
<p>The post <a href="https://theintercept.com/2023/09/17/new-york-times-website-internet-archive/">New York Times Doesn’t Want Its Stories Archived</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2023/09/17/new-york-times-website-internet-archive/feed/</wfw:commentRss>
                <slash:comments>0</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2023/09/AP23172035123109-new-york-times-archive.jpg?fit=4480%2C2240' width='4480' height='2240' /><post-id xmlns="com-wordpress:feed-additions:1">444418</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2026/05/GettyImages-2269551139-e1778009487735.jpg_67b465-e1778013276916.webp?w=440&#038;h=440&#038;crop=1" />
		<media:content url="https://theintercept.com/wp-content/uploads/2026/05/GettyImages-2269551139-e1778009487735.jpg_67b465-e1778013276916.webp?w=440&#038;h=440&#038;crop=1" medium="image" />
		<media:content url="https://theintercept.com/wp-content/uploads/2023/09/TI_Avatar01-01-200x200.png" medium="image" />
		<media:content url="https://theintercept.com/wp-content/uploads/2026/05/GettyImages-2273446312-e1777664306840.jpg?w=440&#038;h=440&#038;crop=1" medium="image">
			<media:title type="html">PORTLAND, MAINE - MAY 1: U.S. Senate candidate from Maine Graham Platner speaks during a campaign event with the Maine AFL-CIO, on May 1, 2026 in Portland, Maine. Platner, an oyster farmer by trade, is now the presumptive Democratic nominee before the Maine Primary election in June, after his chief rival Maine Governor Janet Mills (not-pictured) recently suspended her campaign.</media:title>
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2023/03/GettyImages-1238118390-nyt-correction-iraq-weapons-inspectors.jpg?w=440&#038;h=440&#038;crop=1" medium="image" />
            </item>
        
            <item>
                <title><![CDATA[Vice Pulled a Documentary Critical of Saudi Arabia. But Here It Is.]]></title>
                <link>https://theintercept.com/2023/09/09/vice-deleted-documentary-saudi-arabia/</link>
                <comments>https://theintercept.com/2023/09/09/vice-deleted-documentary-saudi-arabia/#respond</comments>
                <pubDate>Sat, 09 Sep 2023 11:00:00 +0000</pubDate>
                                    <dc:creator><![CDATA[Nikita Mazurov]]></dc:creator>
                                		<category><![CDATA[Technology]]></category>
		<category><![CDATA[World]]></category>

                <guid isPermaLink="false"></guid>
                                    <description><![CDATA[<p>Vice’s hard-nosed coverage on Saudi Arabia changed after investment deals with the repressive kingdom. A deleted documentary is not completely gone, however.</p>
<p>The post <a href="https://theintercept.com/2023/09/09/vice-deleted-documentary-saudi-arabia/">Vice Pulled a Documentary Critical of Saudi Arabia. But Here It Is.</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[
<p><u>In the past</u>, Vice has documented the<a href="https://www.vice.com/en/article/59jgka/a-brief-history-of-youtube-censorship"> history of censorship</a> on YouTube. More recently, since the company’s near implosion, it became an active participant in making things disappear.</p>



<p>In June, six months after announcing a partnership deal with a Saudi Arabian government-owned media company, Vice uploaded but then quickly removed a documentary critical of the Persian Gulf monarchy’s notorious dictator, Crown Prince Mohammed bin Salman, or MBS.</p>



<p>The nearly nine-minute film, titled “Inside Saudi Crown Prince&#8217;s Ruthless Quest for Power,” was uploaded to the Vice News YouTube channel on June 19, 2023. It garnered more than three-quarters of a million views before being set to “private” within four days of being posted. It can no longer be seen at its <a href="https://www.youtube.com/watch?v=N-WyKGFy8as">original link</a> on Vice’s YouTube channel; visitors see a message that says “video unavailable.” Vice did not respond to a request for comment on why the video was published and then made private or if there are any plans to make the video public again.</p>







<p>The Guardian first<a href="https://www.theguardian.com/media/2023/aug/15/vice-blocked-news-stories-that-could-offend-saudi-arabia-insiders-say"> reported</a> that a “film in the Vice world news Investigators series about Saudi crown prince Mohammed bin Salman was deleted from the internet after being uploaded.” Though Vice did remove the film from its public YouTube channel, it is, in fact, not “deleted from the internet” and<a href="https://web.archive.org/web/20230619171508oe_/https:/rr1---sn-a5meknde.googlevideo.com/videoplayback?expire=1687216503&amp;ei=F42QZJLLC7-lsfIP2KmPyAY&amp;ip=207.241.233.79&amp;id=o-AEROfbz44ZtCs_WLF_mQbQkaIawXSKM_u0PS_8uz_008&amp;itag=22&amp;source=youtube&amp;requiressl=yes&amp;spc=qEK7B3RF-26fYE0-NAi8q79SdA4zKOc&amp;vprv=1&amp;svpuc=1&amp;mime=video%2Fmp4&amp;cnr=14&amp;ratebypass=yes&amp;dur=525.305&amp;lmt=1687194023973012&amp;fexp=24007246&amp;c=ANDROID&amp;txp=5532434&amp;sparams=expire%2Cei%2Cip%2Cid%2Citag%2Csource%2Crequiressl%2Cspc%2Cvprv%2Csvpuc%2Cmime%2Ccnr%2Cratebypass%2Cdur%2Clmt&amp;sig=AOq0QJ8wRAIgSBunBCETqV_xTbm4dFaS8RhxUTaL-xzhsZRpPNBQvC0CICOSvGqJPepTAjhJSeG8bRGinIt4mCGawiSa6LL7ph32&amp;video_id=N-WyKGFy8as&amp;redirect_counter=1&amp;cm2rm=sn-n4vsl7s&amp;req_id=2a61de9b1411a3ee&amp;cms_redirect=yes&amp;cmsv=e&amp;mh=WD&amp;mip=207.241.229.235&amp;mm=34&amp;mn=sn-a5meknde&amp;ms=ltu&amp;mt=1687194531&amp;mv=m&amp;mvi=1&amp;pl=20&amp;lsparams=mh,mip,mm,mn,ms,mv,mvi,pl&amp;lsig=AG3C_xAwRQIhALUt-MWDx0SGRDuFZrVcShAPCI7DaiGEmGK9Ga8flTX3AiAfCMZeljhdw6b5T9xiw0fnJNui9blK7KcggBZ2C6nEWg%3D%3D"> presently remains publicly accessible</a> via web archival services.</p>







<p>Vice&#8217;s description of the video, now also unavailable on YouTube, <a href="https://web.archive.org/web/20230621002605/https://www.youtube.com/watch?v=N-WyKGFy8as">previously stated</a> that Saudi Crown Prince Mohammed “orchestrates The Ritz Purge, kidnaps Saudi’s elites and royal relatives with allegations of torture inside, and his own men linked to the brutal hacking of Journalist Khashoggi &#8211; a murder that stunned the world.” The description goes on to state that Wall Street Journal reporters Bradley Hope and Justin Scheck “attempt to unfold the motivations of the prince’s most reckless decision-making.” Hope and Scheck are the co-authors of the 2020 book “Blood and Oil: Mohammed bin Salman&#8217;s Ruthless Quest for Global Power.”</p>


<!-- BLOCK(photo)[2](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22none%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-none  width-auto" style="width: auto;"><!-- CONTENT(photo)[2] --> <img loading="lazy" decoding="async" width="2337" height="1342" class="alignnone size-full wp-image-444301" src="https://theintercept.com/wp-content/uploads/2023/09/VICE.jpg" alt="" srcset="https://theintercept.com/wp-content/uploads/2023/09/VICE.jpg?w=2337 2337w, https://theintercept.com/wp-content/uploads/2023/09/VICE.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2023/09/VICE.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2023/09/VICE.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2023/09/VICE.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2023/09/VICE.jpg?w=2048 2048w, https://theintercept.com/wp-content/uploads/2023/09/VICE.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2023/09/VICE.jpg?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" />
<figcaption class="caption source">A screenshot from the documentary “Inside Saudi Crown Prince’s Ruthless Quest for Power,” which Vice News deleted from its YouTube channel.<br/>Image: The Intercept; Source: Vice News</figcaption><!-- END-CONTENT(photo)[2] --></figure><!-- END-BLOCK(photo)[2] -->


<p>In the documentary, Hope states that Crown Prince Mohammed is “disgraced internationally” owing to the Jamal Khashoggi murder, a<a href="https://www.vice.com/en/topic/jamal-khashoggi?page=5"> topic</a> which Vice critically covered at length in the past. More recently, however, Vice has shifted its coverage of Saudi Arabia, apparently due to the growth of its commercial relationship with the kingdom. The relationship appears to have begun in<a href="https://www.wsj.com/articles/saudi-arabia-sought-vices-help-to-build-a-media-empire-11549621800"> 2017</a>, owing to MBS&#8217;s younger brother, Khalid bin Salman, being infatuated with the brand: Bin Salman reportedly set up a meeting between Vice co-founder Shane Smith and MBS.</p>



<p>By the end of 2018, Vice had worked with the Saudi Research and Media Group to produce<a href="https://www.theguardian.com/world/2018/oct/19/saudi-arabia-pays-uk-firms-millions-to-boost-image"> promotional videos for Saudi Arabia</a>. A few days after the Guardian piece detailing the deal came out, an “industry source” told<a href="https://variety.com/2018/digital/news/vice-media-reviewing-contract-saudi-publisher-jamal-khashoggi-1202988007/"> Variety</a> (whose parent company, Penske Media Corporation, received<a href="https://www.thewrap.com/penske-media-saudis-jamal-khashoggis-journalist/"> $200 million</a> from the Saudi sovereign wealth fund earlier that year) that Vice was “reviewing” its contract with SRMG.</p>



<p>A subsequent Guardian<a href="https://www.theguardian.com/media/2022/feb/01/vice-media-secretly-organised-20m-saudi-government-festival"> investigation</a> revealed that in 2020, Vice helped organize a Saudi music festival subsidized by the Saudi government. Vice&#8217;s name was not listed on publicity materials for the event, and contractors working on the event were presented with nondisclosure agreements.</p>



<p>In 2021, Vice opened an office in Riyadh, Saudi Arabia. The media company has gone from being “<a href="https://www.vice.com/en/article/kzjd3v/saudi-arabia-doesnt-expect-to-face-economic-fallout-for-the-premeditated-murder-of-khashoggi">banned from filming in Riyadh</a>” in 2018 to now <a href="https://vice.wd1.myworkdayjobs.com/en-US/Vice_External_Career_Site/details/Producer_R0002061">actively recruiting</a> for a producer “responsible for developing and assisting the producing of video content from short form content to long-form for our new media brand, headquartered in Riyadh.” The company lists 11<a href="https://vice.wd1.myworkdayjobs.com/en-US/Vice_External_Career_Site?locationCountry=50423b5190ad49bb89e94cd58dfaad69"> other Riyadh-based openings</a>.</p>



<p>Commenting on the opening of the Riyadh office, a Vice spokesperson<a href="https://www.theguardian.com/media/2022/feb/01/vice-media-secretly-organised-20m-saudi-government-festival"> told</a> the Guardian that “our editorial voice has and always will report with complete autonomy and independence.” In response to the Guardian<a href="https://www.theguardian.com/media/2023/aug/15/vice-blocked-news-stories-that-could-offend-saudi-arabia-insiders-say"> recently asking</a> about the rationale for the removal of the film, a Vice source stated that this was partially owing to concerns about the safety of Saudi-based staff.</p>



<p>In September 2022, the New York Times<a href="https://www.nytimes.com/2022/09/07/business/media/vice-saudi-arabia.html"> reported</a> that Vice was considering engaging in a deal with the Saudi media company MBC. The deal was officially<a href="https://variety.com/2023/digital/global/vice-content-production-partnership-with-saudi-backed-mbc-1235501835/"> announced</a> at the start of 2023. Most recently, the Guardian reported that Vice shelved a story which stated that the “Saudi state is helping families to harass and threaten transgender Saudis based overseas.” In response to this latest instance of apparent capitulation to advancing Saudi interests, the Vice Union issued a<a href="https://twitter.com/viceunion/status/1691859192766665077"> statement</a> saying that it was “horrified but not shocked.&#8221; It added, &#8220;We know the company is financially bankrupt, but it shouldn&#8217;t be morally bankrupt too.”</p>



<p>Meanwhile, a map of Saudi Arabia reportedly<a href="https://www.theguardian.com/world/2023/aug/17/thursday-briefing-first-edition-saudi-arabia-vice-media"> hangs</a> on a wall in Vice&#8217;s London office.</p>
<p>The post <a href="https://theintercept.com/2023/09/09/vice-deleted-documentary-saudi-arabia/">Vice Pulled a Documentary Critical of Saudi Arabia. But Here It Is.</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2023/09/09/vice-deleted-documentary-saudi-arabia/feed/</wfw:commentRss>
                <slash:comments>0</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2023/09/saudi-vice-video.jpg?fit=5368%2C2684' width='5368' height='2684' /><post-id xmlns="com-wordpress:feed-additions:1">444000</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2026/05/GettyImages-2269551139-e1778009487735.jpg_67b465-e1778013276916.webp?w=440&#038;h=440&#038;crop=1" />
		<media:content url="https://theintercept.com/wp-content/uploads/2026/05/GettyImages-2269551139-e1778009487735.jpg_67b465-e1778013276916.webp?w=440&#038;h=440&#038;crop=1" medium="image" />
		<media:content url="https://theintercept.com/wp-content/uploads/2023/09/TI_Avatar01-01-200x200.png" medium="image" />
		<media:content url="https://theintercept.com/wp-content/uploads/2026/05/GettyImages-2273446312-e1777664306840.jpg?w=440&#038;h=440&#038;crop=1" medium="image">
			<media:title type="html">PORTLAND, MAINE - MAY 1: U.S. Senate candidate from Maine Graham Platner speaks during a campaign event with the Maine AFL-CIO, on May 1, 2026 in Portland, Maine. Platner, an oyster farmer by trade, is now the presumptive Democratic nominee before the Maine Primary election in June, after his chief rival Maine Governor Janet Mills (not-pictured) recently suspended her campaign.</media:title>
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2023/09/VICE.jpg?fit=2337%2C1342" medium="image">
			<media:description type="html">A screenshot from the documentary &#34;Inside Saudi Crown Prince’s Ruthless Quest for Power,&#34; which Vice News deleted from its YouTube channel.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2023/09/VICE.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
            </item>
        
            <item>
                <title><![CDATA[With Pentagon Leak, the Press Had Their Source and Ate Him Too]]></title>
                <link>https://theintercept.com/2023/04/25/discord-leaker-new-york-times/</link>
                <comments>https://theintercept.com/2023/04/25/discord-leaker-new-york-times/#respond</comments>
                <pubDate>Tue, 25 Apr 2023 17:51:36 +0000</pubDate>
                                    <dc:creator><![CDATA[Nikita Mazurov]]></dc:creator>
                                		<category><![CDATA[National Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Voices]]></category>

                <guid isPermaLink="false"></guid>
                                    <description><![CDATA[<p>Whatever Jack Teixeira’s motives, he's accused of sharing documents that have underpinned major stories in the same outlets that helped hunt him down.</p>
<p>The post <a href="https://theintercept.com/2023/04/25/discord-leaker-new-york-times/">With Pentagon Leak, the Press Had Their Source and Ate Him Too</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<p><!-- BLOCK(photo)[0](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221024px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1024px;"><!-- CONTENT(photo)[0] -->
<img loading="lazy" decoding="async" width="3105" height="2070" class="aligncenter size-large wp-image-426519" src="https://theintercept.com/wp-content/uploads/2023/04/AP23103701347308-hunt-leaker-media.jpg" alt="Members of law enforcement assemble on a road, Thursday, April 13, 2023, in Dighton, Mass., near where FBI agents converged on the home of a Massachusetts Air National Guard member who has emerged as a main person of interest in the disclosure of highly classified military documents on the Ukraine. The guardsman was identified as 21-year-old Jack Teixeira. (AP Photo/Steven Senne)" srcset="https://theintercept.com/wp-content/uploads/2023/04/AP23103701347308-hunt-leaker-media.jpg?w=3105 3105w, https://theintercept.com/wp-content/uploads/2023/04/AP23103701347308-hunt-leaker-media.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2023/04/AP23103701347308-hunt-leaker-media.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2023/04/AP23103701347308-hunt-leaker-media.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2023/04/AP23103701347308-hunt-leaker-media.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2023/04/AP23103701347308-hunt-leaker-media.jpg?w=2048 2048w, https://theintercept.com/wp-content/uploads/2023/04/AP23103701347308-hunt-leaker-media.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2023/04/AP23103701347308-hunt-leaker-media.jpg?w=1000 1000w, https://theintercept.com/wp-content/uploads/2023/04/AP23103701347308-hunt-leaker-media.jpg?w=2400 2400w" sizes="auto, (max-width: 1200px) 100vw, 1200px" />
<figcaption class="caption source">Members of law enforcement assemble near the home of Air National Guard member Jack Teixeira on April 13, 2023, in Dighton, Mass.<br/>Photo: Steven Senne/AP</figcaption><!-- END-CONTENT(photo)[0] --></figure><!-- END-BLOCK(photo)[0] --><br />
<u>Tracing the concept</u> of <em>homo sacer</em> from antiquity to modern life, philosopher Giorgio Agamben cites the ancient Roman lexicographer Festus, who defined the term as someone “whom the people have judged on account of a crime. It is not permitted to sacrifice this man, yet he who kills him will not be condemned for homicide.” <em>Homo sacer</em> is thus an outlaw who is free to be pursued by vigilante lynch mobs but who, crucially, cannot be martyred. The mass media’s treatment of the alleged Pentagon leaker appears to have taken this conceit to heart, codifying him as a justifiable target for persecution, to be “<a href="https://www.nytimes.com/2023/04/14/podcasts/hard-fork-discord-leaker.html">tracked</a>” and “<a href="https://www.cnn.com/2023/04/15/politics/pentagon-leak-week-long-scamble/index.html">hunt[ed] down</a>.”</p>
<p>Over and over, the mainstream press has employed a rhetoric of exclusion, stripping the leaker bare of any protections that might be afforded to a whistleblower. He is not, they tell us ad nauseum, an <a href="https://www.washingtonpost.com/nation/2023/04/15/classified-documents-leak-discord/">Edward Snowden or a Chelsea Manning</a>. “It does not seem to involve a principled whistleblower, calling attention to wrongdoing or a coverup,” according to a Washington Post <a href="https://www.washingtonpost.com/opinions/2023/04/13/discord-suspected-leak-risks-nation-secrets/">editorial</a>. The “<a href="https://www.nytimes.com/live/2023/04/13/us/documents-leak-pentagon">far-right</a>” is incorrectly calling him a whistleblower, claims the New York Times. This view lets the outlet chastise those who attribute different motives to the alleged leaker, Jack Teixeira, while simultaneously distancing itself from the “far-right,” despite its own notably pro-law enforcement slant.</p>
<p></p>
<p>The motives of Teixeira, a 21-year-old Air National Guardsman, are important and newsworthy. They are also not fully known. Most <a href="https://www.nytimes.com/2023/04/13/world/europe/jack-teixeira-pentagon-leak.html">press</a> <a href="https://www.washingtonpost.com/national-security/2023/04/12/discord-leaked-documents/">accounts</a> have relied solely on interviews with minors who hung out in the same chatrooms as Teixeira. These sources have painted a compelling picture, but many others, including Teixeira himself, have not yet spoken publicly.</p>
<p><!-- BLOCK(pullquote)[2](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22right%22%7D) --><blockquote class="stylized pull-right" data-shortcode-type="pullquote" data-pull="right"><!-- CONTENT(pullquote)[2] -->Why, just because the leaker didn’t bring his material directly to a news outlet, wasn’t he deserving of either protection or being cultivated as a future source?<!-- END-CONTENT(pullquote)[2] --></blockquote><!-- END-BLOCK(pullquote)[2] --></p>
<p>Whatever his motives may have been, they don’t change the outcome of the leak: the release of informative documents that have underpinned major news stories in the same outlets that eagerly joined the search for their source. Reporters have <a href="https://www.politico.com/news/magazine/2023/04/19/investigative-journalists-pentagon-leaker-00092782">argued</a> that since Teixeira wasn’t a whistleblower, he was fair game to be hunted by law enforcement agencies and exposed by the press. This rationale conveniently sidesteps a key question: Why, just because the leaker didn’t bring his material directly to a news outlet, wasn’t he deserving of either protection or being cultivated as a future source? Why, instead, was he viewed solely or primarily as quarry?</p>
<p><u>The media’s claim</u> that Teixeira is not a whistleblower has been based in part on the environment in which the documents were disclosed and the relatively small number of people with whom they were originally shared. Based on testimony from others in a chatroom, the Times <a href="https://www.nytimes.com/2023/04/13/world/europe/jack-teixeira-pentagon-leak.html">wrote</a> that the documents Teixeira allegedly shared, far from being disseminated in the public interest, “were never meant to leave their small corner of the internet.” Likewise, the Post <a href="https://www.washingtonpost.com/national-security/2023/04/12/discord-leaked-documents/">claimed</a> that “the classified documents were intended only to benefit his online family,” which Bellingcat estimated as having around <a href="https://www.bellingcat.com/news/2023/04/09/from-discord-to-4chan-the-improbable-journey-of-a-us-defence-leak/">20 active users</a> out of what the Times later said was about <a href="https://www.nytimes.com/2023/04/21/us/politics/jack-teixeira-leaks-russia-ukraine.html">50 total members</a>. Yet on Friday, the Times reported that Teixeira had previously shared sensitive documents on another chat server that was publicly listed and had about 600 users. In their haste to reveal further possibly incriminating evidence against him, the authors seem not to have paused to reflect on how this wider distribution, if accurate, might undermine their earlier argument.</p>
<p>“Keeping secrets is essential to a functioning government,” the Post <a href="https://www.washingtonpost.com/opinions/2023/04/13/discord-suspected-leak-risks-nation-secrets/">editorialized</a> shortly after the documents began being covered in the mainstream press. “Breaking the laws for a psychic joyride is a despicable betrayal of trust and oaths.” Meanwhile, over on the news side, the paper <a href="https://www.washingtonpost.com/technology/2023/04/16/russia-disinformation-discord-leaked-documents/">churned out</a> numerous <a href="https://www.washingtonpost.com/national-security/2023/04/20/russia-ukraine-war-syria-attacks/">articles</a> revealing <a href="https://www.washingtonpost.com/national-security/2023/04/08/leaked-documents-israel-mossad-judicial-reform/">those very same secrets</a>, some accompanied by unredacted copies of the leaked documents themselves.</p>
<p>Not to be outdone, the Times has deployed language that dehumanizes the leaker, evoking images of <a href="https://www.nytimes.com/2023/04/14/podcasts/hard-fork-discord-leaker.html">a threatening wild animal</a>. The reporters don’t unpack the full significance of this hunting metaphor, which presumably ends with a slaughtered animal presented as a trophy. In the wake of the Times <a href="https://archive.is/IV1Wr">story</a> naming the alleged leaker before his arrest (which has since been <a href="https://www.nytimes.com/2023/04/13/world/documents-leak-leaker-identity.html">replaced</a> by another story), Twitter was in full media victory lap mode, with reporters <a href="https://twitter.com/mbieseck/status/1647805831834992641">patting themselves on the back</a> for their <a href="https://twitter.com/malachybrowne/status/1646894413757444096">promptness</a> in deanonymizing Teixeira.</p>
<p>More recently, however, the trophy hunters have begun to deny culpability for even the possibility that their investigations provided material assistance to the government.</p>
<p></p>
<p>Christiaan Triebert, a former Bellingcat staffer and a co-author of the Times investigation that initially named Teixeira, issued a <a href="https://twitter.com/trbrtc/status/1647328034591059969">disavowal</a> of liability, explaining that the Times reporting team went to the suspect’s house in the hope of talking to him, but he wasn’t there, so instead, they interviewed his mother and, later, his stepfather. At one point, a man matching Teixeira’s description drove onto the property in a pickup truck, but upon seeing the journalists, he promptly departed.</p>
<p>Yet Triebert’s self-defense doesn’t entirely follow. “There seems to be a misconception that our story naming Teixeira led to his arrest,” Triebert tweeted. “That’s simply not the case.” But how does he know? Certainty about this only seems possible from inside the Department of Justice effort to find Teixeira, which isn’t where Triebert claims to stand. Triebert did not respond to a request for comment.</p>
<p>Aric Toler, a current Bellingcat staffer and the principle author of the Times investigation that first named Teixeira, has likewise been quick to <a href="https://twitter.com/AricToler/status/1646888783609049088">dismiss</a> the possibility that his reporting aided the government’s investigation: “This should have been obvious, but no, our story naming the Pentagon/Discord leaker didn’t help the feds find him. They already knew at least a day before we identified him.” He cites the FBI affidavit, employing zero skepticism about a government document that represents one side in what is about to become a contested legal process. Toler did not reply to multiple requests for comment.</p>
<p>The narrow parameters of these denials are telling. Toler has been careful to focus his disdain on the notion that the Times story naming the leaker helped lead to his arrest. But that was not the first time Toler wrote about the leaker. Four days earlier, on April 9, Toler published a story about the leak on Bellingcat’s site in which he <a href="https://www.bellingcat.com/news/2023/04/09/from-discord-to-4chan-the-improbable-journey-of-a-us-defence-leak/">named</a> for the first time the Discord chat server where the documents seemed to have originally been leaked. In that piece, Toler also supplied the username of a member of the chat server where the documents were shared, explaining, “The Thug Shaker Central server was originally named after its original founder, one member of the server with the username ‘Vakhi’ told Bellingcat.”</p>
<p></p>
<p>These two pieces of information — the name of the server and the name of one of its users — could have led the FBI to issue a request to Discord to provide identifying information about the user as well as about the owner of the chat server.</p>
<p>The FBI’s <a href="https://storage.courtlistener.com/recap/gov.uscourts.mad.255930/gov.uscourts.mad.255930.3.1.pdf">affidavit</a> states that on April 10, the day after Toler’s Bellingcat story was posted online, “the FBI interviewed a user of Social Media Platform 1 (‘User 1’).” That user, who is not named in the affidavit, told the FBI that “an individual using a particular username (the ‘Subject Username’) began posting what appeared to be classified information on Social Media Platform.” The “Subject Username,” the affidavit explains, refers to Teixeira.</p>
<p>As with all documentation produced by government investigators, the FBI affidavit must be taken with an iceberg-sized lump of salt. However, it is at least as possible that Toler’s Bellingcat story provided a material lead for the federal investigation as that investigators already knew about Vakhi and Thug Shaker Central before reading it.</p>
<p>Regardless of whether journalists actually provided material assistance to federal investigators, it is concerning that there has been so little public discussion of or reflection by the reporters involved on the ethical ramifications of their work.</p>
<p><u>After talking to</u> people who knew Teixeira from the Discord server, the investigatory paths of the FBI and Toler diverged. The FBI appears to have identified the suspected leaker based on server records it requested from the platform, while Toler has <a href="http://www.nytimes.com/2023/04/14/podcasts/hard-fork-discord-leaker.html">revealed</a> that he was able to identify the individual by leveraging information supplied by minors.</p>
<p>Though Toler stated that his sources were “<a href="https://www.nytimes.com/2023/04/14/podcasts/hard-fork-discord-leaker.html?showTranscript=1">all kids</a>,” neither he nor the Times has made any mention of whether they obtained parental consent for these interviews. <a href="https://resourcecentre.savethechildren.net/document/unicef-guidelines-interviewing-children/">UNICEF</a> guidelines state that consent from both the child and their guardian should be established prior to conducting an interview and that the intended use of the interview should be made apparent. It’s not clear whether Toler informed the minors that he was going to use clues they offered, like which video games the alleged leaker liked to play, to out Teixeira. The Times did not respond to a request for comment.</p>
<p>In a <a href="https://archive.is/w58Aq">since-deleted</a> tweet, Times military correspondent David Philipps effectively threatened that if you don’t leak to the Times, the paper will instead “work feverishly” to identify you. <a href="https://twitter.com/David_Philipps/status/1647251205666787328">Nuanced or not</a>, this tweet perfectly summarizes the media’s messaging regarding this case: Only those who reach out to a media outlet are worthy of protection; those who leak information via other means risk sharing the fate of <em>homo sacer</em>, a traitor to be hunted down.</p>
<p>The post <a href="https://theintercept.com/2023/04/25/discord-leaker-new-york-times/">With Pentagon Leak, the Press Had Their Source and Ate Him Too</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2023/04/25/discord-leaker-new-york-times/feed/</wfw:commentRss>
                <slash:comments>0</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2023/04/AP23103701347308-hunt-leaker-media-feat-e1682439448641.jpg?fit=2996%2C1498' width='2996' height='1498' /><post-id xmlns="com-wordpress:feed-additions:1">426501</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2023/04/AP23103701347308-hunt-leaker-media.jpg?w=440&amp;h=440&amp;crop=1" />
		<media:content url="https://theintercept.com/wp-content/uploads/2023/04/AP23103701347308-hunt-leaker-media.jpg?fit=3105%2C2070" medium="image">
			<media:title type="html">Leaked Documents</media:title>
			<media:description type="html">Members of law enforcement assemble near the home of Air National Guard member  Jack Teixeira, April 13, 2023, in Dighton, Mass.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2023/04/AP23103701347308-hunt-leaker-media.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2026/05/GettyImages-2269551139-e1778009487735.jpg_67b465-e1778013276916.webp?w=440&#038;h=440&#038;crop=1" medium="image" />
		<media:content url="https://theintercept.com/wp-content/uploads/2023/09/TI_Avatar01-01-200x200.png" medium="image" />
		<media:content url="https://theintercept.com/wp-content/uploads/2026/05/GettyImages-2273446312-e1777664306840.jpg?w=440&#038;h=440&#038;crop=1" medium="image">
			<media:title type="html">PORTLAND, MAINE - MAY 1: U.S. Senate candidate from Maine Graham Platner speaks during a campaign event with the Maine AFL-CIO, on May 1, 2026 in Portland, Maine. Platner, an oyster farmer by trade, is now the presumptive Democratic nominee before the Maine Primary election in June, after his chief rival Maine Governor Janet Mills (not-pictured) recently suspended her campaign.</media:title>
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2023/04/GettyImages-1247231620.jpg?w=440&#038;h=440&#038;crop=1" medium="image" />
            </item>
        
            <item>
                <title><![CDATA[Why Did Journalists Help the Justice Department Identify a Leaker?]]></title>
                <link>https://theintercept.com/2023/04/13/why-did-journalists-help-the-justice-department-identify-a-leaker/</link>
                <comments>https://theintercept.com/2023/04/13/why-did-journalists-help-the-justice-department-identify-a-leaker/#respond</comments>
                <pubDate>Fri, 14 Apr 2023 01:55:07 +0000</pubDate>
                                    <dc:creator><![CDATA[Nikita Mazurov]]></dc:creator>
                                		<category><![CDATA[National Security]]></category>
		<category><![CDATA[Technology]]></category>

                <guid isPermaLink="false"></guid>
                                    <description><![CDATA[<p>If he’d shared the same classified materials with reporters, he would be tirelessly defended as a source.</p>
<p>The post <a href="https://theintercept.com/2023/04/13/why-did-journalists-help-the-justice-department-identify-a-leaker/">Why Did Journalists Help the Justice Department Identify a Leaker?</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<p><u>In the fallout</u> from the <a href="https://apnews.com/article/leaked-documents-classified-russia-ukraine-e351c6613e69bf8d714b03e367543da8">Pentagon document leaks</a>, a troubling trend has emerged: Journalists seem to be eagerly volunteering their efforts to help the Pentagon and Justice Department facilitate an <a href="https://www.cnn.com/2023/04/11/politics/investigations-pentagon-leaked-documents-justice-department/index.html">investigation</a> into the source of the leaks, with no discussion of the ethical ramifications. If the individual — whose identity has been published by journalists, and who has now been arrested by federal authorities — had shared <em>precisely the same classified materials</em> with reporters, regardless of his motivations, he would be tirelessly defended as a source.</p>
<p>NPR recently <a href="https://www.npr.org/2023/04/05/1168158549/twitter-npr-state-affiliated-media">decried</a> being labeled by Twitter as state-affiliated media, writing that this is a label Twitter uses “to designate official state mouthpieces and propaganda outlets.” That unrelated controversy is notable given that an <a href="https://twitter.com/gbrumfiel/status/1645496825737269248">NPR staffer</a> seems to have deputized himself to act as a government investigator by posting image analyses on Twitter. (While NPR has announced that its official organizational accounts have <a href="https://www.npr.org/2023/04/12/1169269161/npr-leaves-twitter-government-funded-media-label">quit Twitter</a>, individual staff accounts still appear to be active.)</p>
<p></p>
<p>NPR senior editor and correspondent Geoff Brumfiel on Monday combed through artifacts visible in the periphery of the photos of the leaks, as well as collating findings others have discovered, itemizing and explaining each one. Though Brumfiel claimed that his roundup was “largely <a href="https://twitter.com/gbrumfiel/status/1645491582035009539">pointless</a>,” he was effectively performing free labor for the Justice Department, and his posts may corroborate the identity of a suspect. For instance, it may be possible for investigators to analyze a suspect’s credit card purchase history to see if he at some point ordered the objects in question. Brumfiel did not respond to a request for comment in time for publication.</p>
<p>The saving grace here appears to be that the analysis — as is all too often the case with open-source sleuthing on social media — was flawed. Less than 15 minutes after proclaiming he was “<a href="https://twitter.com/gbrumfiel/status/1645494928514981899">confident</a>” that a manual partially visible in some of the photos of leaked documents was for a particular model of scope, others <a href="https://twitter.com/tom_bike/status/1645498073039384576">pointed out</a> that in fact the manual was clearly for a different model. “I regret the error,” <a href="https://twitter.com/gbrumfiel/status/1645501694116241408">responded</a> Brumfiel. To his credit, Brumfiel does freely admit in his bio to being “Mostly stupid on the Twitter,” though in this case that self-professed stupidity may put someone’s liberty at risk.</p>
<h2><strong>See Something, Say Something</strong></h2>
<p>It’s not atypical for government agencies to explicitly request this type of image identification help. For instance, Europol maintains a <a href="https://www.europol.europa.eu/stopchildabuse">Trace an Object</a> website, where budding image analysts can help identify various objects in photos linked to child abuse cases. In the case of the leaked Pentagon documents, the Justice Department hasn’t even needed to put out such a call, as plenty of volunteers are offering up leads.</p>
<p>Brumfiel is by no means alone in his social media vigilantism. Jake Godin, a visual investigations journalist at Scripps News, has likewise <a href="https://twitter.com/JakeGodin/status/1644380394849009664">engaged</a> in the Twitter pastime of volunteering his time to help the Justice Department. Bellingcat, meanwhile, went further and virtually <a href="https://www.bellingcat.com/news/2023/04/09/from-discord-to-4chan-the-improbable-journey-of-a-us-defence-leak/">handed</a> over the potential origin point of the leak by specifying the exact name of the chatroom where the documents appear to have first been shared. The fact that these identifications may be aiding the Justice Department investigation appears not to have merited any public consideration from those doing the analyses.</p>
<p>On Wednesday, the Washington Post <a href="https://www.washingtonpost.com/national-security/2023/04/12/discord-leaked-documents/">disclosed further information</a> about the peripheral contents of “previously unreported images,” as well as a variety of additional information about the alleged leaker and his underage associates. The Post states that the leaker “may have endangered his young followers by allowing them to see and possess classified information, exposing them to potential federal crimes.” Given this risk, the Post was extremely cavalier in its depiction of one of those teenagers, publishing video with only rudimentary pixelation accompanied by his unaltered voice. The Post notes that the interviewee asked them not to obscure his voice, but one wonders whether he also asked for close-up shots of his laptop, clearly showing missing keys, to be included. In other words, the Post appears to be acknowledging the danger the interviewee faces while also choosing to readily present evidence that could help investigators confirm his identity. (In response to detailed questions from The Intercept, a Post spokesperson reiterated that the reporters obtained parental consent for the interview.)</p>
<p>The New York Times went <a href="https://www.nytimes.com/2023/04/13/world/documents-leak-leaker-identity.html">further</a> still, identifying the suspected leaker by name on Thursday based on a “trail of evidence” they compiled, including matching elements in the margins of the document photos to other posts on social media.</p>
<p></p>
<p>Perhaps the most bizarre entry in this dubious parade was a story published last week by VICE’s Motherboard about a role-playing game <a href="https://www.vice.com/en/article/ak3d5z/leaked-classified-documents-also-include-roleplaying-game-character-stats">character sheet</a> that seems to have been included in a batch of the leaked document photos. Motherboard published the character sheet in full (in stark contrast to the <a href="https://www.vice.com/en/article/xgwz9j/texas-school-performs-worst-ever-redaction-of-a-public-record">extreme trouble</a> the same publication took just days before to avoid publishing a poorly redacted document revealing the names of minors suspected of using the artificial intelligence chatbot ChatGPT in school). Motherboard notes that it’s not clear whether the errant image was inadvertently or intentionally added to the photo dump, or whether it was added by the original leaker or an intermediary who further disseminated the photo archive. This lack of clarity makes the decision to publish the document even more confusing and suspect, but the author doesn’t seem bothered, as the story morphs into a humorous analysis of the fun and creative things people do in the world of online role-playing games.</p>
<p>The document in question appears to be an extremely niche adaptation of a role-playing game. Let’s say that someone in an online community on Reddit, 4chan, or a Discord server instantly recognizes this particular game and says, “Oh, that&#8217;s Alice&#8217;s game sheet.” Alice may now be the subject of Justice Department scrutiny or an online lynch mob, or both, courtesy of Motherboard. Or suppose the Justice Department zeroes in on a suspected leaker and uses the handwriting in the published Motherboard document to positively identify them. The<strong> </strong>story&#8217;s author, Matthew Gault, did not respond to a request for comment.</p>
<h2><strong>Duty of Care</strong></h2>
<p>Why is the media so eager to help the Justice Department by supplying potentially viable leads? Sure, the­­­ leaker wasn’t NPR’s or Motherboard’s source, and as far as we know, had no intention of being a whistleblower. But does that give journalists a green light to act as investigative agents for the Justice Department? A duty of care arguably extends beyond one’s immediate source: You don’t have to assist an individual in publicizing the workings of government, but at the very least, you should not intentionally compromise them.</p>
<p>The argument could be made that the identity of the leaker is newsworthy. For instance, as <a href="https://www.cia.gov/readingroom/docs/CIA-RDP94B00280R001200050018-2.pdf">the CIA points out</a>, leakers are often senior officials. But ascertaining a source’s identity can be done by journalists privately, as opposed to all over social media or in published stories. If it emerges that the source’s identity is not, in fact, newsworthy, a life hasn’t been damaged by overzealous state-serving reporting.</p>
<p>There is, of course, the distinct possibility that the Justice Department investigators are already well familiar with the ephemera in the photos, seeing as they too have access to reverse image search sites, and that journalists are not telling them anything they don’t already know. Nonetheless, there is a very real possibility that the various clues to the leaker’s and their associates’ identities proffered by various news outlets have helped the government in their recent <a href="https://www.cnn.com/2023/04/13/politics/us-government-intel-leak/index.html">apprehension</a> of a person suspected to be the leaker.</p>
<p>Either way, the zeal of some “reporters” to out the leaker or find a “gotcha” clue tucked away in the marginalia of an image seems distasteful. A different impulse would be to offer guidance that might <a href="https://theintercept.com/2023/04/12/classified-documents-leak/">help</a> sources avoid getting caught; that could facilitate future leaks and thus greater transparency.</p>
<p>The post <a href="https://theintercept.com/2023/04/13/why-did-journalists-help-the-justice-department-identify-a-leaker/">Why Did Journalists Help the Justice Department Identify a Leaker?</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2023/04/13/why-did-journalists-help-the-justice-department-identify-a-leaker/feed/</wfw:commentRss>
                <slash:comments>0</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2023/04/GettyImages-1247231620.jpg?fit=4328%2C2164' width='4328' height='2164' /><post-id xmlns="com-wordpress:feed-additions:1">426061</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2026/05/GettyImages-2269551139-e1778009487735.jpg_67b465-e1778013276916.webp?w=440&#038;h=440&#038;crop=1" />
		<media:content url="https://theintercept.com/wp-content/uploads/2026/05/GettyImages-2269551139-e1778009487735.jpg_67b465-e1778013276916.webp?w=440&#038;h=440&#038;crop=1" medium="image" />
		<media:content url="https://theintercept.com/wp-content/uploads/2023/09/TI_Avatar01-01-200x200.png" medium="image" />
		<media:content url="https://theintercept.com/wp-content/uploads/2026/05/GettyImages-2273446312-e1777664306840.jpg?w=440&#038;h=440&#038;crop=1" medium="image">
			<media:title type="html">PORTLAND, MAINE - MAY 1: U.S. Senate candidate from Maine Graham Platner speaks during a campaign event with the Maine AFL-CIO, on May 1, 2026 in Portland, Maine. Platner, an oyster farmer by trade, is now the presumptive Democratic nominee before the Maine Primary election in June, after his chief rival Maine Governor Janet Mills (not-pictured) recently suspended her campaign.</media:title>
		</media:content>
            </item>
        
            <item>
                <title><![CDATA[Twitter Deploys Classic Musk Tactics to Hunt Down Leaker]]></title>
                <link>https://theintercept.com/2023/04/08/twitter-dmca-github-musk/</link>
                <comments>https://theintercept.com/2023/04/08/twitter-dmca-github-musk/#respond</comments>
                <pubDate>Sat, 08 Apr 2023 10:00:54 +0000</pubDate>
                                    <dc:creator><![CDATA[Nikita Mazurov]]></dc:creator>
                                		<category><![CDATA[Technology]]></category>

                <guid isPermaLink="false"></guid>
                                    <description><![CDATA[<p>The social media giant’s copyright infringement claim against GitHub shows that websites can be compelled to violate users' privacy.</p>
<p>The post <a href="https://theintercept.com/2023/04/08/twitter-dmca-github-musk/">Twitter Deploys Classic Musk Tactics to Hunt Down Leaker</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<p><u>Twitter last month</u> submitted a Digital Millennium Copyright Act <a href="https://github.com/github/dmca/blob/master/2023/03/2023-03-24-twitter.md">notice</a> to GitHub — a web service designed to host user-uploaded source code — demanding that certain content be taken down because it was allegedly “[p]roprietary source code for Twitter&#8217;s platform and internal tools.” Twitter subsequently filed a <a href="https://torrentfreak.com/images/3-23-mc-80090-Twitter-v-Github-Source-Code-DMCA-decl-230324.pdf">declaration</a> in federal court supporting its request for a DMCA subpoena, the ostensible aim of which was “to identify the alleged infringer or infringers who posted Twitter’s source code on systems operated by GitHub without Twitter’s authorization.”</p>
<p></p>
<p>However, Twitter appears to have revised its DMCA notice, essentially a claim of copyright infringement, the same day it was filed to request not only information about the uploader, but also “any related upload / download / access history (and any contact info, IP addresses, or other session info related to same), and any associated logs related to this repo or any forks thereof.” In other words, Twitter is now seeking information not only about the alleged leaker, but also about anyone who interacted with the particular GitHub repository, the online space for storing source code, in any way, including simply by accessing it. Trying to strong-arm GitHub into revealing information about visitors to a particular repository it hosts via a request for a subpoena is a move reminiscent of the Justice Department <a href="https://www.nytimes.com/2017/08/15/us/politics/justice-department-trump-dreamhost-protests.html">attempting</a> to compel a web-hosting company to reveal information about visitors to an anti-Trump website.</p>
<h2>DMCA: The Doxxing and Censorship Tool of Choice</h2>
<p></p>
<p>This isn’t the first time that corporations have tried to use DMCA subpoenas to identify leakers. A Marvel Studios affiliate recently petitioned for DMCA subpoenas to force Reddit and Google to reveal information about <a href="https://torrentfreak.com/marvel-wants-reddit-to-expose-mods-suspected-of-ant-man-3-leak-230313/">someone who uploaded a film script</a> to Google and posted about it on Reddit before the movie was released. DMCA claims also have a sordid history of being used in doxxing attempts. False DMCA claims can be filed to <a href="https://www.dailydot.com/debug/dmca-youtube-terrorism-dox-al-hayat/">lure</a> a targeted user to then file a counterclaim, which necessitates that they fill in their name and address, which in turn gets passed on to the original filer. At other times, the DMCA is used simply to censor content, whether to <a href="https://www.accessnow.org/dmca-takedown-demands-censor-activists/">muzzle members of civil society</a> or for <a href="https://www.washingtonpost.com/investigations/interactive/2023/eliminalia-fake-news-misinformation/">reputation management</a>.</p>
<h2>No Subpoena Required?</h2>
<p>GitHub has seemed all too willing to provide information about both its repository owners and its visitors, even without a subpoena. When the owner of another, unrelated repository recently asked GitHub to provide access logs of users who had visited it, GitHub <a href="https://twitter.com/0xf4d3/status/1643481902731476995">appears</a> to have readily complied, obscuring only the last octet of the visitor IP address, with the unredacted portion still potentially revealing information such as a user’s internet service provider and approximate location.</p>
<p>There are also any number of public ways to extract user information from GitHub, such as email addresses associated with a particular GitHub account. Ironically, some scripts hosted on GitHub are designed to automate the exfiltration of a GitHub user’s email address. Once an email address is learned, the process of requesting a subpoena for further information about a particular user may be repeated in an attempt to obtain yet more sensitive data.</p>
<h2>Musk’s Bag of Tricks</h2>
<p>Aside from claiming to use <a href="https://theintercept.com/2022/12/15/elon-musk-leaks-twitter/">watermarking</a> methods to catch leakers, Musk’s other companies have also sought subpoenas to force service providers to reveal information about leakers. For instance, when Musk zeroed in on (and subsequently <a href="https://www.bloomberg.com/news/features/2019-03-13/when-elon-musk-tried-to-destroy-tesla-whistleblower-martin-tripp">harassed</a>) a suspected leaker who provided internal documents to a reporter about large amounts of <a href="https://www.businessinsider.com/tesla-model-3-scrap-waste-high-gigafactory-2018-5">waste</a> being generated at Tesla’s “Gigafactory,” Tesla <a href="https://www.courtlistener.com/docket/7244147/tesla-inc-v-tripp/?page=1">moved to</a> subpoena <a href="https://ecf.nvd.uscourts.gov/doc1/11507204122?caseid=131279">Apple</a>, <a href="https://storage.courtlistener.com/recap/gov.uscourts.nvd.131279/gov.uscourts.nvd.131279.11.2.pdf">AT&amp;T</a>, <a href="https://storage.courtlistener.com/recap/gov.uscourts.nvd.131279/gov.uscourts.nvd.131279.11.3.pdf">Dropbox</a>, <a href="https://storage.courtlistener.com/recap/gov.uscourts.nvd.131279/gov.uscourts.nvd.131279.11.4.pdf">Facebook</a>, <a href="https://ecf.nvd.uscourts.gov/doc1/11507204124?caseid=131279">Google</a>, <a href="https://ecf.nvd.uscourts.gov/doc1/11507204123?caseid=131279">Microsoft</a>, <a href="https://storage.courtlistener.com/recap/gov.uscourts.nvd.131279/gov.uscourts.nvd.131279.11.5.pdf">Open Whisper Systems</a> (the organization formerly behind the secure messaging app <a href="https://signal.org">Signal</a>), and <a href="https://storage.courtlistener.com/recap/gov.uscourts.nvd.131279/gov.uscourts.nvd.131279.11.6_1.pdf">WhatsApp</a>. The proposed subpoenas “commanded” their targets to preserve any information about the suspected leaker’s accounts, as well as all documents that the suspected leaker “has deleted from the foregoing accounts but that are still accessible by you.”</p>
<p></p>
<p>In addition to proposed subpoenas, Tesla has <a href="https://www.bloomberg.com/news/features/2019-03-13/when-elon-musk-tried-to-destroy-tesla-whistleblower-martin-tripp">reportedly</a> tried to identify leakers by reviewing surveillance footage to see who had been taking photos (the <a href="https://www.businessinsider.com/tesla-model-3-scrap-waste-high-gigafactory-2018-5">original</a> Business Insider story that prompted the Tesla investigation mentioned that the source had provided images to corroborate their claims of waste at the factory). The company has also checked file access logs to see who had accessed data that was provided to the news outlet.</p>
<p>Following identification of the suspected leaker, Tesla reportedly engaged in an extensive surveillance campaign, including hacking the suspect’s phone; requesting that the suspect turn over their laptop for an “update” that was, in fact, a forensic audit; deploying a plainclothes security guard to monitor the suspect on the factory floor; and hiring private investigators to conduct further surveillance.</p>
<h2>Takeaways for Leakers</h2>
<p>Given the lax approach to divulging user information by service providers, coupled with the aggressive tactics employed by companies to reveal sources, the takeaway for would-be leakers is clear: Do not trust service providers to protect any information they may have about you. Websites may reveal information about the leaker, intentionally or not, and whether legally obligated or of their own accord. Leakers would do well to avoid using their home or other proximate internet connection and to further obfuscate it using tools such as the <a href="https://www.torproject.org/download/">Tor Browser</a>. Additionally, it’s best to ensure that any information required to set up a particular account, such as an email address or phone number, not be traceable to the leaker.</p>
<p>The post <a href="https://theintercept.com/2023/04/08/twitter-dmca-github-musk/">Twitter Deploys Classic Musk Tactics to Hunt Down Leaker</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2023/04/08/twitter-dmca-github-musk/feed/</wfw:commentRss>
                <slash:comments>0</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2023/04/AP23053064060713-e1680809810305.jpg?fit=3000%2C1500' width='3000' height='1500' /><post-id xmlns="com-wordpress:feed-additions:1">425595</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2026/05/GettyImages-2269551139-e1778009487735.jpg_67b465-e1778013276916.webp?w=440&#038;h=440&#038;crop=1" />
		<media:content url="https://theintercept.com/wp-content/uploads/2026/05/GettyImages-2269551139-e1778009487735.jpg_67b465-e1778013276916.webp?w=440&#038;h=440&#038;crop=1" medium="image" />
		<media:content url="https://theintercept.com/wp-content/uploads/2023/09/TI_Avatar01-01-200x200.png" medium="image" />
		<media:content url="https://theintercept.com/wp-content/uploads/2026/05/GettyImages-2273446312-e1777664306840.jpg?w=440&#038;h=440&#038;crop=1" medium="image">
			<media:title type="html">PORTLAND, MAINE - MAY 1: U.S. Senate candidate from Maine Graham Platner speaks during a campaign event with the Maine AFL-CIO, on May 1, 2026 in Portland, Maine. Platner, an oyster farmer by trade, is now the presumptive Democratic nominee before the Maine Primary election in June, after his chief rival Maine Governor Janet Mills (not-pictured) recently suspended her campaign.</media:title>
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2022/12/GettyImages-1245242284-musk-twitter-leak.jpg?w=440&#038;h=440&#038;crop=1" medium="image" />
            </item>
        
            <item>
                <title><![CDATA[How a Supreme Court Investigation of the Roe v. Wade Leak Might Unfold]]></title>
                <link>https://theintercept.com/2022/05/08/supreme-court-roe-wade-leak-investigation/</link>
                <comments>https://theintercept.com/2022/05/08/supreme-court-roe-wade-leak-investigation/#respond</comments>
                <pubDate>Sun, 08 May 2022 10:00:46 +0000</pubDate>
                                    <dc:creator><![CDATA[Nikita Mazurov]]></dc:creator>
                                		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Technology]]></category>

                <guid isPermaLink="false"></guid>
                                    <description><![CDATA[<p>The leak investigation of the draft Supreme Court opinion overturning Roe v. Wade raises important issues for journalists as well as potential sources.</p>
<p>The post <a href="https://theintercept.com/2022/05/08/supreme-court-roe-wade-leak-investigation/">How a Supreme Court Investigation of the Roe v. Wade Leak Might Unfold</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<p><u>Following the publication</u> by Politico of Supreme Court Justice Samuel Alito’s <a href="https://www.politico.com/news/2022/05/02/read-justice-alito-initial-abortion-opinion-overturn-roe-v-wade-pdf-00029504">draft majority opinion</a> to overturn Roe v. Wade, Chief Justice Roberts <a href="https://www.washingtonpost.com/politics/2022/05/03/supreme-court-leak-investigation-abortion-roe-wade/">authenticated</a> the leaked document and <a href="https://www.documentcloud.org/documents/21846543-2022-050322-press-release">stated</a> that he had &#8220;directed the Marshal of the Court to launch an investigation into the source of the leak.&#8221; Whether or not the leak itself was <a href="https://www.wired.com/story/scotus-roe-v-wade-opinion-leak-legal-risk/">illegal</a>, however, the question of how a technical investigation of this document would proceed raises some interesting issues for journalists as well as potential sources.</p>
<p></p>
<p>Leak investigators have three key areas to analyze for clues: the document itself, the environment the document circulated in, and the potential identity of the leaker. Each area in turn presents lessons and opportunities for would-be leakers to adopt various counter-forensic strategies to subvert future leak investigations.</p>
<h2>The Document</h2>
<p>Since the leaked opinion appears to be a scan or photocopy of a paper document instead of a transcription or recreation, the image can be analyzed for any unique markings that might allow investigators to pinpoint which particular physical copy of the document was leaked.</p>
<p>The first page includes several such potentially unique identifying markers, including a highlighted title, a page bend, and what appear to be staple perforations.<br />
<!-- BLOCK(photo)[1](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221024px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1024px;"><!-- CONTENT(photo)[1] -->
<img loading="lazy" decoding="async" class="aligncenter wp-image-395940 size-large" src="https://theintercept.com/wp-content/uploads/2022/05/s111.jpg?w=1024" alt="s111" width="1024" height="445" srcset="https://theintercept.com/wp-content/uploads/2022/05/s111.jpg?w=1467 1467w, https://theintercept.com/wp-content/uploads/2022/05/s111.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2022/05/s111.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2022/05/s111.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2022/05/s111.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2022/05/s111.jpg?w=1000 1000w" sizes="auto, (max-width: 1024px) 100vw, 1024px" />

<figcaption class="caption source">Screenshot: The Intercept</figcaption><!-- END-CONTENT(photo)[1] --></figure><!-- END-BLOCK(photo)[1] --><br />
Other pages also reveal subtle markings that could identify the specific paper copy of the leaked document. For instance, the bottom-left region of page 90 has a singular speck; the fact that it is not present on other page images indicates that it is a stray mark present only on that physical page of the document, as opposed to being a dust flake on the scanner bed.<br />
<!-- BLOCK(photo)[2](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221024px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1024px;"><!-- CONTENT(photo)[2] -->
<img loading="lazy" decoding="async" class="aligncenter wp-image-395936 size-large" src="https://theintercept.com/wp-content/uploads/2022/05/s22.jpg?w=1024" alt="s22" width="1024" height="474" srcset="https://theintercept.com/wp-content/uploads/2022/05/s22.jpg?w=1632 1632w, https://theintercept.com/wp-content/uploads/2022/05/s22.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2022/05/s22.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2022/05/s22.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2022/05/s22.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2022/05/s22.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2022/05/s22.jpg?w=1000 1000w" sizes="auto, (max-width: 1024px) 100vw, 1024px" />

<figcaption class="caption source">Screenshot: The Intercept</figcaption><!-- END-CONTENT(photo)[2] --></figure><!-- END-BLOCK(photo)[2] --><br />
If investigators managed to locate a physical copy of the document matching the characteristics found in the leaked file, that would allow them to conclude that it was the physical copy that was leaked. This is significant, because it could establish the provenance of the document, which could in turn identify potential leakers.</p>
<p>For instance, if it were known that this particular physical copy of the document was handled by certain specific persons, those individuals would naturally fall under suspicion — though of course a scenario exists in which someone outside the intended chain of custody could have obtained the physical copy, for instance, simply by picking it up from someone else’s desk or by finding it on a photocopier. Then again, there is also the possibility that the original source of the document is digital and that the source printed out a copy prior to leaking it, or that Politico itself printed out the digital copy prior to publishing it.</p>
<p>Investigators could also analyze the metadata of the digital version of the document using software such as <a href="https://exiftool.org/">ExifTool</a> for any clues about when, where, how, or by whom the digital copy was created. They could also exploit potential information-leaking <a href="https://www.cyber.gov.au/acsc/view-all-content/publications/examination-redaction-functionality-adobe-acrobat-pro-dc-2017">vulnerabilities</a> in the PDF creation and redaction process, which could inadvertently leave unintended and potentially identifying information in the digital document.</p>
<h2>The Environment</h2>
<p>In addition to the document itself, leak investigators will likely pay attention to the environment in which the leak originated. Modern commercial office printers generally come with a variety of ancillary functions like photocopying and scanning, while also typically keeping a running log of jobs the printer performs, which may include such information as the file name and page count of the document, the date and time the job was performed, as well as the username or IP address that initiated the job. If the printer also offers the capability to email a photocopy or scan of a document, a log may keep track of which jobs were sent to which email addresses and could even store a copy of the digital document in its memory.</p>
<p>Investigators will likely perform an audit of printer and network logs to see which staff members opened or otherwise interacted with the document in question. Investigators could also explore who had occasion to access the document as part of their day-to-day duties, as well as where the particular copy of the leaked document was physically stored, and who had occasion to access that space.</p>
<h2>The Leaker</h2>
<p>The practice of anomaly-based insider threat detection involves investigating staff who display any kind of irregular behavior or activity. For instance, if a staff member usually swipes into the office on work days at 8 a.m. and swipes out at 5 p.m., but access logs show them coming into the office at 10 p.m. on a Saturday in the days leading up to the leak, this finding would likely subject that staff member to scrutiny, which could include analyzing available surveillance footage.</p>
<p>Staff computer and phone usage, particularly web browsing, could also be analyzed to see if anyone previously visited the news site that published the leak, in this case Politico, or visited other webpages of potential interest, such as any that <a href="https://theintercept.com/source/">describe whistleblowers or leaking</a>. Rudimentary analysis could include looking through desktop browsing history, while a more thorough and sophisticated investigation would involve analyzing network traffic logs to determine whether Politico was accessed from a mobile device connected to the office Wi-Fi. Though of course in the case of Politico, a news website that covers politics and policy, it is likely to show up in quite a lot of staff logs and thus would likely not be a particularly fruitful finding for investigators.</p>
<p></p>
<p>“Sentiment analysis” may also be performed as part of an insider threat investigation by analyzing the various thoughts and opinions expressed by staff members in office communications. This kind of analysis could also utilize what’s often called “open source intelligence,” in the form of looking at staff social media postings to see if anyone had expressed interest in Politico, or any thoughts about the Alito opinion, or generally any signs of disgruntlement with their employer. Additionally, sentiment analysis may also include a review of staff postings on internal forums, as well as emails and private messages sent via channels controlled by the employer, such as <a href="https://www.vox.com/recode/2020/1/24/21079275/slack-private-messages-privacy-law-enforcement-lawsuit">direct messages sent over Slack</a>.</p>
<h2>Takeaways for Would-Be Leakers</h2>
<p>These potential methods of leak investigation may also be interpreted as lessons for future leakers to evade identification by adopting a number of counter-forensic measures.</p>
<p>To reduce the potential amount of information investigators may glean from a leaked document, leakers could send journalists a transcription or reproduction of the document instead of the original source document itself. While a transcription of the document will not successfully pass a <a href="https://en.wikipedia.org/wiki/Canary_trap">barium meal test</a> — in which each individual is given a uniquely phrased copy of the document, sophisticated forms of which may deploy <a href="https://www.cerias.purdue.edu/assets/pdf/bibtex_archive/PSI000441.pdf">natural language watermarking</a>, subtly altering the syntactic structure of every version of a document — it would nonetheless neutralize all other attempts at source document identification. Transcription would bypass efforts at identifying either errant or <a href="https://en.wikipedia.org/wiki/Machine_Identification_Code">intentional</a> markings on a page, as well as attempts at identifying positional watermarks such as subtle shifts in character or line spacing unique to each version of a document. Of course, this also would make it harder for journalists to verify a document’s authenticity, and care would have to be taken to ensure that the source left no identifying metadata in the transcription file.</p>
<p>Office equipment would best be avoided when making copies of a document, but using personal equipment can also be fraught with risk. <a href="https://www.sciencedirect.com/science/article/abs/pii/S0925231216303319">Source camera identification</a> is the forensic process of identifying the camera that took a particular photo. At times, this sort of identification may hinge on obvious features such as visible scratches on a lens or dead pixels on a screen. In other situations, the unique characteristics of an image might not be visible to the naked eye, but instead might be based on the unique image sensor noise each camera produces, otherwise known as <a href="https://www.sciencedirect.com/science/article/abs/pii/S1742287617302530">photo response non-uniformity</a>.</p>
<p>In other words, if leaked photographs of a document were to emerge, and leak investigators had particular suspects in mind, they could analyze photos posted to social media by the suspects to see if they provide an algorithmic match to the noise pattern in the leaked photos. When making audio recordings or photographs, therefore, it would be best practice to adopt the principle of one-time use: Use a temporary device like a cheap camera or smartphone that will be used only for the purposes of the leak, and then discard the device.</p>
<p>To avoid falling afoul of anomaly-detection triggers, would-be leakers might consider incorporating document acquisition as part of their normal routine instead of engaging in uncharacteristic behavior like clocking in at the office at odd hours or downloading files en masse. Likewise, leakers should avoid browsing news outlets while at work, both on their personal and of course work devices. Expressing any kind of disagreement or dissatisfaction with employer policies or decisions on either a company, public, or personal forum (such as during happy hour drinks) is also best avoided, as rigorous insider threat monitoring may keep tabs of any such behavior.</p>
<p>Leaking and subsequent leak investigations are back-and-forth games of forensics and counter-forensics, of operational security and its failures. While the risk of source identification can never be entirely eliminated, there are nonetheless various practical technical countermeasures which can be adopted to reduce the additional risk to sources who are already risking a great deal.</p>
<p>The post <a href="https://theintercept.com/2022/05/08/supreme-court-roe-wade-leak-investigation/">How a Supreme Court Investigation of the Roe v. Wade Leak Might Unfold</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2022/05/08/supreme-court-roe-wade-leak-investigation/feed/</wfw:commentRss>
                <slash:comments>0</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2022/05/GettyImages-1240429400-Forensic-Leak-Investigation-.jpg?fit=2000%2C1000' width='2000' height='1000' /><post-id xmlns="com-wordpress:feed-additions:1">395911</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2022/05/s111.jpg?w=440&amp;h=440&amp;crop=1" />
		<media:content url="https://theintercept.com/wp-content/uploads/2022/05/s111.jpg?fit=1467%2C637" medium="image">
			<media:title type="html">s111</media:title>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2022/05/s111.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2022/05/s22.jpg?fit=1632%2C755" medium="image">
			<media:title type="html">s22</media:title>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2022/05/s22.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2026/05/GettyImages-2269551139-e1778009487735.jpg_67b465-e1778013276916.webp?w=440&#038;h=440&#038;crop=1" medium="image" />
		<media:content url="https://theintercept.com/wp-content/uploads/2023/09/TI_Avatar01-01-200x200.png" medium="image" />
		<media:content url="https://theintercept.com/wp-content/uploads/2026/05/GettyImages-2273446312-e1777664306840.jpg?w=440&#038;h=440&#038;crop=1" medium="image">
			<media:title type="html">PORTLAND, MAINE - MAY 1: U.S. Senate candidate from Maine Graham Platner speaks during a campaign event with the Maine AFL-CIO, on May 1, 2026 in Portland, Maine. Platner, an oyster farmer by trade, is now the presumptive Democratic nominee before the Maine Primary election in June, after his chief rival Maine Governor Janet Mills (not-pictured) recently suspended her campaign.</media:title>
		</media:content>
            </item>
        
            <item>
                <title><![CDATA[What You Should Know Before Leaking a Zoom Meeting]]></title>
                <link>https://theintercept.com/2021/01/18/leak-zoom-meeting/</link>
                <comments>https://theintercept.com/2021/01/18/leak-zoom-meeting/#respond</comments>
                <pubDate>Mon, 18 Jan 2021 13:00:31 +0000</pubDate>
                                    <dc:creator><![CDATA[Nikita Mazurov]]></dc:creator>
                                		<category><![CDATA[Technology]]></category>

                <guid isPermaLink="false">https://theintercept.com/?p=339926</guid>
                                    <description><![CDATA[<p>At least one leaker has already been exposed. Here’s how to protect yourself or your sources.</p>
<p>The post <a href="https://theintercept.com/2021/01/18/leak-zoom-meeting/">What You Should Know Before Leaking a Zoom Meeting</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<p><u>As more and more</u> meetings take place over the videoconferencing service Zoom, it stands to reason that journalists will receive more and more audiovisual material leaked from such gatherings. This new leak medium poses unique challenges, requiring care to avoid exposing sources through digital watermarks or images of the user interface.</p>
<p>At least one Zoom leaker has already been unmasked: a member of the New York State Assembly who <a href="https://blog.timesunion.com/capitol/archives/291186/what-happens-in-vegas-stays-in-vegas-democrat-leaks-video-of-secret-conference-meeting/">apparently</a> filmed his “self-view” while recording a dispute within the Democratic assembly conference over the renomination of the speaker. That may sound careless, but a feature developed by Zoom will allow future leakers to be exposed even without that sort of misstep.</p>
<p></p>
<h3>Zoom Watermarking</h3>
<p>Many users may not realize it, but Zoom has the capability to insert both <a href="https://support.zoom.us/hc/en-us/articles/209605273-Adding-a-Watermark">video</a> and <a href="https://support.zoom.us/hc/en-us/articles/360021839031-Audio-Watermark">audio</a> watermarks into a meeting.</p>
<p><!-- BLOCK(photo)[1](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221024px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1024px;"><!-- CONTENT(photo)[1] -->
<img loading="lazy" decoding="async" class="aligncenter wp-image-339930 size-large" src="https://theintercept.com/wp-content/uploads/2021/01/1-zoomadminsettings.png?w=1024" alt="" width="1024" height="691" srcset="https://theintercept.com/wp-content/uploads/2021/01/1-zoomadminsettings.png?w=1190 1190w, https://theintercept.com/wp-content/uploads/2021/01/1-zoomadminsettings.png?w=300 300w, https://theintercept.com/wp-content/uploads/2021/01/1-zoomadminsettings.png?w=768 768w, https://theintercept.com/wp-content/uploads/2021/01/1-zoomadminsettings.png?w=1024 1024w, https://theintercept.com/wp-content/uploads/2021/01/1-zoomadminsettings.png?w=540 540w, https://theintercept.com/wp-content/uploads/2021/01/1-zoomadminsettings.png?w=1000 1000w" sizes="auto, (max-width: 1024px) 100vw, 1024px" />
<figcaption class="caption source">Video/audio watermark options in the Zoom settings panel.<br/>Screenshot: The Intercept</figcaption><!-- END-CONTENT(photo)[1] --></figure><!-- END-BLOCK(photo)[1] --></p>
<p><!-- BLOCK(photo)[2](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221024px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1024px;"><!-- CONTENT(photo)[2] -->
<img loading="lazy" decoding="async" class="aligncenter wp-image-339931 size-large" src="https://theintercept.com/wp-content/uploads/2021/01/2-zoomsettings.png?w=1024" alt="" width="1024" height="327" srcset="https://theintercept.com/wp-content/uploads/2021/01/2-zoomsettings.png?w=1227 1227w, https://theintercept.com/wp-content/uploads/2021/01/2-zoomsettings.png?w=300 300w, https://theintercept.com/wp-content/uploads/2021/01/2-zoomsettings.png?w=768 768w, https://theintercept.com/wp-content/uploads/2021/01/2-zoomsettings.png?w=1024 1024w, https://theintercept.com/wp-content/uploads/2021/01/2-zoomsettings.png?w=540 540w, https://theintercept.com/wp-content/uploads/2021/01/2-zoomsettings.png?w=1000 1000w" sizes="auto, (max-width: 1024px) 100vw, 1024px" />
<figcaption class="caption source">Zoom meeting scheduler video/audio watermark settings. (The individual meeting scheduler options appear after watermarking has been enabled via the main settings panel.)<br/>Screenshot: The Intercept</figcaption><!-- END-CONTENT(photo)[2] --></figure><!-- END-BLOCK(photo)[2] --></p>
<p>The video watermarks are readily perceptible to meeting participants. When enabled, the video watermarking feature superimposes the username portion of each participant’s email address over the content they are viewing when another participant shares their screen and places the same watermark over the current active speaker. Because the video watermark appears across the entirety of the video frame, blurring may adversely impact the visibility of the underlying material.</p>
<p><!-- BLOCK(photo)[3](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221024px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1024px;"><!-- CONTENT(photo)[3] -->
<img loading="lazy" decoding="async" class="aligncenter wp-image-339932 size-large" src="https://theintercept.com/wp-content/uploads/2021/01/3-zoompatent.png?w=1024" alt="" width="1024" height="991" srcset="https://theintercept.com/wp-content/uploads/2021/01/3-zoompatent.png?w=1686 1686w, https://theintercept.com/wp-content/uploads/2021/01/3-zoompatent.png?w=300 300w, https://theintercept.com/wp-content/uploads/2021/01/3-zoompatent.png?w=768 768w, https://theintercept.com/wp-content/uploads/2021/01/3-zoompatent.png?w=1024 1024w, https://theintercept.com/wp-content/uploads/2021/01/3-zoompatent.png?w=1536 1536w, https://theintercept.com/wp-content/uploads/2021/01/3-zoompatent.png?w=540 540w, https://theintercept.com/wp-content/uploads/2021/01/3-zoompatent.png?w=1000 1000w" sizes="auto, (max-width: 1024px) 100vw, 1024px" />
<figcaption class="caption source">Zoom <a href="https://patentimages.storage.googleapis.com/d0/ca/b3/75f4bccbfb071e/US10419511.pdf">patent</a> diagram illustrating the video watermark feature.<br/>Screenshot: The Intercept</figcaption><!-- END-CONTENT(photo)[3] --></figure><!-- END-BLOCK(photo)[3] --></p>
<p>In contrast, the audio watermarks are not readily perceptible to casual listeners, though they are what in watermarking parlance is known as “overt.” That means the fact that they are embedded is easily discerned by meeting participants: When a Zoom meeting has the audio watermark, or what Zoom also calls the “audio signature,” feature enabled, the meeting will have a green circular icon with a sound wave and a padlock at the top left of the frame next to the encryption icon.</p>
<p><!-- BLOCK(photo)[4](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221000px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1000px;"><!-- CONTENT(photo)[4] -->
<img loading="lazy" decoding="async" class="aligncenter wp-image-339933 size-large" src="https://theintercept.com/wp-content/uploads/2021/01/4-audiosignature.png?w=1000" alt="" width="1000" height="343" srcset="https://theintercept.com/wp-content/uploads/2021/01/4-audiosignature.png?w=1000 1000w, https://theintercept.com/wp-content/uploads/2021/01/4-audiosignature.png?w=300 300w, https://theintercept.com/wp-content/uploads/2021/01/4-audiosignature.png?w=768 768w, https://theintercept.com/wp-content/uploads/2021/01/4-audiosignature.png?w=540 540w" sizes="auto, (max-width: 1000px) 100vw, 1000px" />
<figcaption class="caption source">The presence of the circular audio watermark icon next to the encryption shield icon is an indicator that the audio of the meeting is watermarked.<br/>Screenshot: The Intercept</figcaption><!-- END-CONTENT(photo)[4] --></figure><!-- END-BLOCK(photo)[4] --></p>
<p>It is not immediately apparent at what point Zoom injects its “<a href="https://blog.zoom.us/zoom-voice-new-meetings-experience-conference-room-enhancements-and-integrations-now-generally-available/">ultrasonic</a>” audio watermark into the audio stream — whether this happens only if a meeting attendee presses the Record button in Zoom or if the audio stream is watermarked prior to that point. Nonetheless, when recording a Zoom meeting, it is best to avoid using Zoom’s built-in recording option and to capture the meeting using a third-party audio/video recorder. Zoom mentions that in order to identify the participant who recorded the meeting, they need at least two minutes of audio from the meeting, though it stands to reason that shorter snippets may also be identifiable if they happen to contain the audio watermark.</p>
<p>Journalists should also be wary of publishing raw audio leaked from Zoom meetings, particularly if the source is not sure whether audio watermarking was enabled or not.</p>
<h3>Recording Gotchas — Inadvertent Source Identification</h3>
<p>Aside from Zoom’s own watermarks, a number of elements appearing on an individual’s own device may inadvertently give away the identity of the person who is recording. If the meeting video is being recorded either via screen recording software or a camera<!-- Forgot I wanted to add a quick note about this too (see last newly added bulletpoint) -->, there are a number of elements to watch out for. For example:</p>
<p><!-- BLOCK(pullquote)[5](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22right%22%7D) --><blockquote class="stylized pull-right" data-shortcode-type="pullquote" data-pull="right"><!-- CONTENT(pullquote)[5] -->The video layout order should be manually rearranged.<!-- END-CONTENT(pullquote)[5] --></blockquote><!-- END-BLOCK(pullquote)[5] --></p>
<ul>
<li>When displaying meeting participants, Zoom software on a smartphone, laptop, or other device prioritizes displaying the attendee who is using the device<!-- I took another swing at this, hopefully it is getting better each time one of us revises it! :) at least I think so. Feel free to re-re-re revise. (As you can see I tried to avoid using the word "client" to make it slightly more accessible? I think it worked?) --><!-- Yeah, this reads well to me. -->. In other words, each participant will typically see themselves displayed in the top row on their screen when in a Zoom meeting. This in turn means that it may be possible to deduce who recorded a leaked Zoom video based on the participant order displayed on the screen. To mitigate against this, prior to video recording a Zoom meeting, the video layout order should be manually <a href="https://support.zoom.us/hc/en-us/articles/201362323-Changing-the-video-layout-Active-Speaker-View-and-Gallery-View-#h_01EJ7EVXH61CK63G23CJFBQY3C">rearranged</a> at random. If viewing the video in full-screen mode, care should be taken to remove self-view from the frame.</li>
<li>The Zoom app should be positioned in such a way on the desktop as to minimize the chance for interference from other desktop apps, such as the chance of new message or email notification pop-ups appearing over the Zoom window. Upon completion of the recording, the video should be carefully reviewed to make certain that no such identifying notifications inadvertently appeared anywhere in the recording.</li>
<li>In certain cases, even revealing information about the recording user’s underlying operating system may potentially compromise the source. For instance, if the source is recording a video of a company meeting from a Mac, and company personnel are known to predominantly use Windows, it may be possible to check meeting access logs to identify the meeting attendee who joined from a Mac. For this reason, the recording area may be tightly cropped to remove OS identifiers like menu or title bars. Additionally, elements such as mouse pointers should also be excluded from the recording area to avoid leaking information about the OS (owing to the fact that, for instance, a default mouse pointer on Windows machines is white with a black outline, while it is black with a white outline on Macs).</li>
<li>The participant recording the Zoom meeting should also be mindful of their participation in the meeting. For instance, if typing into the chatbox, this activity may be used to identify the recorder.</li>
<li>If recording meetings with an exterior device such as a phone camera, be aware that your camera may be uniquely identifiable via visible defects such as unique smudges or scratch patterns on the lens as well as a myriad of forensic techniques falling under the umbrella of <a href="https://scholar.google.com/scholar?q=source+camera+identification">source camera identification</a>. For especially sensitive meetings, it is advisable to use a recording device solely acquired for purposes of conducting the recording of a specific meeting and to dispose of the device after the recording.</li>
</ul>
<p>Zoom meetings present a unique set of challenges for source protection, but these challenges can be minimized by following best practices and taking care not to publish raw meeting materials unless there is high confidence that the recordings were not watermarked and have been thoroughly reviewed to make sure no other potentially identifying features are present in the audio or video.</p>
<p>The post <a href="https://theintercept.com/2021/01/18/leak-zoom-meeting/">What You Should Know Before Leaking a Zoom Meeting</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2021/01/18/leak-zoom-meeting/feed/</wfw:commentRss>
                <slash:comments>0</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2021/01/zoom-leak-theintercept-SH-2.png?fit=2000%2C1000' width='2000' height='1000' /><post-id xmlns="com-wordpress:feed-additions:1">339926</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2021/01/1-zoomadminsettings.png?w=440&amp;h=440&amp;crop=1" />
		<media:content url="https://theintercept.com/wp-content/uploads/2021/01/1-zoomadminsettings.png?fit=1190%2C803" medium="image">
			<media:title type="html">1-zoomadminsettings</media:title>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2021/01/1-zoomadminsettings.png?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2021/01/2-zoomsettings.png?fit=1227%2C392" medium="image">
			<media:title type="html">2-zoomsettings</media:title>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2021/01/2-zoomsettings.png?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2021/01/3-zoompatent.png?fit=1686%2C1632" medium="image">
			<media:title type="html">3-zoompatent</media:title>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2021/01/3-zoompatent.png?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2021/01/4-audiosignature.png?fit=1000%2C343" medium="image">
			<media:title type="html">4-audiosignature</media:title>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2021/01/4-audiosignature.png?w=440&amp;h=440&amp;crop=1" />
		</media:content>
            </item>
            </channel>
</rss>
