Articles by Micah Lee

We found 16 results.


Crumbling Case against Assange Shows Weakness of “Hacking” Charges Related to Whistleblowing
Micah Lee | The Intercept - TRANSCEND Media Service, 5 Oct 2020

30 Sep 2020 – The entire computer crime case against Assange is based on a brief discussion, between a publisher and source, about cracking a password — but the cracking never actually happened.

→ read full article

(Português) A acusação contra Julian Assange pelo governo dos EUA representa uma grave ameaça à liberdade de expressão
Glenn Greenwald e Micah Lee – The Intercept Brasil, 15 Apr 2019

12 Abr 2019 – O Departamento de Justiça americano usou a antipatia do público em relação ao Assange para tentar criminalizar uma função vital do jornalismo investigativo.

→ read full article

The U.S. Government’s Indictment of Julian Assange Poses Grave Threats to Press Freedom
Glenn Greenwald and Micah Lee – The Intercept, 15 Apr 2019

12 Apr 2019 – The Trump DOJ is exploiting animosity toward Assange to launch a thinly disguised effort to criminalize core functions of investigative journalism.

→ read full article

Edward Snowden’s New App Uses Your Smartphone to Physically Guard Your Laptop
Micah Lee – The Intercept, 25 Dec 2017

22 Dec 2017 – Edward Snowden and a team of collaborators have been working on a new open source Android app called Haven that you install on a spare smartphone, turning the device into a sort of sentry to watch over your laptop. “Haven” guards against so-called evil maid attacks, in which your boot software is surreptitiously modified to defeat encryption.

→ read full article

Cybersecurity for the People: How to Protect Your Privacy at a Protest
Micah Lee and Lauren Feeney – The Intercept, 24 Apr 2017

21 Apr 2017- Planning on going to a protest? You might not be aware that just by showing up, you can open yourself up to certain privacy risks — police often spy on protesters, and the smartphones they carry, and no matter how peaceful the demonstration, there’s always a chance that you could get detained or arrested, and your devices could get searched. Watch this video for tips on how to prepare your phone before you go to a protest, how to safely communicate with your friends and document the event, and what to do if you get detained or arrested.

→ read full article

Drowning in Information: NSA Revelations from 262 Spy Documents
Micah Lee and Margot Williams – The Intercept, 12 Dec 2016

7 Dec 2016 – By the first half of 2004, the National Security Agency was drowning in information. It had amassed 85 billion phone and online records and cut the ribbon on a new hacking center in Hawaii — but it was woefully short on linguists who could make sense of captured communications and lacked enough network analysts to effectively monitor all the systems it had hacked.

→ read full article

Upgrade Your iPhone Passcode to Defeat the FBI’s Backdoor Strategy
Micah Lee – The Intercept, 22 Feb 2016

18 Feb 2016 – Yesterday, apple CEO Tim Cook published an open letter opposing a court order to build the FBI a “backdoor” for the iPhone. By choosing a strong passcode, the FBI shouldn’t be able to unlock your encrypted phone, even if it installs a backdoored version of iOS on it. Not unless it has hundreds of years to spare.

→ read full article

XKEYSCORE (Part I) – NSA’s Google for the World’s Private Communications
Morgan Marquis-Boire, Glenn Greenwald, and Micah Lee – The Intercept, 6 Jul 2015

1 Jul 2015 – One of the National Security Agency’s most powerful tools of mass surveillance makes tracking someone’s Internet usage as easy as entering an email address, and provides no built-in technology to prevent abuse. Today, The Intercept is publishing 48 top-secret and other classified documents about XKEYSCORE.

→ read full article

XKEYSCORE (Part II) – Behind the Curtain: A Look at the Inner Workings of NSA
Micah Lee, Glenn Greenwald, and Morgan Marquis-Boire – The Intercept, 6 Jul 2015

Around the world, when a person gets online to do anything — write an email, post to a social network, browse the web or play a video game — there’s a decent chance that the Internet traffic her device sends and receives is getting collected and processed by one of XKEYSCORE’s hundreds of servers scattered across the globe.

→ read full article

First Look Publishes Open Source Code to Advance Privacy, Security and Journalism
Micah Lee – The Intercept, 1 Jun 2015

27 May 2015 – The Intercept and its publisher, First Look Media, strongly believe in the benefits of free and open source software — in part because we rely on such software every day. To keep our journalists and sources safe, we use secure communication tools.

→ read full article

Our SecureDrop System for Leaks Now Uses HTTPS
Micah Lee – The Intercept, 13 Apr 2015

The new setup helps assure leakers they are connecting with the authentic Intercept SecureDrop and not an impostor.

→ read full article

Passphrases That You Can Memorize — But That Even the NSA Can’t Guess
Micah Lee – The Intercept, 13 Apr 2015

It’s getting easier to secure your digital privacy. iPhones now encrypt a great deal of personal information; hard drives on Mac and Windows 8.1 computers are now automatically locked down. But none of this technology offers as much protection as you may think if you don’t know how to come up with a good passphrase.

→ read full article

Secret ‘BADASS’ Intelligence Program Spied on Smartphones
Micah Lee – The Intercept, 2 Feb 2015

26 Jan 2015 – British and Canadian spy agencies accumulated sensitive data on smartphone users, including location, app preferences, and unique device identifiers, by piggybacking on ubiquitous software from advertising and analytics companies, according to a document obtained by NSA whistleblower Edward Snowden.

→ read full article

How to Leak to The Intercept
Micah Lee – The Intercept, 2 Feb 2015

People often tell reporters things their employers, or their government, want to keep suppressed. But leaking can serve the public interest, fueling revelatory and important journalism. This publication was created in part as a platform for journalism arising from unauthorized disclosures by NSA contractor Edward Snowden.

→ read full article

How to Encrypt the Entire Web for Free
Micah Lee – The Intercept, 24 Nov 2014

If we’ve learned one thing from the Snowden revelations, it’s that what can be spied on will be spied on. Since the advent of what used to be known as the World Wide Web, it has been a relatively simple matter for network attackers—whether it’s the NSA, Chinese intelligence, your employer, your university, abusive partners, or teenage hackers on the same public WiFi as you—to spy on almost everything you do online.

→ read full article

Encryption Works: How to Protect Your Privacy in the Age of NSA Surveillance
Micah Lee – Freedom of the Press Foundation, 24 Mar 2014

Defending yourself against the NSA, or any other government intelligence agency, is not simple, and it’s not something that can be solved just by downloading an app. But thanks to the dedicated work of civilian cryptographers and the free and open source software community, it’s still possible to have privacy on the Internet, and the software to do it is freely available to everyone. This is especially important for journalists communicating with sources online.

→ read full article