JULIAN ASSANGE VICTORIOUS IN UK COURT FIGHT

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Here is the the Court Judgement

Democracy Now – Julian Assange Is FREE – Charges Dropped

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

 

Julian Assange Twitter, Julian Assange Dead, Julian Assange Pamela Anderson, Julian Assange Movie, Julian Assange Wikileaks, Julian Assange Russia, Julian Assange Documentary, Julian Assange Missing, Julian Assange Trump, Julian Assange News, Julian Assange And Pamela Anderson, Julian Assange Age, Julian Assange And Pamela, Julian Assange Amal Clooney, Julian Assange And Russia, Julian Assange Alive, Julian Assange And Wikileaks, Julian Assange Ama, Julian Assange And Edward Snowden, Julian Assange Aliens, Julian Assange Biography, Julian Assange Bio, Julian Assange Book, Julian Assange Birthday, Julian Assange Breaking News, Julian Assange Birth Chart, Julian Assange Bill Hader, Julian Assange Bitcoin, Julian Assange Biografia, Julian Assange Born, Julian Assange Children, Julian Assange Cat, Julian Assange Clinton, Julian Assange Citizenship, Julian Assange Chelsea Manning, Julian Assange Cgi, Julian Assange Comey, Julian Assange Contact, Julian Assange Conference, Julian Assange Chelsea Manning Tweet, Julian Assange Dead, Julian Assange Documentary, Julian Assange Dancing, Julian Assange Democracy Now, Julian Assange Documentary Risk, Julian Assange Death, Julian Assange Doc, Julian Assange Daniel Berg, Julian Assange Dnc, Julian Assange Daughter, Julian Assange Ecuador, Julian Assange Embassy Cat, Julian Assange Education, Julian Assange Edward Snowden, Julian Assange Ecuador Election, Julian Assange Election, Julian Assange Early Life, Julian Assange Email Address, Julian Assange Essay, Julian Assange Ethics, Julian Assange Film, Julian Assange Facebook, Julian Assange Family, Julian Assange Free, Julian Assange Father, Julian Assange Found, Julian Assange Found Dead, Julian Assange Facts, Julian Assange Free Speech, Julian Assange Fbi, Julian Assange Geralt, Julian Assange Wikileaks, Julian Assange Google, Julian Assange Gif, Julian Assange Guitar Center, Julian Assange Genius, Julian Assange Wife, Julian Assange Guardian, Julian Assange Witcher, Julian Assange Wikileaks Twitter, Julian Assange Home, Julian Assange Hannity, Julian Assange History, Julian Assange Haircut, Julian Assange Horoscope, Julian Assange Holds News Conference, Julian Assange Hologram, Julian Assange Height, Julian Assange Hacks, Julian Assange Huffington Post, Julian Assange Interview, Julian Assange Images, Julian Assange Is Dead, Julian Assange Iq, Julian Assange Interview Seth Rich, Julian Assange Interview Hannity, Julian Assange Is Dating, Julian Assange Income, Julian Assange Iceland, Julian Assange Imdb, Julian Assange Journalist, Julian Assange Jared Kushner, Julian Assange Jeremy Scahill, Julian Assange Julia Ka Mange Le, Julian Assange Jeremy Corbyn, Julian Assange John Pilger, Julian Assange Julia Ka Mangal, Julian Assange John Inman, Julian Assange Kim Dotcom, Julian Assange Kushner, Julian Assange Kimdir, Julian Assange Kenya, Julian Assange Kenya Election, Julian Assange Location, Julian Assange Latest News, Julian Assange Lady Gaga, Julian Assange Lawyer, Julian Assange Lives, Julian Assange Laura Poitras, Julian Assange London, Julian Assange Life, Julian Assange Long Hair, Julian Assange Latest Interview, Julian Assange Movie, Julian Assange Missing, Julian Assange Memes, Julian Assange Married, Julian Assange Movie Risk, Julian Assange Manning, Julian Assange Macron, Julian Assange Mendax, Julian Assange May 2017, Julian Assange Mark Zuckerberg, Julian Assange News, Julian Assange Net Worth, Julian Assange Nationality, Julian Assange News Conference, Julian Assange News Today, Julian Assange Now, Julian Assange Net Worth 2017, Julian Assange Natal Chart, Julian Assange Netflix, Julian Assange Noam Chomsky, Julian Assange On Seth Rich, Julian Assange On Trump, Julian Assange On Twitter, Julian Assange Offers Reward, Julian Assange On Syria, Julian Assange On Russia, Julian Assange Obama, Julian Assange On Donald Trump, Julian Assange October Surprise, Julian Assange On Reality Winner, Julian Assange Pamela Anderson, Julian Assange Pamela, Julian Assange Press Conference, Julian Assange Pictures, Julian Assange Photos, Julian Assange Proof Of Life, Julian Assange Podcast, Julian Assange Parents, Julian Assange Pronunciation, Julian Assange Partner, Julian Assange Quotes, Julian Assange Quotes About Truth, Julian Assange Quien Es, Julian Assange Qualifications, Julian Assange Quote Injustice, Julian Assange Q, Julian Assange Quotes Mark Zuckerberg, Julian Assange Qc, Julian Assange Quick Facts, Julian Assange Quantum Mechanics, Julian Assange Russia, Julian Assange Reddit, Julian Assange Rt, Julian Assange Risk Movie, Julian Assange Residence, Julian Assange Russian Hacking, Julian Assange Reward, Julian Assange Released, Julian Assange Room, Julian Assange Rich, Julian Assange Son, Julian Assange Sean Hannity, Julian Assange Salary, Julian Assange Story, Julian Assange Showtime, Julian Assange Snl, Julian Assange Seth Rich Interview, Julian Assange Syria, Julian Assange Simpsons, Julian Assange Snowden, Julian Assange Twitter, Julian Assange Trump, Julian Assange Today, Julian Assange The Unauthorised Autobiography, Julian Assange Ted Talk, Julian Assange Twitter Verified, Julian Assange Tv Show, Julian Assange Time Magazine, Julian Assange The Simpsons, Julian Assange This Is How It Ends, Julian Assange Update, Julian Assange Usa Today, Julian Assange Ufo, Julian Assange Un, Julian Assange Uk, Julian Assange Usa, Julian Assange United Nations, Julian Assange Ultimas Noticias, Julian Assange Update News, Julian Assange Underground, Julian Assange Video, Julian Assange Vault 7, Julian Assange Verified Twitter, Julian Assange Vice, Julian Assange Vs Edward Snowden, Julian Assange Venezuela, Julian Assange Vs Mark Zuckerberg, Julian Assange Vigil, Julian Assange Vikipedi, Julian Assange Vegetarian, Julian Assange Wikileaks, Julian Assange Wife, Julian Assange Witcher, Julian Assange Website, Julian Assange Washington Post, Julian Assange Worth, Julian Assange Wikileaks Twitter, Julian Assange Wikileaks Seth Rich, Julian Assange Where Is, Julian Assange Wikileaks Founder, Julian Assange Young, Julian Assange Youtube, Julian Assange Youtube 2017, Julian Assange Youth, Julian Assange Young Pictures, Julian Assange You’re The Voice, Julian Assange Yahoo, Julian Assange Yes Campaign, Julian Assange Youtube 2015, Julian Assange Yoko Ono, Julian Assange Zodiac, Julian Assange Zizek, Julian Assange Zoolander, Julian Assange Zimbabwe, Julian Assange Zivotopis, Julian Assange Mark Zuckerberg, Julian Assange Slavoj Zizek Interview, Julian Assange Mark Zuckerberg Quote, Julian Assange Mark Zuckerberg Snl, Julian Assange Vs Mark Zuckerberg

Video – Trend Micro about Putins Cyber Espionage Troops Pawn Storm

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

 

Cyber Espionage Definition, Cyber Espionage Cases, Cyber Espionage China, Cyber Espionage Prevention, Cyber Espionage Russia, Cyber Espionage Pdf, Cyber Espionage The Chinese Threat, Cyber Espionage History, Cyber Espionage International Law, Cyber Espionage Cases 2016, Cyber Espionage Act, Cyber Espionage Articles, Cyber Espionage Attacks, Cyber Espionage Adalah, Cyber Espionage And International Law, Cyber Espionage Australia, Cyber Espionage And Cyber Warfare, Cyber Espionage Attack Methods, Cyber Espionage Books, Cyber Espionage Beyond The Rule Of Law, Cyber Espionage Business, Cyber Espionage By China, Cyber Espionage Brazil, Cyber Espionage By Chinese Actors, Cyber Espionage Blog, Cyber Espionage By Country, Bagaimana Cyber Espionage Dapat Muncul, Best Cyber Espionage Books, Cyber Espionage Cases, Cyber Espionage China, Cyber Espionage Cases 2016, Cyber Espionage Case Study, Cyber Espionage Cases 2017, Cyber Espionage Cases In India, Cyber Espionage Campaign, Cyber Espionage China Us, Cyber Espionage Cost, Cyber Espionage Canada, Cyber Espionage Definition, Cyber Espionage Documentary, Cyber Espionage Def, Cyber Espionage Definition Pdf, Economic Cyber Espionage Definition, Bagaimana Cyber Espionage Dapat Muncul, Why Is Cyber Espionage Difficult To Prevent, Contoh Kasus Cyber Espionage Di Indonesia, How Is Cyber Espionage Done, Dragonfly Cyber Espionage, Cyber Espionage Examples, Cyber Espionage Edward Snowden, Cyber Espionage Effects, Cyber Espionage Essay, Cyber Economic Espionage, Cyber Economic Espionage Accountability Act, Cyber Espionage In Middle East, Economic Cyber Espionage And International Law, Economic Cyber Espionage Definition, Explain Cyber Espionage, Cyber Espionage Facts, Cyber Espionage Fiction, Cyber Espionage First Case, Cyber Espionage F 35, Cyber Espionage Law Firms, Fbi Cyber Espionage, France Cyber Espionage, A Theory Of Cyber Espionage For The Intelligence Community, French Cyber Espionage, Flame Cyber Espionage, Cyber Espionage Groups, Cyber Espionage Germany, Cyber Espionage Georgia, Cyber-espionage The Greatest Transfer Of Wealth In History, Cyber-espionage A Growing Threat To The American Economy, Cyber Espionage Against Georgia, Cyber Espionage Against Georgian Government, What Are Cyber Espionage Groups Stealing From The United States, Cyber Espionage To Splinter Internet Governance, Global Cyber Espionage, Cyber Espionage History, Huawei Cyber Espionage, Hellsing Cyber Espionage, Cyber Espionage International Law, Cyber Espionage Incidents, Cyber Espionage India, Cyber Espionage Is Alive And Well, South African Cyber Espionage, Cyber Espionage In China, Cyber Espionage In Middle East, Cyber Espionage Iran, Cyber Espionage In Canada, Cyber Espionage Impact, Cyber Espionage Jobs, Cyber Espionage Japan, Cyber Espionage Kenya, Kaspersky Cyber Espionage, Kasus Cyber Espionage, Kasus Cyber Espionage Di Indonesia, Kejahatan Cyber Espionage, Karakteristik Cyber Espionage, Cyber Espionage Law, Cyber Espionage Law Firms, Cyber Espionage International Law, Cyber Espionage Definition Law, Cyber Espionage Is Reaching Crisis Levels, Pengertian Dari Cyber Espionage Lengkap, Le Cyber Espionnage Definition, Cyber Espionage Meaning, Cyber Espionage Movies, Cyber Espionage Methods, Cyber-espionage Nightmare – Mit Technology Review, Cyber Espionage Attack Methods, Cyber Espionage In Middle East, Chinese Cyber Espionage Mandiant, Chinese Cyber Espionage Map, Bagaimana Cyber Espionage Dapat Muncul, Military Cyber Espionage, Cyber Espionage News, Cyber Espionage North Korea, Cyber-espionage Nightmare, Cyber Espionage National Security, Cyber Espionage Novels, Cyber Espionage Nato, Ghostnet Cyber Espionage Network, Nsa Cyber Espionage, Nortel Cyber Espionage, Cyber Espionage Operations, Cyber Espionage Red October, Cyber Espionage And Cyber Espionage, Cyber-espionage The Greatest Transfer Of Wealth In History, Cyber Espionage Prevention, Cyber Espionage Pdf, Cyber Espionage Ppt, Cyber Espionage Pronunciation, Cyber Espionage Presentation, Cyber Espionage Pictures, Cyber Espionage Problems, Cyber Espionage Purpose, Cyber Espionage Ppt Slideshare, Cyber Espionage Research Paper, Cyber Espionage Quotes, Cyber Espionage Research Questions, Cyber Espionage Russia, Cyber Espionage Research Paper, Cyber Espionage Rule Of Law, Cyber Espionage Report, Cyber Espionage Red October, Cyber Espionage Research Questions, Cyber Espionage Ring, Cyber Espionage Is Reaching Crisis Levels, Cyber Espionage Techrepublic, Russian Cyber Espionage, Cyber Espionage Statistics, Cyber Espionage Synonym, Cyber Espionage Simulator, Cyber Espionage Security Issues, Cyber Espionage Statistics 2015, Cybersecurity Espionage, Espionage In Cyberspace, Cyber Espionage Case Study, Cyber Espionage To Splinter Internet Governance, South African Cyber Espionage, Cyber Espionage The Chinese Threat, Cyber Espionage Threat, Cyber Espionage Tools, Cyber Espionage Trends, Cyber Espionage The Chinese Threat Case Study, Cyber Espionage To Splinter Internet Governance, Cyber-espionage The Greatest Transfer Of Wealth In History, Cyber Espionage Thesis, Cyber Espionage Training, Cyber Espionage Tactics, Cyber Espionage Uk, Us Cyber Espionage, Cyber Espionage Un, Cyber Espionage Us China, China’s Cyber Espionage Units, Russian Cyber Espionage Under The Microscope, China Cyber Espionage And U.s. National Security, Pla Cyber Espionage Unit, Cyber Espionage Vs Cyber Warfare, Cybercrime Vs Cyber Espionage, Cyber Espionage Vs Cyber Attack, Cyber Espionage Virus, Cyber Espionage Wiki, Cyber Espionage & Warfare, Cyber Weapons Espionage, Cyber Espionage Vs Cyber Warfare, Cyber Espionage And Cyber Warfare Definition, Cyber Espionage Youtube

Unveiled – Swedish Prosecutors Ask Assange for Clarifications

 

The prosecutors have received Julian Assange’s consent, with some reservations, to be interviewed in London and have his DNA taken. The prosecutors have asked for clarifications concerning the reservations.

– As soon as it becomes clear that there are no obstacles for the planned investigation matters, we will submit a request for legal assistance to the British authorities to further continue the investigation. A request will also be sent to the Ecuadorian authorities regarding permission to perform investigative measures at the country’s embassy in London, says Director of Public Prosecution Marianne Ny.

At present, it is not possible to estimate when the interview will take place.

Julian Assange Twitter, Julian Assange Dead, Julian Assange Pamela Anderson, Julian Assange Movie, Julian Assange Wikileaks, Julian Assange Russia, Julian Assange Documentary, Julian Assange Missing, Julian Assange Trump, Julian Assange News, Julian Assange And Pamela Anderson, Julian Assange Age, Julian Assange And Pamela, Julian Assange Amal Clooney, Julian Assange And Russia, Julian Assange Alive, Julian Assange And Wikileaks, Julian Assange Ama, Julian Assange And Edward Snowden, Julian Assange Aliens, Julian Assange Biography, Julian Assange Bio, Julian Assange Book, Julian Assange Birthday, Julian Assange Breaking News, Julian Assange Birth Chart, Julian Assange Bill Hader, Julian Assange Bitcoin, Julian Assange Biografia, Julian Assange Born, Julian Assange Children, Julian Assange Cat, Julian Assange Clinton, Julian Assange Citizenship, Julian Assange Chelsea Manning, Julian Assange Cgi, Julian Assange Comey, Julian Assange Contact, Julian Assange Conference, Julian Assange Chelsea Manning Tweet, Julian Assange Dead, Julian Assange Documentary, Julian Assange Dancing, Julian Assange Democracy Now, Julian Assange Documentary Risk, Julian Assange Death, Julian Assange Doc, Julian Assange Daniel Berg, Julian Assange Dnc, Julian Assange Daughter, Julian Assange Ecuador, Julian Assange Embassy Cat, Julian Assange Education, Julian Assange Edward Snowden, Julian Assange Ecuador Election, Julian Assange Election, Julian Assange Early Life, Julian Assange Email Address, Julian Assange Essay, Julian Assange Ethics, Julian Assange Film, Julian Assange Facebook, Julian Assange Family, Julian Assange Free, Julian Assange Father, Julian Assange Found, Julian Assange Found Dead, Julian Assange Facts, Julian Assange Free Speech, Julian Assange Fbi, Julian Assange Geralt, Julian Assange Wikileaks, Julian Assange Google, Julian Assange Gif, Julian Assange Guitar Center, Julian Assange Genius, Julian Assange Wife, Julian Assange Guardian, Julian Assange Witcher, Julian Assange Wikileaks Twitter, Julian Assange Home, Julian Assange Hannity, Julian Assange History, Julian Assange Haircut, Julian Assange Horoscope, Julian Assange Holds News Conference, Julian Assange Hologram, Julian Assange Height, Julian Assange Hacks, Julian Assange Huffington Post, Julian Assange Interview, Julian Assange Images, Julian Assange Is Dead, Julian Assange Iq, Julian Assange Interview Seth Rich, Julian Assange Interview Hannity, Julian Assange Is Dating, Julian Assange Income, Julian Assange Iceland, Julian Assange Imdb, Julian Assange Journalist, Julian Assange Jared Kushner, Julian Assange Jeremy Scahill, Julian Assange Julia Ka Mange Le, Julian Assange Jeremy Corbyn, Julian Assange John Pilger, Julian Assange Julia Ka Mangal, Julian Assange John Inman, Julian Assange Kim Dotcom, Julian Assange Kushner, Julian Assange Kimdir, Julian Assange Kenya, Julian Assange Kenya Election, Julian Assange Location, Julian Assange Latest News, Julian Assange Lady Gaga, Julian Assange Lawyer, Julian Assange Lives, Julian Assange Laura Poitras, Julian Assange London, Julian Assange Life, Julian Assange Long Hair, Julian Assange Latest Interview, Julian Assange Movie, Julian Assange Missing, Julian Assange Memes, Julian Assange Married, Julian Assange Movie Risk, Julian Assange Manning, Julian Assange Macron, Julian Assange Mendax, Julian Assange May 2017, Julian Assange Mark Zuckerberg, Julian Assange News, Julian Assange Net Worth, Julian Assange Nationality, Julian Assange News Conference, Julian Assange News Today, Julian Assange Now, Julian Assange Net Worth 2017, Julian Assange Natal Chart, Julian Assange Netflix, Julian Assange Noam Chomsky, Julian Assange On Seth Rich, Julian Assange On Trump, Julian Assange On Twitter, Julian Assange Offers Reward, Julian Assange On Syria, Julian Assange On Russia, Julian Assange Obama, Julian Assange On Donald Trump, Julian Assange October Surprise, Julian Assange On Reality Winner, Julian Assange Pamela Anderson, Julian Assange Pamela, Julian Assange Press Conference, Julian Assange Pictures, Julian Assange Photos, Julian Assange Proof Of Life, Julian Assange Podcast, Julian Assange Parents, Julian Assange Pronunciation, Julian Assange Partner, Julian Assange Quotes, Julian Assange Quotes About Truth, Julian Assange Quien Es, Julian Assange Qualifications, Julian Assange Quote Injustice, Julian Assange Q, Julian Assange Quotes Mark Zuckerberg, Julian Assange Qc, Julian Assange Quick Facts, Julian Assange Quantum Mechanics, Julian Assange Russia, Julian Assange Reddit, Julian Assange Rt, Julian Assange Risk Movie, Julian Assange Residence, Julian Assange Russian Hacking, Julian Assange Reward, Julian Assange Released, Julian Assange Room, Julian Assange Rich, Julian Assange Son, Julian Assange Sean Hannity, Julian Assange Salary, Julian Assange Story, Julian Assange Showtime, Julian Assange Snl, Julian Assange Seth Rich Interview, Julian Assange Syria, Julian Assange Simpsons, Julian Assange Snowden, Julian Assange Twitter, Julian Assange Trump, Julian Assange Today, Julian Assange The Unauthorised Autobiography, Julian Assange Ted Talk, Julian Assange Twitter Verified, Julian Assange Tv Show, Julian Assange Time Magazine, Julian Assange The Simpsons, Julian Assange This Is How It Ends, Julian Assange Update, Julian Assange Usa Today, Julian Assange Ufo, Julian Assange Un, Julian Assange Uk, Julian Assange Usa, Julian Assange United Nations, Julian Assange Ultimas Noticias, Julian Assange Update News, Julian Assange Underground, Julian Assange Video, Julian Assange Vault 7, Julian Assange Verified Twitter, Julian Assange Vice, Julian Assange Vs Edward Snowden, Julian Assange Venezuela, Julian Assange Vs Mark Zuckerberg, Julian Assange Vigil, Julian Assange Vikipedi, Julian Assange Vegetarian, Julian Assange Wikileaks, Julian Assange Wife, Julian Assange Witcher, Julian Assange Website, Julian Assange Washington Post, Julian Assange Worth, Julian Assange Wikileaks Twitter, Julian Assange Wikileaks Seth Rich, Julian Assange Where Is, Julian Assange Wikileaks Founder, Julian Assange Young, Julian Assange Youtube, Julian Assange Youtube 2017, Julian Assange Youth, Julian Assange Young Pictures, Julian Assange You’re The Voice, Julian Assange Yahoo, Julian Assange Yes Campaign, Julian Assange Youtube 2015, Julian Assange Yoko Ono, Julian Assange Zodiac, Julian Assange Zizek, Julian Assange Zoolander, Julian Assange Zimbabwe, Julian Assange Zivotopis, Julian Assange Mark Zuckerberg, Julian Assange Slavoj Zizek Interview, Julian Assange Mark Zuckerberg Quote, Julian Assange Mark Zuckerberg Snl, Julian Assange Vs Mark Zuckerberg, Swedish Authorities Approve Of Child Marriage, Swedish Authorities Agree To Tackle Pfas, Swedish Authorities, Swedish Tax Authorities, Swedish Health Authorities, Swedish Local Authorities, Swedish Vat Authorities, Swedish Regulatory Authorities, Swedish Tax Authorities Skatteverket, Swedish Food Authorities, Swedish Authorities Approve Of Child Marriage, Swedish Authorities Agree To Tackle Pfas, Swedish Food Authorities, Swedish Financial Authorities, Swedish Health Authorities, Swedish Immigration Authorities, Swedish Local Authorities, Swedish Association Of Local Authorities And Regions Brussels, Swedish Association Of Local Authorities And Region, Swedish Maritime Authorities, Swedish Regulatory Authorities, Swedish Association Of Local Authorities & Regions, Swedish Tax Authorities Skatteverket, Swedish Tax Authorities, Swedish Tax Authorities Skatteverket, Swedish Vat Authorities, Sweden Flag, Sweden Map, Sweden Time, Sweden Population, Sweden Currency, Sweden Capital, Sweden News, Sweden Language, Sweden In Spanish, Sweden Weather, Sweden Airport, Sweden Abbreviation, Sweden Attractions, Sweden Attack, Sweden Area Code, Sweden Airlines, Sweden And Norway, Sweden Airbnb, Sweden Age Of Consent, Sweden And Finland, Sweden Baby Box, Sweden Birth Rate, Sweden Beaches, Sweden Bans Mandatory Vaccinations, Sweden Bays, Sweden Backpack, Sweden Biomass, Sweden Borders, Sweden Basic Income, Sweden Bus, Sweden Currency, Sweden Capital, Sweden Country Code, Sweden Cities, Sweden Culture, Sweden Climate, Sweden Crime Rate, Sweden Capital City, Sweden Consulate Chicago, Sweden Civ 5, Sweden Democrats, Sweden Demographics, Sweden Drinking Age, Sweden During Ww2, Sweden Desserts, Sweden Draft, Sweden Denmark, Sweden Debt, Sweden Drug Laws, Sweden Denmark Norway, Sweden Economy, Sweden Eu, Sweden Education, Sweden Elections, Sweden Exports, Sweden Embassy In Chicago, Sweden Eu4, Sweden Embassy, Sweden Euro, Sweden Exchange Rate, Sweden Flag, Sweden Facts, Sweden Food, Sweden Fish, Sweden Fun Facts, Sweden Flag Emoji, Sweden Flights, Sweden Finland Norway, Sweden Far Right, Sweden Free College, Sweden Government, Sweden Gdp, Sweden Gun Laws, Sweden Gdp Per Capita, Sweden Government Type, Sweden Geography, Sweden Grenade Attacks, Sweden Games, Sweden Gdp Growth, Sweden Gni, Sweden Hetalia, Sweden Health Care, Sweden Hate Registry, Sweden History, Sweden Holidays, Sweden Hate List, Sweden Hockey, Sweden House Hotel, Sweden House Lodge Rockford Il, Sweden Hospital, Sweden In Spanish, Sweden Immigration, Sweden Ice Hotel, Sweden In Ww2, Sweden In Swedish, Sweden Income Tax, Sweden Islam, Sweden Immigration Policy, Sweden Images, Sweden Immigration News, Sweden Jobs, Sweden Jersey, Sweden Jail, Sweden Jokes, Sweden June 6, Sweden Joining Nato, Sweden June Weather, Sweden Jewelry, Sweden July Weather, Sweden Jonkoping, Sweden King, Sweden Krona, Sweden Krona To Usd, Sweden Known For, Sweden King And Queen, Sweden Knife, Sweden Kream, Sweden King Hats, Sweden Kingdom, Sweden Ky, Sweden Language, Sweden Landscape, Sweden Life Expectancy, Sweden Location, Sweden Local Time, Sweden Literacy Rate, Sweden Landmarks, Sweden Laundry, Sweden Leader, Sweden Last Names, Sweden Map, Sweden Money, Sweden Muslim, Sweden Maternity Leave, Sweden Military, Sweden Minimum Wage, Sweden Migrants, Sweden Movie, Sweden Mountains, Sweden Meme, Sweden News, Sweden No Go Zones, Sweden Nato, Sweden National Team, Sweden National Animal, Sweden Neutral, Sweden National Anthem, Sweden Norway, Sweden Natural Resources, Sweden Names, Sweden On Map, Sweden Official Language, Sweden On World Map, Sweden Outline, Sweden Olympics, Sweden Official Hate List, Sweden Obesity Rate, Sweden Official Name, Sweden Oil, Sweden Or Norway, Sweden Population, Sweden People, Sweden Population 2017, Sweden Population 2016, Sweden President, Sweden Prison, Sweden Pictures, Sweden Princess, Sweden Politics, Sweden Postal Code, Sweden Queen, Sweden Quality Of Life, Sweden Quotes, Sweden Quick Facts, Sweden Quiz, Sweden Quantitative Easing, Sweden Quora, Sweden Qualifier, Sweden Qe, Sweden Questions, Sweden Refugees, Sweden Rape Statistics, Sweden Religion, Sweden Royal Family, Sweden Riots, Sweden Recycling, Sweden Reddit, Sweden Refugee Crisis, Sweden Real Estate, Sweden Rape Crisis, Sweden Shop, Sweden Sweets, Sweden Socialism, Sweden Soccer, Sweden Soccer Jersey, Sweden Soccer Team, Sweden School System, Sweden Sports, Sweden Size, Sweden Stockholm, Sweden Time, Sweden Tax Rate, Sweden Travel, Sweden Tourism, Sweden To English, Sweden Temperature, Sweden Translate, Sweden Truck Attack, Sweden Twitter, Sweden Third World, Sweden Unemployment Rate, Sweden Universities, Sweden Universal Health Care, Sweden Unlimited, Sweden Universal Basic Income, Sweden Uppsala, Sweden Usa, Sweden Un, Sweden Us Embassy, Sweden Us Exchange Rate, Sweden Visa, Sweden Vacation, Sweden Vs Norway, Sweden Visa Chicago, Sweden Vikings, Sweden Vaccines, Sweden Visa Usa, Sweden Vs France, Sweden Vs Denmark, Sweden Vs Usa, Sweden Weather, Sweden Women, Sweden Ww2, Sweden Work Hours, Sweden Wiki, Sweden Work Week, Sweden Word Whizzle, Sweden World Map, Sweden Weather In July, Sweden World Cup, Sweden X Finland, Sweden X Reader, Sweden X Reader Lemon, Sweden X Denmark, Sweden X Male Reader Lemon, Sweden X Male Reader, Sweden X Reader Fluff, Sweden X Reader X Denmark Lemon, Sweden X Child Reader, Sweden X Pregnant Reader, Sweden Yes, Sweden Youtube, Sweden Yachts, Sweden Yearly Weather, Sweden Yelling, Sweden Yes Reddit, Sweden Yellow Pages, Sweden Yes Map, Sweden Yachts 45, Sweden Youth Unemployment Rate, Sweden Zip Code, Sweden Zoo, Sweden Zlatan, Sweden Zip Code Format, Sweden Zlatan Jersey, Sweden Zip Code Lookup, Sweden Zlatan Ibrahimovic, Sweden Zillow, Sweden Zero Waste, Sweden Zigzagzigal, Prosecutor Definition, Prosecutor Warframe, Prosecutor Salary, Prosecutor Office, Prosecutor In Spanish, Prosecutor Princess, Prosecutor Salary Chicago, Prosecutor Oj Simpson, Prosecutor Attorney, Prosecutor Synonym, Prosecutor Attorney, Prosecutor Attorney Salary, Prosecutor Antonym, Prosecutor Arrested, Prosecutor Annual Salary, Prosecutor As Bully, Prosecutor Ayala, Prosecutor Assistant, Prosecutor Amend Charges, Prosecutor Attorney Office, Prosecutor By Karpel, Prosecutor Badge, Prosecutor Bloodline, Prosecutor Benefits, Prosecutor Beranton J. Whisenant Jr, Prosecutor By Lesco, Prosecutor Burnout, Prosecutor Bill Clinton, Prosecutor Books, Prosecutor Blog, Prosecutor Ceres, Prosecutor Career, Prosecutor Chemical, Prosecutor Cover Letter, Prosecutor Clipart, Prosecutor Case Management Software, Prosecutor Cover Letter Examples, Prosecutor Court, Prosecutor Charged, Prosecutor Conflict Of Interest, Prosecutor Definition, Prosecutor Definition Law, Prosecutor Define, Prosecutor Duties, Prosecutor Degree, Prosecutorial Discretion, Prosecutor Dead, Prosecutor Dead In Florida, Prosecutor Darden, Prosecutor Definition Quizlet, Prosecutor Ethics, Prosecutor Found Dead, Prosecutor Found Dead In Florida, Prosecutor Fallacy, Prosecutor Found Dead On Florida Beach, Prosecutor Found Dead On Beach, Prosecutor Fitzgerald, Prosecutor For Casey Anthony, Prosecutor Faints Oj Simpson Trial, Prosecutor From Law And Order, Prosecutor Florida, Prosecutor General, Prosecutor Godot, Prosecutor Government Definition, Prosecutor General Of Crimea, Prosecutor Gif, Prosecutor General Of Russia, Prosecutor Gifts, Prosecutor General Usa, Prosecutor Grass Killer, Prosecutor Gail Levine, Prosecutor Herbicide, Prosecutor Herbicide Lesco, Prosecutor How To Become, Prosecutor Hours, Prosecutor Heart Attack Oj, Prosecutor Hourly Pay, Prosecutor Has Rejected The Charge, Prosecutor Hired By Mueller, Prosecutor Hides Evidence, Prosecutor Hypotheticals, Prosecutor In Spanish, Prosecutor In A Sentence, Prosecutor In The Crucible, Prosecutor Integrity, Prosecutor Interview Questions, Prosecutor Impact, Prosecutor In French, Prosecutor Immunity, Prosecutor In Korean, Prosecutor Investigator, Prosecutor Jobs, Prosecutor Jobs Illinois, Prosecutor Juan Martinez, Prosecutor Job Description, Prosecutor Job Outlook, Prosecutor Jennifer Solari, Prosecutor Jokes, Prosecutor Judge And Jury, Prosecutor Jobs Texas, Prosecutor Juan Martinez Bio, Prosecutor Killed, Prosecutor Killed In Florida, Prosecutor Kevin Crane, Prosecutor Kratz, Prosecutor Korean Drama, Prosecutor Korean Movie, Prosecutor Kym Worthy, Prosecutor Kate Macdougall, Prosecutor Kevin Steele, Prosecutor Killed In Miami, Prosecutor Lawyer, Prosecutor Label, Prosecution Lawyer, Prosecutor Law And Order, Prosecutor Legal Definition, Prosecutor Lesco, Prosecutor Law Definition, Prosecution Laches, Prosecutor Law, Prosecution Lawyer Salary, Prosecutor Meaning, Prosecutorial Misconduct, Prosecutor Mueller, Prosecutor Marcia Clark, Prosecutor Meme, Prosecutor Murdered, Prosecutor Making A Murderer, Prosecutor Matt Murphy, Prosecutor Michelle Snodgrass, Prosecutor Movie, Prosecutor Nifong, Prosecutor Nuremberg, Prosecutor Near Me, Prosecutor Nixon Fired, Prosecutor Not Filing Charges, Prosecutor News, Prosecutor Nicholas Mcghee, Prosecutor Nuremberg Trials, Prosecutor Non-selective Herbicide, Prosecutor Nyc Salary, Prosecutor Office, Prosecutor Oj Simpson, Prosecutor On Ceres, Prosecutor On Law And Order, Prosecutor Of Crimea, Prosecutor On Law And Order Svu, Prosecutor On Perry Mason, Prosecutor On Bloodline, Prosecution Opening Statement, Prosecutor On Svu, Prosecutor Princess, Prosecutor Pro, Prosecutor Pro Label, Prosecutor Pay, Prosecutor Princess Ep 1, Prosecutor Pesticide, Prosecutor Payne, Prosecutor Patrick Fitzgerald, Prosecutor Princess Kiss, Prosecutor Persona 5, Prosecutor Questions, Prosecutor Quotes, Prosecutor Quizlet, Prosecutor Questions To Ask, Prosecutor Qualifications, Prosecutor Qualities, Prosecutor Qld, Prosecutor Quiz, Prosecutor Questioning Techniques, Prosecutor Quezon City, Prosecutor Role, Prosecutor Responsibilities, Prosecutor Robert Mueller, Prosecutor Recusal, Prosecutor Reddit, Prosecutor Resume, Prosecutor Ravi Sinha, Prosecutor Refuses To Press Charges, Prosecutor Resources, Prosecutor Ray Tensing, Prosecutor Salary, Prosecutor Salary Chicago, Prosecutor Synonym, Prosecutor Sentence, Prosecutor Spanish, Prosecutor Salary New York, Prosecutor School, Prosecutor Steven Avery, Prosecutor Salary Texas, Prosecutor Sharon May, Prosecutor Training, Prosecutor Trump, Prosecutor Terry White, Prosecutor Ted Talk, Prosecutor The Keepers, Prosecutor Tkam, Prosecutor Translate, Prosecutor Tv Show, Prosecutor The Wire, Prosecutor Ty Cobb, Prosecutor Us, Prosecutor Uniform, Prosecutor Used In A Sentence, Prosecutor Urban Dictionary, Prosecutor Urick, Prosecutor Union County Nj, Prosecutor Uk, Prosecutor Uk Salary, Prosecutor Ukraine, Prosecutor Urdu Meaning, Prosecutor Vs Roundup, Prosecutor V Tadic, Prosecutor Vs Da, Prosecutor Vs Attorney, Prosecutor Vs Judge, Prosecutor V Akayesu, Prosecutor Voir Dire, Prosecutor Vs Persecutor, Prosecutor Vs Defense, Prosecutor V Defendant, Prosecutor Warframe, Prosecutor Weed Killer, Prosecutor Warframe Ceres, Prosecutor Weed Killer Label, Prosecutor Whisenant, Prosecutor Watergate, Prosecutor Work Hours, Prosecutor Wiki, Prosecutor Warscroll, Prosecutor Washes Up On Beach, Prosecutor Yearly Salary, Prosecutor Yanez, Prosecutor Yates, Prosecutor Yusuf Baba, Prosecutor Youtube, Prosecutor Yahoo Answers, Prosecutor Youngstown Ohio, Prosecutor York Region, Prosecutor Yoo Suk, Prosecutor Years In College, Prosecutor Zircon, Prosecutor Zahid Hussain, Zainab Ahmad Prosecutor, Prosecutor Zargan, Prosecutor Zurich, Prosecutor Zainab Ahmad, Prosecutor Za, Prosecutor Zettler, Zimbabwe Prosecutor General, Zimmerman Prosecutor Indicted,

Unveiled – WikiLeaks Project K-Release of Kissinger Cables

WikiLeaks Project K – Release of Kissinger Cables

A sends:

From: “Sunshine Press”
Date: Apr 7, 2013 7:37 PM
Subject: WIKILEAKS PRESS RELEASE | THE KISSINGER CABLES OVER 1.3 MILLION DOCUMENTS
To: “Sunshine Press The”

WIKILEAKS SPECIAL PROJECT K: THE KISSINGER CABLES

‘Investigative journalism has never been this effective!’ Publico

The Kissinger Cables are part of today’s launch of the WikiLeaks Public Library of US Diplomacy (PlusD), which holds the world’s largest searchable collection of United States confidential, or formerly confidential, diplomatic communications. As of its launch on April 8, 2013 it holds 2 million records comprising approximately 1 billion words.

WikiLeaks’ publisher Julian Assange stated: “The collection covers US involvements in, and diplomatic or intelligence reporting on, every country on Earth. It is the single most significant body of geopolitical material ever published.”

THE KISSINGER CABLES

“The illegal we do immediately; the unconstitutional takes a little longer.” — Henry A. Kissinger, US Secretary of State, March 10, 1975: http://wikileaks.org/plusd/cables/P860114-1573_MC_b.html#efmCS3CUB

The Kissinger Cables comprise more than 1.7 million US diplomatic records for the period 1973 to 1976, including 205,901 records relating to former US Secretary of State Henry A. Kissinger. Dating from January 1, 1973 to December 31, 1976 they cover a variety of diplomatic traffic including cables, intelligence reports and congressional correspondence. They include more than 1.3 million full diplomatic cables and 320,000 originally classified records. These include more than 227,000 cables classified as “CONFIDENTIAL” and 61,000 cables classified as “SECRET”. Perhaps more importantly, there are more than 12,000 documents with the sensitive handling restriction “NODIS” or ‘no distribution’, and more than 9,000 labelled “Eyes Only”.

At around 700 million words, the Kissinger Cables collection is approximately five times the size of WikiLeaks’ Cablegate. The raw PDF data is more than 380 Gigabytes in size and is the largest WikiLeaks publication to date.

WikiLeaks’ media partners will be reporting throughout the week on their findings. These include significant revelations about US involvements with fascist dictatorships, particularly in Latin America, under Franco’s Spain (including about the Spanish royal family) and in Greece under the regime of the Colonels.

The documents also contain hourly diplomatic reporting on the 1973 war between Israel, Egypt and Syria (the “Yom Kippur war”). While several of these documents have been used by US academic researchers in the past, the Kissinger Cables provides unparalleled access to journalists and the general public.

Most of the records were reviewed by the United States Department of State’s systematic 25-year declassification process. At review, the records were assessed and either declassified or kept classified with some or all of the metadata records declassified. Both sets of records were then subject to an additional review by the National Archives and Records Administration (NARA). Once believed to be releasable, they were placed as individual PDFs at the National Archives as part of their Central Foreign Policy Files collection. Despite the review process supposedly assessing documents after 25 years there are no diplomatic records later than 1976. The formal declassification and review process of these extremely valuable historical documents is therefore currently running 12 years late.

The form in which these documents were held at NARA was as 1.7 million individual PDFs. To prepare these documents for integration into the PlusD collection, WikiLeaks obtained and reverse-engineered all 1.7 million PDFs and performed a detailed analysis of individual fields, developed sophisticated technical systems to deal with the complex and voluminous data and corrected a great many errors introduced by NARA, the State Department or its diplomats, for example harmonizing the many different ways in which departments, capitals and people’s names were spelt. All our corrective work is referenced and available from the links in the individual field descriptions on the PlusD text search interface: https://search.wikileaks.org/plusd

RECLASSIFICATION ATTEMPTS THWARTED

The CIA and other agencies have attempted to reclassify or withhold sections of the US National Archives. Detailed minutes of US State Department meetings show that these attempts, which originated under the Bush II administration, have continued on through until at least 2009. A 2006 analysis by the US National Security Archives, an independent non-governmental research institute and library located at George Washington University, found that 55,000 pages had been secretly reclassified.

The censorship of the US National Archives was thrown into stark relief in November last year when the Archive censored all searches for ‘WikiLeaks’ from its records. See http://dissenter.firedoglake.com/2012/11/03/us-national-archives-has-blocked-searches-for-wikileaks/

Julian Assange, WikiLeaks’ publisher, said: “The US administration cannot be trusted to maintain the history of its interactions with the world. Fortunately, an organisation with an unbroken record in resisting censorship attempts now has a copy.”

MEDIA ORGANIZATIONS REPORTING THIS WEEK

Australia – Fairfax (Sydney Morning Herald, The Age, the Canberra Times and the Australian Fianancial Review)
Argentina – Pagina 12
Brazil – Publica
Bulgaria – Bivol
Egypt – Al Masry Al Youm
Greece – Ta Nea
Guatemala – Plaza Publica
Haiti – Haiti Liberte
India – The Hindu
Italy – L’Espresso
Italy – La Repubblica
Lebanon – Al Akhbar
Mexico – La Jornada
Spain – Publico
Sweden – Aftonbladet
UK – Press Association
US – Associated Press
US – The Nation

PRESS CONFERENCE

WikiLeaks Special Project K: concerning the United States, Latin America, the Middle East, Africa, Central and South East Asia, Europe and the Pacific, with special focus on Israel, Russia, India, Japan, South Africa, France and Francophone Africa.

WHERE

The National Press Club
The Holeman Lounge
529 14th St. NW
13th Floor
Washington, DC
20045

+1 202-662-7500

WHEN

Monday April 8th at 9am (Washington time)

INTERVIEWS

WikiLeaks Spokesperson Kristinn Hrafnsson is available for interviews after the press conference please make arrangements with Melanie Lerardi ( Mlerardi@press.org ) or +1 (202) 662 7502 alternatively you can call Kristinn directly on +354 821 7121 or email sunshinepress@this.is

STATUS UPDATES

WIKILEAKS AND JULIAN ASSANGE

After WikiLeaks’ publication of Pentagon and State Department documents in 2010, the White House launched a multi-agency investigation into WikiLeaks and its publisher Julian Assange. The investigation includes the Department of Justice (DOJ), the FBI, the State Department, the CIA and the Defense Intelligence Agency (DIA) among others. The DoJ / FBI investigation is ongoing, as is its associated Grand Jury in Alexandria, Virginia, which is headed up by District Attorney Neil McBride, a current candidate for the FBI directorship.

A number of senior political figures in the United States have called for the assassination, extraordinary rendition or kidnapping of Julian Assange and other WikiLeaks staff and for the execution of WikiLeaks US sources: http://www.youtube.com/watch?v=ZuQW0US2sJw

The Grand Jury has coercively forced numerous people to give testimony in secret and to do so without the presence of a judge or defence lawyer. The actions of the Grand Jury, including issuing PATRIOT Act ‘subpoenas’ against Twitter, Google and other companies, is the subject of ongoing legal proceedings.

On 1 February this year, the Associated Press reported that the FBI was conducting an illegal investigation into WikiLeaks‚Äô activities in Iceland. This investigation was discovered by the Icelandic Minister of the Interior, Ögmundur Jónasson, who ordered the FBI to leave and issued a formal diplomatic protest to the United States.

Julian Assange, an Australian, was granted political asylum on 19 August 2012 by the government of Ecuador. He remains under their protection in the Embassy of Ecuador in London. British police have surrounded the embassy and the British government admits to spending more than $4.5 million on this policing presence so far. Contrary to international law, the United Kingdom refuses to grant Julian Assange safe passage to Ecuador, saying that he must be extradited to Sweden to answer questions. He has not been charged with an offence in either country and the chief of the Swedish Supreme Court says there is no legal reason why Swedish police cannot go to London should they wish to speak to him.

By 8 April 2013 Julian Assange will have been imprisoned, detained under house arrest in the United Kingdom, and unable to leave the protective custody of the Ecuadorian Embassy for a total of 854 days.

On 11 April 2013 a feature film about Julian Assange in his formative years will open the Washington DC International Film Festival: http://www.filmfestdc.org

Julian Assange is a popular figure in his native Australia, where he is running for the Australian Senate. The latest poll, by Labour party polling outfit UMR, showed he had 27 per cent of the voting intention: http://wikileaksparty.org.au/

For further information see: http://justice4assange.com/extraditing-assange.html and https//usvwikileaks.org/ and http://justice4assange.com/

BRADLEY MANNING

An alleged WikiLeaks source, intelligence analyst Bradley Manning, now aged 25, was arrested on 26 May 2010 by US Army investigators. Manning was detained under extreme conditions in Kuwait and Marine Corps Base Quantico, Virginia. The United Nations Rapporteur on Torture Juan E. Mendez formally found these conditions to amount to “cruel and abusive treatment” akin to torture. Judge Denise Lind of the US military court found that his conditions were illegal. After the resignation of Assistant Secretary of State for Public Affairs P. J. Crowley over the issue, Manning was transferred to Fort Leavenworth, Kansas, and the Quantico barracks were decommissioned. Mr. Manning’s defence team said that the abusive treatment may have been in order to break Mr. Manning into turning State’s witness against WikiLeaks publisher Julian Assange.

By 8 April 2013 Bradley Manning will have been detained without trial for 1049 days, the longest detention without trial of a US soldier in modern history. His trial is said by Guantanamo beat reporters to be more secret that the military commissions held against al Qaeda suspects. It is scheduled for 2 June 2013 at Fort Meade, Maryland. WikiLeaks, the Center for Constitutional Rights and more than 30 other media organizations have filed suit against the US military for the abuse of secrecy used in prosecuting the case.

ECONOMIC CENSORSHIP: BANKING BLOCKADE

After documented political pressure, including from Senator Joseph Lieberman and Congressman Peter T. King, VISA, MasterCard, Bank of America, PayPal, Western Union, AMEX, Diners Club, Discover and JCB erected an extra-legal banking blockade against the WikiLeaks organization and its donors. The blockade is the subject of ongoing litigation and a resolution by the European Parliament. It has been condemned by the United Nations Special Rapporteur for Freedom of Expression, Frank La Rue, the New York Times, Reporters Without Borders, the Electronic Frontier Foundation, Amnesty International, the Council of Europe, and numerous other organizations.

The fiscal blockade against WikiLeaks is similar to that conducted against the central banks of Cuba and Iran, however, unlike these two countries, the WikiLeaks blockade is being conducted with no known legal or administrative basis. In fact, the US Secretary of the Treasury found in early 2011 that there was no legal reason to place WikiLeaks under a US embargo. Due to the market dominance of VISA, MasterCard and PayPal, the extra-legal action has cut off 95 per cent of WikiLeaks’ income stream, costing the organization more than $50 million dollars.

All litigation to date has been won by WikiLeaks and its partners, but the blockade continues. An appeal, lodged by Valitor (Visa Iceland) is to be heard by the Icelandic Supreme Court on April 15, 2013.

BREAKING THE BLOCKADE: THE US FREEDOM OF THE PRESS FOUNDATION

In December 2012 Daniel Ellsberg, John Cusack, John Perry Barlow, Glenn Greenwald and others launched the Freedom of the Press Foundation, which allows US citizens to bypass the blockade to make tax-deductable and anonymous donations to WikiLeaks. For more information go to: See https://pressfreedomfoundation.org/ and http://wikileaks.org/WikiLeaks-declares-war-on-banking.html
[]YouTube – Videos from this email

Revealed – Bradley Manning Attorney on Statement Release

Bradley Manning Attorney on Statement Release


Date: 1 Mar 2013 11:57:42 -0700
From: “The Law Office of David E. Coombs” <info[at]armycourtmartialdefense.com>
Subject: [Auto-Reply] Request for Bradley Manning Statement

Thank you for your recent inquiry. A representative from our office will contact you as soon as possible.

**If this is an inquiry regarding United States v. Manning, our office will not be granting interviews or responding to inquires at this time. However, recognizing the public’s interest in this case, we will be issuing regular public releases at www.armycourtmartialdefense.info.

_____

To: info[at]armycourtmartialdefense.com
Subject: Request for Bradley Manning Statement
Dated: March 1, 2013

Dear Mr. Coombs,

We respectfully request for publication a copy of the full statement by PFC Bradley Manning in court yesterday, February 28, 2013.

Publication will be on Cryptome.org, a public education website.

Thanks very much.

Unveiled by Cryptome – Bradley Manning Military Spying Analyzed

Bradley Manning Military Spying Analyzed

 


This comments on Alexa O’Brien’s Narration of Bradley Manning’s court statement, February 28, 2013:

http://www.alexaobrien.com/secondsight/wikileaks/bradley_manning/pfc_bradley_e_manning_
providence_hearing_statement.html

Manning’s statement provides useful information to understand military spying seldom revealed to the public. His statement was not only advised by his defense attorney but vetted by military intelligence as mandated for court proceedings.

1. Manning cites his advanced training as a military spy at Fort Huachaca, AZ, Military Occupational Specialty (MOS) 35F; this MOS requires Top Secret/SCI clearance.*

1.1 He does not describe specific skills he obtained and their application during training. Presumably much of this is classified.

2. Manning cites his military spying duty at Fort Drum, NY.

2.1 He does not describe specifics of what this spying involved. Presumably much of this is classified, particular that associated with spying inside the United States or on US persons.

2.2 Nor if this spying inside the United States and against US persons was legal. Military uses, and perhaps personal use, is likely classified.

3. Manning describes surveilling websites, chat rooms, and other fora as part of his military spying duites, including targets located in the United States and against US persons.

3.1. He does not describe if this surveillance was recorded and applied for military spying purposes by him and/or others in addition to his personal use.

3.2 Nor if this spying inside the United States and against US persons was legal. Military uses, and perhaps personal use, is likely classified.

4. Manning describes chats and communications allegedly with representatives of WikiLeaks.

4.1 He does not describe if these were recorded and/or used for military spying purposes. Presumbly military uses are classified.

5. Manning describes his back-ups of data and analysis of military spying.

5.1 He does not describe military systems back-ups which are conventional in most systems and in particular on systems handling classiifed information.

5.2 Presumably these back-ups will contain data about his and all others’ back-ups and downloads.

6. Manning describes archiving and sharing of spying data and analysis for general use.

6.1 He does not describe multi-level security measures customarily applied to archiving and sharing systems.

6.2 Presumbably these security systems recorded all uploads, downloads and accesses to archiving and sharing systems.

7. Manning describes lax monitoring of computer and network usage, outages, work-arounds and contingencies of systems he used in military spying as justification for his personal initiatives.

7.1 He does not describe counter-intelligence measures to track usage, outage, work-arounds and contingencies long associated with computer and networks, especially those handling classified information.

8. Manning admits to disclosing lightly classified information in his statement.

8.1 He does not disclose any lightly or other classified information in his statement. Presumably advised to not do so.

9. Manning does not describe military spy training in deception, undercover, ruse, lying, impersonation, dupery, false innocence, attacks, counter-attacks, guile, sabotage, planting false information, spread of disinformation, ploys and other spy tradecraft, in particular those associated with the cyber-spy curriculum at Fort Huachuca, AZ.

9.1 Presumbably much of this is classified.

10. Manning describes use of Tor for anonymizing.

10.1 He does not describe faults in Tor:

10.2 Its principal funding by the US Government;

10.3 Its tax-exempt status by the US Government;

10.4 Its principal place of operation in the US;

10.5 Its principal staffing by US persons;

10.6 Its principal board members by US persons;

10.7 Its vulnerability of tracking users through sniffing of nodes and instantaneous access to node activity by planted-ware (including the nodes which claim to not log).

_________

Corollaries:

11. The USG will call 140 or more witnesses for the Manning trial.

11.1 Presumably no prosecution classified testimony will be public, as before.

12. Manning defense will call its witnesses.

12.1 Presumably no defense classified testimony will be public, as before.

13. Military court may withhold information from the public more than civilian courts.

13.1 Information, evidence and testimonry can be classified to avoid disclosure by using military courts to cloak illegal operations.

14. MOS 35F has been revised in response to Manning disclosures, imprisonment and prosecution.

14.1 MOS 35F revisions will not be made public, especially spying inside the United States and against US persons, as before.

15. There will no disclosure of using young service members to spy inside and outside the United States, as long practiced and more recently online.

16. There will be no disclosure of manipulating young service members to believe they know more than they do or getting away with more than they are — standard means and methods of spy operations.

17. There will be no disclosure of manipulating the public by encouraging ostensibly opposition media coverage.

18. There will be no disclosure of manipulating friendly and hostile participants to inform on each other.

More later when the official transcript is released — with the likelihood it may be redacted, doctored or revised for security clearance.

 


* Top Secret clearance is for life; even it is withdrawn there is no escape from the obligation to never reveal what was learned under the clearance (Daniel Ellsberg readily admits he never revealed all he knew for that reason; nor has the other famous US disclosers not in jail or buried).

 


 

 

 

 


Cryptome – Assange’s International Subversive Vol 1

Assange International Subversive

 


A sends:

Here is “International Subversive” Vol#1, the Hacking E-zine produced / edited by the Australian ‘hacker’ Mendax in 1991 (reference: Dreyfus, “Underground: Tales of hacking, madness and obsession on the electronic frontier” Ch.8

http://suelette.home.xs4all.nl/underground/justin/chapter_8.html ) aka Assange

The document came to me in several pieces – I’ve made no changes to the content other than to stick them together in order and add in some formatting (spaces) that tidy up some of the headings, so all spelling mistakes etc are originals (there are two section “2.4” & two section “2.7”, the later of each should be sections “2.5” & “2.8” respectively I guess according to the contents section). Best viewed with a fixed-width font.

The E-zine lists its editor as ‘The Chthonic Hvee’, presumably Mendax wielded his electronic editorial pen to publish under a different alias (in the same way he was able to change is alias from ‘proff’ to ‘Mendax’ being a research contributor to the Dreyfus book. Interesting.).

I can’t confirm the original source of the document or the accuracy of its content so it comes to you with all appropriate disclaimers – perhaps some of Cryptomes readers will be familiar with the incidents , etc., discussed within and can comment further, if you decide to publish this.

http://cryptome.org/2013/01/International_Subversive__Volume1.txt.gz

Revealed – Former C.I.A. Officer Is the First to Face Prison for a Classified Leak

The first C.I.A. officer to be
convicted of disclosing classified
information to a reporter in more
than six decades is scheduled to be
sentenced to 30 months in prison on
Jan. 25. John Kiriakou is to be
sentenced as part of a plea deal in
which he admitted e-mailing the name
of a covert officer to a
reporter.His prosecution, as well as
five others, has been lauded on
Capitol Hill as a long-overdue
response to a rash of dangerous
disclosures and defended by both
President Obama and Attorney General
Eric H. Holder Jr.Mr. Kiriakou is
remorseful, up to a point. “I
should never have provided the
name,” he said.Supporters say
Mr. Kiriakou neither intended to
damage national security nor did so.
Some see a dark paradox in the
impending imprisonment of Mr.
Kiriakou, who in a 2007 appearance
on ABC News defended the
C.I.A.’s use of desperate
measures to get information but also
said that he had come to believe
that waterboarding was torture and
should no longer be used.

Important – WikiLeaks is Now Tax Deductible in U.S. and E.U.

Dear Friend of WikiLeaks

This week sees the launch of the Freedom of the Press Foundation − a new initiative
inspired by the fight against the two-year-long extra-judicial financial embargo
imposed on WikiLeaks by U.S. financial giants including Visa, MasterCard, PayPal and
the Bank of America.

The Freedom of Press Foundation is tax deductible across America and takes credit
cards, PayPal and google Checkout.

The other week Wau Holland, who collect money for WikiLeaks in Germany, announced
they are tax deductible across Europe and can take bank transfers. 

Make the most of your donation this Christmas and ensure it is tax deductible using
one of these methods.

Full press release on launch of Freedom of the Press Foundation:
http://wikileaks.org/WikiLeaks-declares-war-on-banking.html
Full Press release on Wau Holland tax deductibility:
http://wikileaks.org/WikiLeaks-donations-now-tax.html
All ways to donate: http://shop.wikileaks.org/donate 

https://wlfriends.org/
http://www.swedenversusassange.com/
http://www.bradleymanning.org/
http://freehammond.com/
http://freeanakata.se/index
http://freeanons.org/

Revealed – WikiLeaks declares war on banking blockade

 

assange

Dear Friend of WikiLeaks 

Today sees the launch of the Freedom of the Press Foundation − a new initiative
inspired by the fight against the two-year-long extra-judicial financial embargo
imposed on WikiLeaks by U.S. financial giants including Visa, MasterCard, PayPal and
the Bank of America.   

The Freedom of the Press Foundation (https://pressfreedomfoundation.org/about), an
initiative of Electronic Frontier Foundation (EFF) co-founder John Perry Barlow,
former Pentagon Papers whistleblower Daniel Ellsberg, the actor John Cusack and
others, will crowd-source fundraising and support for organizations or individuals
under attack for publishing the truth. It aims to promote "aggressive,
public-interest journalism focused on exposing mismanagement, corruption and
law-breaking in government".   

Over the last two years the blockade has stopped 95 per cent of contributions to
WikiLeaks, running primary cash reserves down from more than a million dollars in
2010 to under a thousand dollars, as of December 2012. Only an aggressive attack
against the blockade will permit WikiLeaks to continue publishing through 2013. 

The new initiative, combined with a recent victory in Germany, means contributions
to WikiLeaks now have tax-deductible status throughout the United States and Europe.

Julian Assange, WikiLeaks' publisher, said: “We've fought this immoral blockade for
two long years. We smashed it in the courts. We smashed it in the Treasury. We
smashed it in France. We smashed it in Germany. And now, with strong and generous
friends who still believe in First Amendment rights, we're going to smash it in the
United States as well.” 

The Foundation's first 'bundle' will crowd-source funds for WikiLeaks, the National
Security Archive, The UpTake and MuckRock News. Donors will be able to use a slider
to set how much of their donation they wish each organization to receive and can
donate to WikiLeaks using their credit cards. The Foundation holds 501(c) charitable
status, so donations are tax-deductible in the U.S. Other courageous press
organizations will be added as time goes by. It will not be possible to see by
banking records what portion of a donor's contribution, if any, goes to WikiLeaks. 

It is admitted by Visa, MasterCard and others that the blockade is entirely as a
result of WikiLeaks' publications. In fact, the U.S. Treasury has cleared WikiLeaks
and WikiLeaks has won against Visa in court, but the blockade continues. 

John Perry Barlow
(http://www.guardian.co.uk/technology/2012/apr/20/hacktivists-battle-internet?INTCMP=SRCH),
a board member of the new Foundation, says the initiative aims to achieve more than
just crowd-sourced fundraising: "We hope it makes a moral argument against these
sorts of actions. But it could also be the basis of a legal challenge. We now have
private organizations with the ability to stifle free expression. These companies
have no bill of rights that applies to their action – they only have terms of
service." 

The WikiLeaks banking blockade showed how devastating such extra-judicial measures
can be for not-for-profit investigative journalism and free press organizations.
Initiatives such as the Freedom of the Press Foundation are vital to sustain a truly
independent free press.  
In heavily redacted European Commission documents recently released by WikiLeaks
(http://wikileaks.org/European-Commission-enabling.html#pr), MasterCard Europe
admitted that U.S. Senate Homeland Security Chairman Joseph Lieberman and
Congressman Peter T. King were both directly involved in instigating the blockade. 

As journalist Glenn Greenwald
(http://www.guardian.co.uk/commentisfree/2012/nov/23/anonymous-trial-wikileaks-internet-freedom)
− also on the FPF board − recently wrote: "What possible political value can the
internet serve, or journalism generally, if the U.S. government, outside the
confines of law, is empowered − as it did here − to cripple the operating abilities
of any group which meaningfully challenges its policies and exposes its
wrongdoing?... That the U.S. government largely succeeded in using extra-legal and
extra-judicial means to cripple an adverse journalistic outlet is a truly
consequential episode: nobody, regardless of one's views on WikiLeaks, should want
any government to have that power."   

But what of the chance these U.S. companies will blockade the FPF like they did
WikiLeaks? "Let Visa, Mastercard, PayPal and all the rest block the independent
Freedom of the Press Foundation. Let them demonstrate to the world once again who
they really are," said Mr Assange.

Wikileaks – Two Years of Cablegate as Bradley Manning Testifies for the First Time

assange

Dear Friend of WikiLeaks

We recently celebrated the two-year anniversary of Cablegate on the same day as
Bradley Manning testified for the first time about the torture he has received at
the hands of the U.S. government.   

To mark this occasion Julian Assange wrote a piece for the Huffington Post showing
some of the effects of Cablegate across the globe, including helping to end the Iraq
War and playing a crucial part in the Arab Spring.   

When WikiLeaks started to publish Cablegate, the largest diplomatic leak in history,
the U.S. government retaliated with unprecedented attacks on Julian Assange and
WikiLeaks, including threats to assassinate Assange and establishing an
extra-judicial banking blockade against WikiLeaks and Assange.   

Despite these attempts to close down WikiLeaks we continued in 2012 with even more
publications: the GI Files, Syria Files and the Detainee Policies. Along with our
supporters we shall continue to fight through next year as well. 

Read Julian Assange's full article here: 
English [en]:
http://www.huffingtonpost.com/julian-assange/wikileaks-bradley-manning-testifies-cablegate_b_2215387.html

Spanish [es]:
http://www.huffingtonpost.es/julian-assange/dos-anos-de-cablegate-bra_b_2216375.html

French [fr]:
http://www.huffingtonpost.fr/julian-assange/bradley-manning-wikileaks-assange_b_2216565.html

Italian [it]:
http://www.huffingtonpost.it/julian-assange/contro-il-blocco-finanzia_b_2218367.html

http://shop.wikileaks.org/donate 
https://wlfriends.org/
http://www.swedenversusassange.com/
http://www.bradleymanning.org/
http://freehammond.com/
http://freeanakata.se/index
http://freeanons.org/

--------------------------------

Two Years of Cablegate as Bradley Manning Testifies for the First Time by Julian
Assange in The Huffington Post

Thursday, November 29th, Bradley Manning testified for the first time since his
arrest two and a half years ago in Baghdad. Today also marks the two-year
anniversary of the first front pages around the world from Cablegate, an archive of
251,287 U.S. State Department diplomatic cables -- messages sent between the State
Department and its embassies, consulates and diplomatic missions around the world.
In collaboration with a network of more than 100 press outlets we revealed the full
spectrum of techniques used by the United States to exert itself around the world.
The young intelligence analyst Bradley Manning was detained as an alleged source.

WikiLeaks came under attack, with American politicians and right-wing pundits
calling for all of us to be designated as terrorists, some even calling for my
assassination and the kidnapping of our staff. Speaking on Meet The Press, Vice
President Joe Biden referred to me as a "high-tech terrorist," while Senator Joe
Lieberman demanded that we be prosecuted under the U.S. Espionage Act. The
Department of Justice spokesperson Dean Boyd admitted as recently as July 2012 that
the Department of Justice investigation into WikiLeaks is ongoing, and the Pentagon
renewed its threats against us on September 28th, declaring our work an "ongoing
crime." As a result, I have been granted political asylum and now live in the
Ecuadorian embassy in London, surrounded by armed police while the FBI portion of
the "whole of government" investigation against us, according to court testimony,
had reached 42,135 pages as of December last year.

Earlier this week, WikiLeaks released European Commission documents showing that
Senator Lieberman and Congressman Peter T. King directly influenced decisions by
PayPal, Visa and MasterCard to block donations to WikiLeaks, which has blocked 95
percent of our donors since December of 2010. Last week the European Parliament
expressed its will that the Commission should prevent the arbitrary blockade of
WikiLeaks.

Bradley Manning, who is alleged to be a source of the cables, started testifying on
Thursday about his pre-trial treatment, which UN Special Rapporteur Juan Mendez said
was "at a minimum cruel, inhuman and degrading treatment in violation of Article 16
of the Convention against Torture." Captain William Hoctor, the government
psychiatrist with 24 years of experience who evaluated Manning at Quantico base in
Virginia, testified that brig commanders had ignored his recommendations for
Manning's detention, something he had not even experienced in his work at Guantánamo
bay prison.

Bradley Manning has been detained without trial for 921 days. This is the longest
pre-trial detention of a U.S. military soldier since at least the Vietnam War. U.S.
military law says the maximum is 120 days.

The material that Bradley Manning is alleged to have leaked has highlighted
astonishing examples of U.S. subversion of the democratic process around the world,
systematic evasion of accountability for atrocities and killings, and many other
abuses. Our archive of State Department cables have appeared in tens of thousands of
articles, books and scholarly works, illustrating the nature of U.S. foreign policy
and the instruments of U.S. national power. On the two-year anniversary of the start
of Cablegate, I want to highlight some of the stories that have emerged.

A War of Terror

The United States' War on Terror has claimed hundreds of thousands of lives,
inflamed sectarian violence, and made a mockery of international law. Victims and
their families struggle to have their stories acknowledged, and the U.S.' systematic
avoidance of accountability for war crimes implicitly denies their right to be
considered human beings. Moreover, as the U.S. increasingly relies on clandestine
military operations conducted outside the scrutiny of government oversight, the
execution of this expanding War on Terror becomes increasingly uncoupled from the
democratic process. While President Obama had promised the American people in 2008
that he would end the Iraq War, U.S. troops were only withdrawn when information
from a cable revived international scrutiny of abuse occurring in Iraq, resulting in
a refusal to grant continued immunity to U.S. troops in 2012 or beyond.

In 2007 the U.S. embassy in Baghdad obtained a copy of the Iraqi government's final
investigation report on the massacre of 17 civilians on September 16th, 2007 in
Nisour Square. The report concluded that the incident was an unprovoked attack on
unarmed civilians, asked for $8 million in compensation for each death and $4
million for each injury, and demanded that the private security firm Blackwater be
replaced within six months. Blackwater continued to operate in Iraq for two years
afterwards, and the U.S. Embassy compensated victims with $10,000 for each death and
$5,000 for each injury. Five years later, the offending Blackwater mercenaries have
escaped from accountability to Iraq, and attempts to bring them to justice in the
U.S. have resulted in a long chain of dismissed cases and one undisclosed
settlement. WikiLeaks' Iraq War Logs release of 391,832 U.S. Army field reports
uncovered 14 additional cases where Blackwater opened fire on civilians, along with
numerous oth
 er incidents of abuse. The Iraq War Logs also showed how the United States handed
over prisoners to be tortured in gruesome detail -- stories of electrocution,
mutilation and of victims being attacked with drills.

The fact that, five years on, the victims of the Nisour Square Massacre have seen no
meaningful accountability is an atrocity. But it is unfortunately no surprise that
the U.S. claims immunity for its forces in other countries, then fails to administer
justice at home.

These events -- and in particular one cable detailing the summary execution of 10
Iraqi civilians, including four women and five children -- by U.S. soldiers and a
subsequent airstrike to cover up the evidence, forced the U.S. withdrawal from Iraq
in 2011. The story of handcuffed execution and cover-up sparked outrage around the
world in the midst of negotiations to extend U.S. troop presence into 2012 and, in
response to international coverage, Iraq revived its investigation into the
incident. Iraq ultimately refused to grant immunity to U.S. troops in 2012, forcing
the U.S. to withdraw in December 2011.

This systemic violence and cover-up extends to the war in Afghanistan. When news
emerged that a midnight bombing campaign on the Afghan village of Granai in 2009 had
possibly resulted in the death of up to 100 civilians, U.S. officials publicly
asserted that most of the dead had been Taliban fighters. A State Department cable
written shortly after the event summarizes a meeting between the Red Cross'
Afghanistan chief Reto Stocker and U.S. Ambassador Carl Eikenberry in which they
discussed findings from an investigation of the event. In the cable, Stocker is
referred to as "one of the most credible sources for unbiased and objective
information in Afghanistan." The Red Cross report estimated that 89 of the dead and
13 injured were in fact civilians. Neither the U.S. government nor the Red Cross
publicly revealed these figures.

WikiLeaks and the Arab Spring

The Tunisian cables describe the extreme corruption and lack of transparency of the
Ben Ali regime. The Ben Ali extended family are described as the worst offenders,
their lavish life accompanied by "a wide-range of corrupt schemes," including
"property expropriation and extortion of bribes." We also learned that Ben Ali
family assets included an airline, several hotels and a radio station. One cable
describes state censorship of Tunisia's only private broadcast satellite TV station,
and a surprise tax judgment against the station of almost $1.5 million.

In its 2011 annual report, Amnesty International praised WikiLeaks and its media
partners for catalyzing the revolution in Tunisia:

    "While the 'Jasmine Revolution' in Tunisia would not have happened without the
long struggle of brave human rights defenders over the last two decades, support
for activists from outside the country may have been strengthened as people
scrutinized the WikiLeaks documents on Tunisia and understood the roots of the
anger. In particular, some of the documents made clear that countries around the
world were aware of both the political repression and the lack of economic
opportunity, but for the most part were not taking action to urge change."

When Tunisia's president Moncef Marzouki spoke with me on The World Tomorrow, he
thanked WikiLeaks for its work, saying, "I am very grateful for all that you have
done for promoting human rights, truth, and I admire and support your efforts."

Shortly following Tunisia's revolution, protests erupted in Libya, and a new batch
of cables revealed the strategic calculations behind U.S. support of the Gaddafi
regime. In Egypt, cables revealed that Mubarak would rather die in office than step
down and that his son would likely succeed him. Then, just as evidence emerged that
Vice President Suleiman was tipped to replace Mubarak, cables were released
detailing his former role as intelligence chief, as well as his close ties to
Israel. Such elements became a crucial part of the ongoing Egyptian uprising.

A Global Death Squad Consulting Firm?

For years, WikiLeaks faced a chorus of accusations by U.S. officials and right-wing
pundits of making the world a less-safe place, and of having potentially caused harm
through publication of embarrassing secrets. In reality, the cables show that
torture and killing are not isolated events, but the violent manifestations of an
aggressive policy of coercion used by the United States in the pursuit of its
strategic commercial and political goals around the world.

While U.S. law bans the training of military units with a history of human rights
violations, in practice the law is easily and often circumvented. The Indonesian
army's elite special forces unit KOPASSUS has brutally repressed the West Papuans'
freedom movement (West Papua has been occupied by Indonesia since 1963), as has been
extensively documented by Human Rights Watch. Despite this, U.S. diplomats in
Jakarta judged in 2007 that the time had come to resume collaboration with KOPASSUS,
for the sake of "commercial interest" and "the protection of U.S. officials."

A diplomatic cable from November 2009 mentions as a side note that right-wing
paramilitaries in Colombia were responsible for the death of 257,089 victims, a
figure well above the estimations of local human rights activists. The U.S. has
nonetheless offered generous support to the Colombian military; Amnesty
International, which has called for a complete cut-off of U.S. military aid to
Colombia, has estimated that total U.S. aid in 2006 amounted to $728 million, of
which 80 percent was given to military and police assistance. As of 2012, U.S.
military support to Colombia is ongoing.

Such examples illustrate the United States' liberal interpretation of the laws
banning the training of military units with a history of human rights violations. In
another cable from August 2008, U.S. officials acknowledge that the Bangladeshi
death squad, the Rapid Action Battalion (RAB), has been involved in obvious human
rights violations, making support for the RAB difficult -- U.S. officials hoped,
however, to improve the RAB's record and polish its public image. U.S. officials
praised the RAB for having "succeeded in reducing crime and fighting terrorism,
making it in many ways Bangladesh's most respected police unit." In a diplomatic
cable from 2009, it was also revealed that the UK had been training the RAB for the
previous 18 months "in areas such as investigative interviewing techniques and rules
of engagement."

Foreign Service Spies

In 2009, Hillary Clinton sent an intelligence gathering directive to 33 embassies
and consulates around the world. The directive asked diplomats to gather
intelligence on UN officials, including credit card numbers and online handles. A
similar cable requested intelligence on officials from the Democratic Republic of
Congo, Burundy, Rwanda and Uganda, and specifically mentioned the collection of DNA
samples, iris scans and computer passwords.

Another state department cable revealed that a mole within the German government was
spying for the U.S. Embassy in Berlin, frequently updating U.S. officials on
negotiations between Merkel's conservative Christian Democrats and Westerwelle's FDP
on the formation of a new coalition government in 2009. Helmut Metzner, formerly
chief of staff to Germany's foreign minister, admitted to being the mole mentioned
in these cables when this story broke in the press, and was subsequently fired.

Lobbying for Unaccountability -- Manipulation of Judicial Process in Other Countries

Abuse that occurs in war, as it did in Iraq, is often dismissed by its perpetrators
as exceptional, and we are often assured that when abuse has occurred, the
accountability mechanisms in place will bring justice. The diplomatic cables have
given us numerous concrete examples of the coercion used by the U.S. to manipulate
and undermine judicial processes in other countries, and they establish a clear
policy for the evasion of accountability in any form.

During the 2003 U.S. invasion of Iraq, two journalists -- including the Spanish
journalist José Couso -- were killed and three others were wounded when a U.S. tank
fired on the Palestine Hotel in Baghdad. An investigation into the event was
subsequently launched in Spain, and an international arrest warrant was issued for
three U.S. soldiers involved. Cables showed that the U.S. aggressively fought to
have Spanish officials drop the case. Writing about the case in one cable, U.S.
Ambassador Eduardo Aguirre emphasizes: "While we are careful to show our respect for
the tragic death of Couso and for the independence of the Spanish judicial system,
behind the scenes we have fought tooth and nail to make the charges disappear."
Shamefully, this quote was redacted in the original reporting on the subject from El
Pais and Le Monde.

In another example from 2003, a German citizen of Lebanese origins, Kalid el-Masri,
was kidnapped while on vacation in Macedonia, renditioned to Afghanistan by the CIA,
and tortured for four months. When his captors finally decided he was innocent, he
was flown to Albania and dumped on a country road without so much as an apology. In
a cable from 2007, we learn that when a German prosecutor issued arrest warrants for
agents involved in el-Masri's kidnapping, the U.S. ambassador in Berlin warned
German officials that there would be repercussions. No arrests have yet been made
and el-Masri is still seeking justice.

The U.S.' manipulation extended to the UK, where a cable shows that during a British
public inquiry led by Sir John Chilcot into the UK role in the Iraq War, the
Ministry of Defence had "put measures in place" to protect U.S. interests.

Global Powers Work to Break Environmental Solidarity, and to Exploit "Opportunities"
of Climate Change

On environmental issues, cables show that the U.S. routinely makes symbolic gestures
rather than initiating substantial practices to combat climate change, and works
aggressively to tailor international agreements to its own commercial interests.

Secretary of State Hillary Clinton asked embassies to gather intelligence on the
preparations for the Copenhagen UN Convention on Climate Change Meeting in December
2009, asking for biographical details of representatives from China, France, Japan,
Mexico, Russia and the European Union. Cables show that in Copenhagen the U.S.
manipulated the accord talks by offering "gifts" to poorer countries to derail
opposition to the accord proposed by first world powers. Another cable from the
Secretary of State revealed that in 2010, a Maldives ambassador designate had
stressed the importance of "tangible assistance" from larger economies to smaller
ones. As a consequence of this meeting, the accord offered financial compensation to
poor countries suffering from the effects of global warming.

In a visit to Canada in 2009 David Goldwyn, the State Department's Coordinator for
International Energy Affairs discussed public relations assistance to be offered to
the oil sands industry. Goldwyn proposed consulting experts, scholars and think
tanks to "increase visibility and accessibility of more positive news stories." The
cable was later used by environmentalists in their battle against the Keystone XL
pipeline, which ships crude oil across the U.S.-Canada border. In early 2012,
President Obama rejected the Keystone XL pipeline proposal, but recently publicly
announced support for another proposal. It also turns out that Goldwyn eventually
went on to work for Sutherland, a lobbying group in favor of Keystone XL.

The cables also reveal that the U.S. is carefully positioning itself to take
advantage of new opportunities for harvesting hydrocarbons and minerals from the
Arctic as climate change melts polar ice. U.S. diplomats were hoping to offer
Greenland support for its independence from Denmark in exchange for access by
American gas and oil companies to exploit the country's resources. The U.S. has been
closely watching Russia, America's main competitor for Arctic resources, but
American officials also showed concern over Canada's potential territorial claim to
the Arctic's Northwest passage.

Secret Agreements -- Circumvention of the Democratic Process

The State Department cables revealed that the United States and its allies
systematically make secret arrangements with various governments, hiding details not
only from the country's public, but sometimes even from the country's
representatives, ministers and oversight bodies.

In 2009, Jeremy Scahill and Seymour Hersh broke a story in The Nation on secret U.S.
special operations forces combat missions and drone strikes in Pakistan. When
questioned about the story, Department of Defense spokesperson Geoff Morrell
dismissed the claims as "conspiratorial theories." Only one year later, cables
released by WikiLeaks confirmed their story. In addition, cables quoted Pakistan's
Prime Minister Yousuf Raza Gilani telling U.S. officials: "I don't care if they do
it as long as they get the right people -- we'll protest about it in the National
Assembly and then ignore it." Stories based on State Department cables also revealed
agreements between the U.S. and Yemen in which the Yemeni government would claim
responsibility for attacks launched by the U.S. on local militia groups. The release
of State Department cables resulted in total transparency with respect to certain
aspects of the War on Terror.

State Department cables also revealed that the U.S. worked with Australia to weaken
the text of an international agreement banning the use of cluster munitions -- bombs
which spray thousands of smaller bomblets over a large area. Out of more than 13,000
casualties of cluster munitions registered by Handicap International, over 98
percent are civilian and one-third of those are children. Despite this, cables also
revealed that the UK's then-Foreign Minister David Miliband secretly approved the
use of a legal loophole to allow the United States to store cluster munitions on UK
territory, despite the fact that the UK is a signatory to a convention banning them.
The United States is not a signatory to the Convention on Cluster Munitions, and
even attempted in 2011 to have the ban lifted by the UN.

In 2007, former Canadian Deputy Prime Minister John Manley asked U.S. officials for
predator drones to help shore up liberal support for a sustained Canadian presence
in the war in Afghanistan. At the time, Manley was leading a government-appointed
panel charged with investigating Canada's interests in a future role in Afghanistan.
In August 2012, the Ottawa Citizen reported that the Canadian government is seeking
to spend up to $1 billion on a state-of-the-art armed drone fleet.

The cables also revealed that Canada's conservative Prime Minister Stephen Harper
secretly promised NATO in January 2010 that Canada would remain in Afghanistan to
conduct army training even after the end of its mission in 2011. The Canadian public
was shocked when the government announced that it would be extending its mission in
November of that year. Harper expressed concern to U.S. diplomats that an early
departure of Canadian troops from Aghanistan would seem like a "withdrawal,"
reflecting the low public support for Canada's mission in Afghanistan.

In 2008, the U.S. proposed an "informal agreement" to Swedish government officials
for the exchange of information on terrorism watch-lists. U.S. officials explained
that they feared scrutiny by the Swedish parliament would jeopardize "law
enforcement and anti-terrorism cooperation." Cables also revealed that in 2009, the
U.S. resumed full intelligence-sharing with New Zealand after it had been restricted
in retaliation for the country's ban against nuclear-powered or armed vessels in its
ports. Both governments agreed that the newly resumed cooperation should be kept
hidden from the public.

The Realpolitik of Commercial Lobbying

State Department cables illustrate that U.S. officials and their commercial partners
take a default position of having an intrinsic right to resources and market
dominance around the world.

In a 2007 cable to the U.S. Trade Representative, U.S. Ambassador Craig Stapleton
suggested taking a hard-line approach towards the European Union over its resistance
to American genetically modified products and foods. France's refusal to embrace
GMOs and agricultural biotechnology, according to Ambassador Stapleton, would lead
to a general European rejection of GMOs, and he suggested retaliation to help the
French see things differently:

    "Country team Paris recommends that we calibrate a target retaliation list that
causes some pain across the EU since this is a collective responsibility, but
that also focuses in part on the worst culprits. The list should be measured
rather than vicious and must be sustainable over the long term, since we should
not expect an early victory." 

The cables also showed that the U.S. revoked visas of then-Ecuadoran presidential
candidate Xavier Neira and seven others due to their involvement in a legal case
against the American pharmaceutical company Pfizer for unfair competition. The
timing of the decision to revoke their visas coincided with the upcoming
presidential elections and an impending court decision on the case. In its
explanation of the revocation, officials cite "corruption" and the case against
Pfizer.

The U.S.-based Shell Oil company has a long and sordid history in Nigeria, and its
representatives spoke openly about activities in the country. In a 2009 meeting,
Shell representatives told U.S. officials that they would be able to influence the
Nigerian government's 2009 Petroleum Industry Bill to suit their interests.

Cables from 2005 highlight U.S. determination to "improve the investment climate"
for mining companies in Peru. Representatives from Canada, UK, Australia,
Switzerland and South Africa met to strategize ways of circumventing anti-mining
protests coming from a diverse group of NGOs, the Catholic Church and indigenous
Peruvians. Once protests had turned violent, the U.S. used this as an excuse for
monitoring NGO groups such as Oxfam and Friends of the Earth, and asked the Peruvian
government to enhance security by taking control of roadways and transit areas.

In other cases, officials in the U.S. Embassy assisted in lobbying for or against
particular pieces of legislation according to U.S. commercial interests. U.S.
officials lobbied on behalf of Visa and MasterCard against a bill in Russia which
would have created a national card payment system, taking away Visa and MasterCard's
market share.

Strategic Duplicity on Human Rights and Press Freedom

A cable summarizing a meeting with a director of Al Jazeera shows that U.S.
officials expected a special report with graphic images of injured Iraqis to be
changed and its images removed. In another cable, the director is asked to explain
Al Jazeera's lack of coverage of the Iran elections and protests as opposed to their
"heavy" coverage of Gaza.

The U.S. Navy's Fifth Fleet is based in the kingdom of Bahrain, and the U.S. has
maintained a mutually beneficial relationship with the country's leaders over the
past years. In one cable, the U.S. ambassador to Bahrain praised the country and its
king, pointing out that U.S. companies had won major contracts there. This same
regime brutally cracked down on protesters during the Arab Spring, and Bahraini
authorities shut down dissident websites and publications. While the U.S. State
Department harshly condemned the crackdown on protests after Iran's 2009 elections,
it remained silent on the killings in Bahrain.

Thailand's Monarchy Exposed

Thailand's lèse majesté law prevents anyone in the country from speaking openly
about the monarchy without risk of severe punishment. As such, any reports about
political developments in the country are censored, and there is a huge gap in
public knowledge about the country's political environment. WikiLeaks' release of
State Department cables gives an unprecedented view of not only the monarchy's deep
impact on the politics of the country, but also the close relationship that Thailand
had with the U.S. Journalist Andrew MacGregor Marshall quit his job at Reuters to
write his book Thailand's Moment of Truth, using the Thai cables exposing obscured
and taboo aspects of Thailand's politics, history and international relations for
the first time.

U.S. Aims to Reshape Global Views and Law on Intellectual Property and Copyright

U.S.-based lobbying groups work hand in hand with U.S. State Department officials
around the world to aggressively lobby for legislation and trade agreements that
favor American companies such as Google, Facebook, Apple and Microsoft, or large
film studios such as Disney, Paramount, Sony and Warner.

A 2006 cable from Japan describes the first draft proposals for a "gold standard" in
intellectual property rights enforcement, called ACTA. This standard was meant to
give intellectual property owners much stronger powers, even at the expense of
citizen privacy and due process. ACTA was subsequently negotiated in secret, unknown
to the general public, until WikiLeaks leaked the first draft in 2008. In the film
industry, the lobbyist group for motion picture studios conspired with their
Australian counterpart to establish a legal precedent for holding an Internet
service provider accountable for copyright infringement in Australia. What is the
effect of this push and pull? It is a global environment where legislation and legal
precedents are set to benefit intellectual property owners who are rich, powerful
and influential -- even at the expense of public good.

Breaking the Monopoly on Influence

The examples I present above represent only a small fraction of what has been
revealed by WikiLeaks material. Since 2010, Western governments have tried to
portray WikiLeaks as a terrorist organization, enabling a disproportionate response
from both political figures and private institutions. It is the case that WikiLeaks'
publications can and have changed the world, but that change has clearly been for
the better. Two years on, no claim of individual harm has been presented, and the
examples above clearly show precisely who has blood on their hands.

In large Western democracies, the political discourse has been so highly controlled
for so long, that it is no longer shocking when Western experts fill in to speak for
third world victims, or when an American president stands up at a podium to accept
his Nobel Peace Prize, and makes the case for war. It is, in fact, no longer safe to
presume that a media outlet such as The New York Times would perform the same act
today as they did in 1971 when Daniel Ellsberg leaked the Pentagon Papers.

In a panel discussion with Daniel Ellsberg and New York Times editor Jill Abramson
discussing the Pentagon Papers, Ellsberg voiced his dissent over the Times'
acquiescence to the Bush administration's request to delay James Risen's story on
warrantless NSA wiretapping until after the 2004 elections. Abramson equivocated:

    "The thing is when the government says -- you know -- by publishing a story
you're harming the national security, you're helping the terrorists. I mean,
there are still people today who argue that the NSA program was the crown jewel,
the most valuable anti-terrorism program that the Bush administration had going,
and that it was terribly wrong of the Times to publish." 

On the same panel, Daniel Ellsberg said of the Pentagon Papers:

    "The secrecy of these documents has so far condemned over 30,000 Americans to
death and several million Vietnamese. And the continued secrecy of them will
undoubtedly contribute to the death of tens of thousands more Americans, and so
forth. I think that's true. But that comes up in the WikiLeaks case, right now."

Since the release of the diplomatic cables, WikiLeaks has continued its operations
despite the financial blockade, publishing leaked documents from companies selling
mass interception units to state spy agencies around the world; detainee profiles
for almost all of the people detained at Guantánamo Bay prison; U.S. policy manuals
for detention of military prisoners in the War on Terror; intelligence databases
from the private intelligence firm Stratfor; and millions of documents from inside
the Syrian government. The information we've disclosed frustrates the controlled
political discourse that is trumpeted by establishment media and Western governments
to shape public perception.

We will continue our fight against the financial blockade, and we will continue to
publish. The Pentagon's threats against us do the United States a disservice and
will not be heeded.

With thanks to WikiLeaks Press for research.

Cryptome – Anonymous Hacks DEBKA.com

Anonymous Hacks DEBKA.com

 


http://pastebin.com/ESZXPw8J

Greetings Citizens of the world,

This is Anonymous.

DEBKA.com is an Israeli-Based News-Agency, which has tied relations with Israeli Intelligence Agency (MOSSAD) and Military sources, “Tongue of MOSSAD”. DEBKA first started around 2000 in purpose of polluting media with Zionist-Oriented news and rumors.

DEBKA also analyzes on how people react to news and information offered by the agency in their state of art laboratory. Using these methods the agency has got the ability to release news and rumors in subjects which have most impact in the eyes of readers and political figures.

We have managed to hack their systems and acquire highly sensitive information, including employees and authors personal information, labs details and of course their subscribers.

For now, we only release portion of what we have got which includes subscribers emails and passwords (Most of them are retired MOSSAD agents!!!). At the end we have a message for them:

THIS IS A WARNNING TO THOSE WHOM SUBSCRIBED TO DEBKA:

STOP SUPPORTING ZIONISM,
STOP SUPPORTING MASS-MURDUR,
STOP SUPPORTING KILLERS OF WOMEN AND CHILDREN.

WE WOULD PUBLISH MORE DETAILS AND INFORMATION IN FUTURE…

     
    Target:         http://www.debka-net-weekly.com/mailme.php?email=123@admin.com

    Data Base:      weekly
    Table: users

    Password        email
    ----------------------------------------------------------------------
    1439    yizraeli@zahav.net.il

    FMLnWA  bslater@netvision.net.il

    palmira admin@debka.com

    E6FZtf  mepstein@aremet.com

    KpQQu4  estelleroith@btinternet.com

    hGEJML  dachind@attglobal.net

    Adler  

    PjpVKT  estironi@bezeqint.net

    jWpHCq  gedit2@debka.com

    12345   edit@debka.com

    f8wKtE  sharon.mikhailov@gmail.com

    KvpYx8  sruben288?@a?l.com

    mBDXtj  john_erard@yahoo.com

    zjDrin  kirkvolkman@msn.com

    O8Qrpm  shulster@direcway.com

    TKT6bd  barbara@subacorp.com

    3AYN3f  csnobelen@csll.ca

    saturn  bsmith@advcourttech.com

    LnEV5a  flaifer@nyc.rr.com

    zEwiu5  gldf4him@verizon.net

    3WicZG  themajor3@rcn.com

    7o5yRh  LARsubscription@paramountbio.com

    No7c4G  marsha.s.kantor@verizon.net

    QDrRpP  Noahgladstone@verizon.net

    SVgQfE  r.liebis@verizon.net

    aSvu6V  rlgotte@rcn.com

    chochoma hosogold@hotmail.com

    KDjbVq  stanjoseph@verizon.net

    RL8dQ1  wmcdo1@hughes.net

    4R0TJn  zs_ima@yahoo.com

    WpRRS4  sutherland@charter.net

    vinnie  sndpaper@hotmail.com

    iOk2YK  dbsajet@xs4all.nl

    CGA6Wz  eric@cooperfund.com

    hyO0c8  maher_90250@yahoo.com

    qa9zFu  aherbert@rodmanandrenshaw.com

    20022002 d?nderson@loeb.com

    wFiNUi  mike@mgwelbel.com

    murphy  rifgroup@aol.com

    Mindylou38 jiblais@dc.rr.com

    3117    michael.gindi@mac.com

    G2iyT7  crabtownprofs@comcast.net

    CDSrUo  brazil@inter.net.il

    ug04NV  alive@finishalive.com

    bsmd    drsalick@aol.com

    sE758A  zkatz@att.net.mx

    2MDyHk  ticitavi@aol.com

    Kisyk8  hauknest@aol.com

    BWrtJZ  ttdoonan@hotmail.com

    T5Kcne  tom@corrigan.com

    sT5BVU  fherman@calix.com

    a5bNEE  somthinsmith@msn.com

    0FBm30  jim@jbyrneco.com

    tKa8z6  sandler@ccf.org

    fSY7HR  schulzepb@aol.com

    KA1Mqe  odd.sverre.hove@dagen.no

    MSGACORN msgold@msn.com

    cWEY45  aldo_b@inter.net.il

    xJUNp4  david.wirtschafter@juno.com

    M2C7sS  llewis1007@aol.com

    1931624 fjc@colsa.com

    PGNjkX  jason@xmiller.com

    c1C3hY  joe582@Bellsouth.net

    xL5J9V  johnburk@deskmedia.com

    EVi1ny  martyreit@csreit.com

    presstek Rang1995@gmail.com

    3Vsf1x  exec@borealis.gi

    cpkdHA  silonde@bellsouth.net

    LqK2pT  tckrcr@aol.com

    WZxqpN  warrenschwar?z@accbrdbnd.com

    cahfgr  yk4000@ballade.plala.or.jp

    tP1c7f  oranim@usa.net

    Shelidan billyo@microsoft.com

    wr5x6c  wmanag18@aol.com

    dUhSeF  dkufeld@aol.com

    dragon  godsart@bellsouth.net

    2KjLCS  lewinassoc@earthlink.net

    uf7eK6  johnsoneb10@aol.com

    yxfuXA  jeirealty2@aol.com

    yvMsQ8  harvey6@ix.netcom.com

    SmileyElle lazyviking@centurytel.net

    E7DQny  twtspt@aol.com

    8xFBW4  amermin@globenet.com.ph

    99516   sspec99516@aol.com

    cF3JSg  bnesin@microgrit.com

    RqR8Mg  corevalue@comcast.net

    1PhUyP  randerson3@cox.net

    LSSspu  zippy20854@aol.com

    EvbC2N  ophir@speakeasy.net

    9mH3Ub  norm@theeisenberggroup.com

    DDcMRJ  njarendt@tds.net

This just has been started……. 🙂

We are Anonymous
We are Legion
We do not forgive.
We do not forget.
Israel, it is too late to expect us.

http://wikileak.ir/en/leaks/7/DEBKA+internal+informations+Hacked+%26+Leaked

#Anonymous #OpIsrael #DEBKALeak

 


Unveiled – Julian Assange: Cryptographic Call to Arms

assange

Julian Assange: Cryptographic Call to Arms

 


Excerpted from Cypherpunks: Freedom and the Future of the Internet, by Julian Assange with Jacob Appelbaum, Andy Müller-Maguhn and Jérémie Zimmermann. OR Books, New York, 2012, 186 pages, Paper. Buy online. Cryptome review of the book.

Pages 1-7.

INTRODUCTION: A CALL TO CRYPTOGRAPHIC ARMS

This book is not a manifesto. There is not time for that. This book is a warning.

The world is not sliding, but galloping into a new transnational dystopia. This development has not been properly recognized outside of national security circles. It has been hidden by secrecy, complexity and scale. The internet, our greatest tool of emancipation, has been transformed into the most dangerous facilitator of totalitarianism we have ever seen. The internet is a threat to human civilization.

These transformations have come about silently, because those who know what is going on work in the global surveillance industry and have no incentives to speak out. Left to its own trajectory, within a few years, global civilization will be a postmodern surveillance dystopia, from which escape for all but the most skilled individuals will be impossible. In fact, we may already be there.

While many writers have considered what the internet means for global civilization, they are wrong. They are wrong because they do not have the sense of perspective that direct experience brings. They are wrong because they have never met the enemy.

No description of the world survives first contact with the enemy.

We have met the enemy.

Over the last six years WikiLeaks has had conflicts with nearly every powerful state. We know the new surveillance state from an insider’s perspective, because we have plumbed its secrets. We know it from a combatant’s perspective, because we have had to protect our people, our finances and our sources from it. We know it from a global perspective, because we have people, assets and information in nearly every country. We know it from the perspective of time, because we have been fighting this phenomenon for years and have seen it double and spread, again and again. It is an invasive parasite, growing fat off societies that merge with the internet. It is rolling over the planet, infecting all states and peoples before it.

What is to be done?

Once upon a time in a place that was neither here nor there, we, the constructors and citizens of the young internet discussed the future of our new world.

We saw that the relationships between all people would be mediated by our new world, and that the nature of states, which are defined by how people exchange information, economic value, and force, would also change.

We saw that the merger between existing state structures and the internet created an opening to change the nature of states.

First, recall that states are systems through which coercive force flows. Factions within a state may compete for support, leading to democratic surface phenomena, but the underpinnings of states are the systematic application, and avoidance, of violence. Land ownership, property, rents, dividends, taxation, court fines, censorship, copyrights and trademarks are all enforced by the threatened application of state violence.

Most of the time we are not even aware of how close to violence we are, because we all grant concessions to avoid it. Like sailors smelling the breeze, we rarely contemplate how our surface world is propped up from below by darkness.

In the new space of the internet what would be the mediator of coercive force?

Does it even make sense to ask this question? In this otherworldly space, this seemingly platonic realm of ideas and information flow, could there be a notion of coercive force? A force that could modify historical records, tap phones, separate people, transform complexity into rubble, and erect walls, like an occupying army?

The platonic nature of the internet, ideas and information flows, is debased by its physical origins. Its foundations are fiber optic cable lines stretching across the ocean floors, satellites spinning above our heads, computer servers housed in buildings in cities from New York to Nairobi. Like the soldier who slew Archimedes with a mere sword, so too could an armed militia take control of the peak development of Western civilization, our platonic realm.

The new world of the internet, abstracted from the old world of brute atoms, longed for independence. But states and their friends moved to control our new world — by controlling its physical underpinnings. The state, like an army around an oil well, or a customs agent extracting bribes at the border, would soon learn to leverage its control of physical space to gain control over our platonic realm. It would prevent the independence we had dreamed of, and then, squatting on fiber optic lines and around satellite ground stations, it would go on to mass intercept the information flow of our new world — its very essence even as every human, economic, and political relationship embraced it. The state would leech into the veins and arteries of our new societies, gobbling up every relationship expressed or communicated, every web page read, every message sent and every thought googled, and then store this knowledge, billions of interceptions a day, undreamed of power, in vast top secret warehouses, forever. It would go on to mine and mine again this treasure, the collective private intellectual output of humanity, with ever more sophisticated search and pattern finding algorithms, enriching the treasure and maximizing the power imbalance between interceptors and the world of interceptees. And then the state would reflect what it had learned back into the physical world, to start wars, to target drones, to manipulate UN committees and trade deals, and to do favors for its vast connected network of industries, insiders and cronies.

But we discovered something. Our one hope against total domination. A hope that with courage, insight and solidarity we could use to resist. A strange property of the physical universe that we live in.

The universe believes in encryption.

It is easier to encrypt information than it is to decrypt it.

We saw we could use this strange property to create the laws of a new world. To abstract away our new platonic realm from its base underpinnings of satellites, undersea cables and their controllers. To fortify our space behind a cryptographic veil. To create new lands barred to those who control physical reality, because to follow us into them would require infinite resources.

And in this manner to declare independence.

Scientists in the Manhattan Project discovered that the universe permitted the construction of a nuclear bomb. This was not an obvious conclusion. Perhaps nuclear weapons were not within the laws of physics. However, the universe believes in atomic bombs and nuclear reactors. They are a phenomenon the universe blesses, like salt, sea or stars.

Similarly, the universe, our physical universe, has that property that makes it possible for an individual or a group of individuals to reliably, automatically, even without knowing, encipher something, so that all the resources and all the political will of the strongest superpower on earth may not decipher it. And the paths of encipherment between people can mesh together to create regions free from the coercive force of the outer state. Free from mass interception. Free from state control.

In this way, people can oppose their will to that of a fully mobilized superpower and win. Encryption is an embodiment of the laws of physics, and it does not listen to the bluster of states, even transnational surveillance dystopias.

It isn’t obvious that the world had to work this way. But somehow the universe smiles on encryption.

Cryptography is the ultimate form of non-violent direct action. While nuclear weapons states can exert unlimited violence over even millions of individuals, strong cryptography means that a state, even by exercising unlimited violence, cannot violate the intent of individuals to keep secrets from them.

Strong cryptography can resist an unlimited application of violence. No amount of coercive force will ever solve a math problem.

But could we take this strange fact about the world and build it up to be a basic emancipatory building block for the independence of mankind in the platonic realm of the internet? And as societies merged with the internet could that liberty then be reflected back into physical reality to redefine the state?

Recall that states are the systems which determine where and how coercive force is consistently applied.

The question of how much coercive force can seep into the platonic realm of the internet from the physical world is answered by cryptography and the cypherpunks’ ideals.

As states merge with the internet and the future of our civilization becomes the future of the internet, we must redefine force relations.

If we do not, the universality of the internet will merge global humanity into one giant grid of mass surveillance and mass control.

We must raise an alarm. This book is a watchman’s shout in the night.

On March 20, 2012, while under house arrest in the United Kingdom awaiting extradition, I met with three friends and fellow watchmen on the principle that perhaps in unison our voices can wake up the town. We must communicate what we have learned while there is still a chance for you, the reader, to understand and act on what is happening.

It is time to take up the arms of our new world, to fight for ourselves and for those we love.

Our task is to secure self-determination where we can, to hold back the coming dystopia where we cannot, and if all else fails, to accelerate its self-destruction.

— Julian Assange, London, October 2012

New – WikiLeaks donations now tax deductible EU wide

Wau-Holland-Stiftung (WHS), named in memory of the German philosopher and net
activist Wau Holland, has been collecting donations for WikiLeaks since 2009. In the
immediate aftermath of WikiLeaks publication of the US diplomatic cables in 2010,
not only did PayPal arbitrarily shut down the WHS donations account, but the
tax-exempt status of the Foundation was challenged as well.

It took almost two years of negotiations with German tax authorities to strike a
deal: Tax exemption (charitable status) will be granted again going forward and
going back to 2011, but not for 2010. (See: "Taxing Transparency", Der Spiegel, 13
Nov 2012).

Therefore, citizens of EU member states will be able to donate to WikiLeaks
operations through WHS and in addition, write the donation off from their income
tax. This is because of a ruling of the European Court in 2009 (Decision C-318_07),
which mandates that every member state must honour the tax exemption decision of any
other member state.

And this is how you make a money transfer to support WikiLeaks:

Recipient: Wau Holland Stiftung
  Bank: Commerzbank Kassel, Königsplatz 32-34, 34117 Kassel, Germany
  IBAN: DE46 5204 0021 0277 2812 04
  BIC/SWIFT: COBADEFF520
  Reference: WikiLeaks or Project 04 if you prefer
  add your e-mail or postal address to receive a tax-deductible donation receipt.

Hamburg, 26. Nov 2012 Wau-Holland-Stiftung http://www.wauland.de

Other methods of donation:
https://shop.wikileaks.org/donate

Unveiled – European Commission enabling blockade of WikiLeaks by U.S. hard-right Lieberman/King, contrary to European Parliament’s wishes

European Commission documents released today by WikiLeaks show that hard-right U.S.
politicians were directly behind the extrajudicial banking blockade against
WikiLeaks. In the heavily redacted documents, MasterCard Europe admits that Senator
Joseph Lieberman and Congressman Peter T. King both "had conversations" with
MasterCard in the United States. Lieberman, the then-chair of the Senate
Intelligence Committee, boasted of instigating Amazon's cutting of service to
WikiLeaks - an action condemned by the Council of Europe's Committee of Ministers on
7 December 2011.

Senator Lieberman tried to introduce the SHIELD Act into the Senate and advocated
for prosecuting the New York Times for espionage in connection with WikiLeaks'
releases. Rep. Peter King, chair of the House Homeland Security Committee, tried to
formally designate WikiLeaks as a foreign terrorist organization, have its staff
listed as 'enemy combatants', and have WikiLeaks put on a U.S. Treasury blacklist.
On 13 January 2011 the U.S. Treasury announced it would not do so because there was
no evidence that WikiLeaks should be on such a list. While Lieberman and King were
unsuccessful in these methods of legally cutting WikiLeaks from its popular donor
base, they were successful in doing so extra-legally via VISA and MasterCard, which
together hold a monopoly of 97 per cent of the market of EU card payments.

VISA Europe is registered in London and is owned by a consortium of European banks.
MasterCard Europe is registered in Belgium and has similar ownership, but the
Commission papers show that European control of VISA Europe and MasterCard Europe is
a fiction. The papers reveal that the instructions to blockade WikiLeaks' operations
in Europe came directly from VISA and MasterCard in the United States. Ownership
would normally imply control, but VISA and MasterCard Europe are essentially
controlled by confidential contracts with their U.S. counterparts, a hidden
organizational structure that the Commission calls an "association of undertakings".

On Tuesday, 19 November 2012, the European Parliament took an important step towards
safeguarding the economic sovereignty of all Europeans. In Article 32 of its
resolution, the European Parliament expressed the will that the Commission should
prevent the arbitrary refusal of payments by credit card companies, which
economically strangles businesses and organizations, notably ours. The resolution is
an important step to putting an end to the Lieberman/King blockade, which has wiped
out 95 per cent of WikiLeaks' revenues. The Lieberman/King blockade has been
directly condemned by, among others, the UN Special Rapporteur of Freedom of Speech
and the New York Times Editorial Board. The blockade is a direct infringement of the
Article 19 right to receive and impart information, and threatens all donor-funded
organizations and the freedom of the press.

It comes as a surprise, then, that the European Commission is taking the contrary
view in its preliminary decision, of not opening a formal investigation into VISA,
MasterCard and AmEx's violations against DataCell, the company that collected
donations to the WikiLeaks project until the imposition of the blockade in 2010. The
Commission's 16-page preliminary decision has been announced after 15 months of
deliberations. The 'normal' waiting time is four months. Yesterday, DataCell and
WikiLeaks submitted detailed counter-arguments to the Commission's preliminary
decision.

Through the leaked documents we learn that VISA and MasterCard have used a false
statement by the Australian Prime Minister, Julia Gillard, to mislead the European
Commission. The Prime Minister's statement, which she later claimed was made in her
"private capacity", was that the WikiLeaks publication of diplomatic cables was
"illegal". This was declared to be false by a subsequent investigation by the
Australian Federal Police, which declared that WikiLeaks had not broken any
Australian law. Earlier this year, the Australian Senate passed a resolution
demanding the retraction of the Prime Minister's false statement.

The leaked documents reveal MasterCard's political stance to our exposure of the
crimes and horrors of military campaigns: "It is evident that any affiliation with
an organisation causing damage to the national interests of several nations involved
in the wars in Afghanistan and Iraq... will be extremely damaging for the public
perception of MasterCard".

Julian Assange said: 
> There is no sovereignty without economic sovereignty. It is concerning that
hard-right elements in the United States have been able to pressure VISA and
MasterCard, who together hold monopoly over the European market, into introducing
a blockade that the U.S. Treasury has rightly rejected. These unaccountable
elements are directly interfering in the political and economic freedoms of EU
consumers and are setting a precedent for political censorship of the world's
media.

WikiLeaks will continue to fight the blockade, despite its limited resources,
because it is fighting for its survival. Already there have been victories. In June
2012 WikiLeaks won its first court victory in Iceland against the Lieberman-King
blockade. Last month WikiLeaks opened a new battle front by filing, together with
its partner DataCell, a case against Teller A/S (VISA Denmark).

NOTE

The movement in Parliament and in the rest of Europe is to support WikiLeaks'
publishing rights. The German foundation Wau Holland Stiftung (WHS), which collected
donations for WikiLeaks via PayPal had their donations account arbitrarily shut
down. The tax-exempt status of the Foundation was challenged as well, as a result of
political interference which was exposed this month in Der Spiegel ("Taxing
Transparency"). Yesterday, WHS announced that, after almost two years of
negotiations with German tax authorities, its tax exemption (charitable status) has
been reinstated. Citizens of all EU Member States will now be able to donate to
WikiLeaks' operations through WHS and deduct the donation from their income tax.

*Additional information*:
UN Special Rapporteur on Right to Freedom of Opinion and Expression:
http://www.oas.org/en/iachr/expression/showarticle.asp?artID=829&lID=1
Council of Europe - Declaration on online service providers:
https://wcd.coe.int/ViewDoc.jsp?id=1883671&Site=CM
The Guardian Comment is Free (23 November 2012) by Glenn Greewald:
http://www.guardian.co.uk/commentisfree/2012/nov/23/anonymous-trial-wikileaks-internet-freedom
Video: U.S. demands to assassinate Assange - http://youtube.com/watch?v=ZuQW0US2sJw

*Quote from Visa and MasterCard Submissions to the European Commission*

Visa's response to the European Central Bank:

> As you will no doubt be aware, in some jurisdictions, various stakeholders have
questioned whether WikiLeaks is, in respect of some of the material it publishes,
committing criminal acts. Our Operating Regulations prohibit the use of the Visa
system for illegal purposes either in the jurisdiction of the merchant (in this
case Iceland) or the jurisdiction of the cardholder (which could be anywhere in
the world). It is possible that activities that are permitted in one jurisdiction
may be illegal in others. Accordingly, the application of the relevant position
under the Operating Regulations does not necessarily depend solely on Icelandic
law.

> This position is appropriate and proportionate in light of the alleged unlawful
conduct of WikiLeaks, which, among other sensitive material, in 2010 published and
refuses to return large amounts of material stolen from classified US military
databases. Further, according to recent press coverage, it appears that the
leaking of sensitive information is continuing.

MasterCard's arguments to the European Commission:

> MasterCard does not hold a collective dominant position with Visa... It is also
worth mentioning here that MasterCard does not constitute an 'essential facility',
and therefore is under no obligation to provide its services to any particular
undertakings.

> It is evident that any affiliation with an organisation causing damage to the
national interests of several nations involved in the wars in Afghanistan and
Iraq, and possibly putting lives needlessly at risk, will be damaging for the
public perception of MasterCard and consequently damage MasterCard's goodwill or
its [trade]Marks.

> By way of example, in 2004 MasterCard requested the Dutch acquirer, then 'Interpay
Nederlands B.V.' (now 'Paysquare') to suspend the provision of acquiring services
to merchants operating websites offering access to pornographic material including
showing sexual acts with animals ('bestiality content').

> ...before taking its decision, MasterCard Incorporated did not have any contacts
with public authorities, and therefore did not act upon request from any public
authorities.

> MasterCard Incorporated had several conversations with the FBI, US Treasury and
the Department of Homeland Security (DHS) about the possibility of such DDoS
attacks.

> MasterCard Incorporated had conversations with certain Congressional staff (i.e.
Chairman Lieberman and Chairman King's [Senate and House Homeland Security Chairs]
staff)."

*European Parliament - on Card, Internet and mobile payments*

  Towards an integrated European market for card, internet and mobile payments - 20
November 2012

The European Parliament voted that the Commission introduce legislation to determine
when credit card companies can deny payments:

> 32. Considers it likely that there will be a growing number of European companies
whose activities are effectively dependent on being able to accept payments by
card; considers it to be in the public interest to define objective rules
describing the circumstances and procedures under which card payment schemes may
unilaterally refuse acceptance;

In his intervention, Swedish MEP Christian Engstrom explained:

> Another example is when Visa, Mastercard and Paypal blocked payments to WikiLeaks.
There was no legal basis and [it] should be seen as the three companies helped the
US government to silence an inconvenient voice. It is not acceptable that private
corporations have the power of [controlling] free speech.

Unveiled – NARA Leaks WikiLeaks Citations – Block Lifted

National Archives fixes search but bans WikiLeaks documents:http://cryptome.org/2012/11/nara-bans-wikileaks.htm

6 November 2012.

Griffin Boyce sends 6 November 2012:

After hearing that the national archives was blocking wikileaks-related searches, I decided to try it out myself. I was able to search for WikiLeaks uninhibited on the public site [1][2]. Though if blocked in the future, a search for *ikileaks (with the asterisk) will bring them up as well [3].[1] http://search.archives.gov/query.html?col=1arch&qt=wikileaks

[2] http://research.archives.gov/search?expression=WikiLeaks

[3] http://search.archives.gov/query.html?qt=*ikileaks

@USNatArchives tweeted yesterday that it would look into the block, and it has been lifted although the hits are fewer than the 30 by Google:

US National Archives @USNatArchivesWe’re looking into this, and we’ll update soon. MT @public_archive: The banning of @wikileaks from @USNatArchives: http://bit.ly/SmVQfQ

4 November 2012. About 30 Google hits for “WikiLeaks” on the National Archives website via search of “site:archives.gov wikileaks

3 November 2012. NARA online produces one hit for “Assange:”

http://research.archives.gov/search?expression=assange&pg_src=group&data-source=all

Did you mean passage?AOTUS: Collector in Chief | What I’m Reading

http://blogs.archives.gov/aotus/?page_id=314

Google hits for Assange “About 55,500,000.”

2 November 2012. @AlecMuffett notes that wildcards such as “?ikileaks” and “wiki?eaks” retrieve a few more documents with the word “WikiLeaks” in them.

2 November 2012

NARA Leaks WikiLeaks Citations


Access to documents containing the word “WikiLeaks” are blocked at the US National Archives website:

http://research.archives.gov/search?v%3Aproject=opa&query=WikiLeaks

The URL you requested has been blockedThe page you have requested has been blocked, because the URL is banned.

URL = research.archives.gov/search?v%3Aproject=opa&query=WikiLeaks

However documents with the words “Wiki” and “Leak,” separated by a space, are not. Six documents with “Wiki” and “Leak” may be retrieved:

http://research.archives.gov/search?expression=wiki+leak&pg_src=brief&data-source=archives-gov

1. June 2011 NISPPAChttp://www.archives.gov/isoo/oversight-groups/nisppac/meeting-june-2011.pdf

2. meeting march 2011

http://www.archives.gov/isoo/oversight-groups/nisppac/meeting-march-2011.pdf

3. meeting jun 2011

http://www.archives.gov/isoo/oversight-groups/nisppac/meeting-jun-2011.pdf

4. Microsoft Word – Advisory Committee Minutes_June 2011

http://www.archives.gov/presidential-libraries/committees/pdfs/2011-06-minutes.pdf

5. Press Release Archive by Date

http://www.archives.gov/press/press-releases/date-archive.html

6. meeting nov 2011

http://www.archives.gov/isoo/oversight-groups/nisppac/meeting-nov-2011.pdf



 

Cryptome unveils WikiLeaks-Wau Holland Tax-Exemption Revoked

German original:

http://www.wauland.de/index.html

English translation:

http://translate.googleusercontent.com/translate_c?depth=1&hl=en&ie=UTF8&prev=_t&rurl=
translate.google.com&sl=auto&tl=en&u=http://www.wauland.de/index.html&usg=
ALkJrhiHuOyIgKZ5kkDp2eyG49lBd0h6eA

ON OUR OWN – November 5, 2012

Public benefit of

Wau Holland Foundation

History of withdrawal

End of 2010, the Wau Holland Foundation (WHS) was intervention by the Hessian Ministry of Interior ( [1] , [2] , [3] , [4] ,) the exempt status by the then competent tax office Kassel denied [5] . This decision was taken so that the foundation had with the fundraising and the associated project financing WikiLeaks violated the “principle of selflessness.”

Under the principle of selflessness (§ 55 AO), a foundation may not primarily pursue economic purposes, eg commercial purposes or other commercial purposes, but can only use the money to further their own goals. The withdrawal of exempt status by the IRS is already difficult to understand why, for two reasons: First, lay the tax office has not received accounting records from the year 2010 which would justify such a decision. Second, the regional council has Kassel as supervisory authority early December in a press release made it clear that the promotion of WikiLeaks very well according to the statutes of the Foundation to purchase.

Perhaps this is why the reasoning by the tax office in Hamburg, after the relocation of the Foundation inherited the controversial procedure was changed, and as a “violation of the principle of immediacy” (§ 57 AO) pursued.

During the test

The WHS commissioned a specialized foundation and tax law firm to represent their interests and put an objection against the decision [6] . In subsequent proceedings, there was a test of whether the Foundation had in 2010 met the “requirement of immediacy” and the statutes according to the donations it was no longer in dispute.

The “principle of immediacy,” requires that a nonprofit organization can indeed engage helpers to achieve their goals, it must be a traceable control procedures are set binding.

End of 2009 / early 2010 the WHS had met with the “WikiLeaks” only oral agreements, until the end of 2010, these arrangements were also fixed in a written contract with a project manager, in addition to the objectives and responsibilities and control processes are defined. Although the guidelines were already out of the contract throughout 2010, lived by all parties accordingly, did the tax office does not recognize that the immediacy was preserved and declined after 18 months of testing our appeal against the decision from [7] .

To the process after all this time to finally bring to a conclusion, the WHS agreed with the tax office to Hamburg to complain against a rejection of the opposition does not [8] and to obtain the profit for 2011 and subsequent years back.

Of present state

We have learned through this process, what contractual conditions, we need to encourage charitable can. All donors from 2010, we unfortunately have to say that these donations are not tax deductible. Nevertheless, these donations were used for the purposes of the donor.

When we are presented by the tax office promised exemption notification has been received, we can exhibit for the years 2011 and 2012 donation receipts upon request. For donations to 200, – Euro for the donor, the payment document is sufficient, together with the notice of exemption, which can then be downloaded from http://www.wauland.de.

The projects that promote Wau Holland Foundation, also here to inform.

We appreciate every donation, here you can see the form in which you can donate. For donations, large donations and inheritance rules please contact us at the contact form available.

Explanatory documents

[1] Emails between the Interior and Regional Council

[2]Innenminster of foundation supervision (2010-12-10)

[3] Foundation supervision of Interior Minister (2010-12-16)

[4] Interior Minister of Supervision of the Foundation (2011-01-05)

[5] Revocation of exempt status by the FA Kassel (2011-01-07)

[6] Objection to the tax office decision (2011-01-11)

[7] Objection decision of the Tax Office Hamburg-Nord (2012-10-25)

[8] Action waiver of WHS (2012-10-29)

Former CIA Officer John Kirakou Pleads Guilty to Disclosing Classified Information About CIA Officer

 

ALEXANDRIA, VA—Former CIA Officer John Kiriakou, 48, of Arlington, Virginia, pleaded guilty today to disclosing to a journalist the name of a covert CIA officer and also admitted to disclosing information revealing the role of another CIA employee in classified activities.

Neil H. MacBride, U.S. Attorney for the Eastern District of Virginia, and James W. McJunkin, Assistant Director in Charge of the FBI’s Washington Field Office, made the announcement after the plea was accepted by U.S. District Judge Leonie M. Brinkema.

Kiriakou pleaded guilty today to one count of intentionally disclosing information identifying a covert agent. As part of the plea agreement, the United States and Kiriakou agree that a sentence of 30 months in prison is the appropriate disposition of this case. Sentencing has been scheduled for January 25, 2013.

“The government has a vital interest in protecting the identities of those involved in covert operations,” said U.S. Attorney MacBride. “Leaks of highly sensitive, closely held, and classified information compromise national security and can put individual lives in danger.”

“Disclosing classified information, including the names of CIA officers, to unauthorized individuals is a clear violation of the law,” said Assistant Director in Charge McJunkin. “Today’s plea would not be possible without the hard work of the prosecutors and FBI special agents and analysts who brought this case to justice and who will continue to pursue those who ignore their obligations to protect national security secrets.”

According to court records, the case is a result of an investigation triggered by a classified filing in January 2009 by defense counsel for high-value detainees at Guantanamo Bay, Cuba. This filing contained classified information the defense had not been given through official government channels, including photographs of certain government employees and contractors. The investigation revealed that on multiple occasions, one of the journalists to whom Kiriakou illegally disclosed classified information, in turn, disclosed that information to a defense team investigator. This information was reflected in the classified defense filing and enabled the defense team to take or obtain surveillance photographs of government personnel. The government has made no allegations of criminal activity by any members of the defense team for the detainees.

Kiriakou was a CIA intelligence officer between 1990 and 2004, serving at headquarters and in various classified overseas assignments. Upon joining the CIA in 1990 and on multiple occasions in following years, Kiriakou signed secrecy and non-disclosure agreements not to disclose classified information to unauthorized individuals. In a statement of facts filed with his plea agreement, Kiriakou admitted that he made illegal disclosures about two CIA employees and their involvement in classified operations to two journalists (referenced as “Journalist A” and “Journalist B” in court records) on multiple occasions between 2007 and 2009.

Kiriakou admitted that, through a series of e-mails with Journalist A, he disclosed the full name of a CIA officer (referred to as “Officer A” in court records) whose association with the CIA had been classified for more than two decades. In addition to identifying the officer for the journalist, Kiriakou also provided information that helped the journalist link the officer to a particular classified operation.

In addition, Kiriakou admitted that he disclosed to Journalists A and B the name and contact information of a CIA analyst, identified in court records as “Officer B,” along with his association with an operation to capture terrorism subject Abu Zubaydah in 2002. Kiriakou knew that the association of Officer B with the Abu Zubaydah operation was classified. Based in part on this information, Journalist B subsequently published a June 2008 front-page story in The New York Times disclosing Officer B’s alleged role in the Abu Zubaydah operation.

Without Kiriakou’s knowledge, Journalist A passed the information he obtained from Kiriakou to an investigator assisting in the defense of high-value detainees at Guantanamo Bay.

Kiriakou also admitted that he lied to the CIA regarding the existence and use of a classified technique, referred to as a “magic box,” while seeking permission from the CIA’s Publications Review Board to include the classified technique in a book.

This case was investigated by the FBI’s Washington Field Office, with assistance from the CIA and the Air Force Office of Special Investigations. Assistant U.S. Attorneys Iris Lan of the Southern District of New York; Mark E. Schneider and Ryan Fayhee of the Northern District of Illinois; and W. Neil Hammerstrom, Jr. of the Eastern District of Virginia are prosecuting the case on behalf of the United States.

 



	

Revealed – US Government Publications Citing WikiLeaks

US Government Publications Citing WikiLeaks


150 publications cited:

http://www.gpo.gov/fdsys/search/search.action?sr=1&originalSearch=wikileaks&st=wikileaks&ps=
50&na=&se=&sb=re&timeFrame=&dateBrowse=&govAuthBrowse=&collection=&historical=false


1.
Congressional Hearings. General. Judiciary. Thursday, December 16, 2010.

…LEGAL AND CONSTITUTIONAL ISSUES RAISED BY WIKILEAKS…LEGAL AND CONSTITUTIONAL ISSUES RAISED BY WIKILEAKS ———- THURSDAY, DECEMBER…legal and constitutional issues raised by WikiLeaks before the Committee on Judiciary… More Information

2.
Congressional Hearings. General. Homeland and Governmental Affairs. Thursday, March 10, 2011.

…112-219 INFORMATION SHARING IN THE ERA OF WIKILEAKS: BALANCING SECURITY AND COLLABORATION…105 INFORMATION SHARING IN THE ERA OF WIKILEAKS: BALANCING SECURITY AND COLLABORATION…information-sharing strategies. Now I fear the WikiLeaks case has become a rallying cry for… More Information

3.
Congressional Record. Mrs. MILLER of Michigan. Wednesday, December 1, 2010.

…House] [Page H7760] IT IS TIME TO SHUT WIKILEAKS DOWN (Mrs. MILLER of Michigan asked…saw again this week the organization WikiLeaks release hundreds of thousands of classified…has committed treason. I think that WikiLeaks and its founder, Julian Assange,… More Information

4.
Congressional Record. Ms. WOOLSEY. Friday, July 30, 2010.

…House] [Pages H6563-H6564] WIKILEAKS DOCUMENTS ADD TO MOUNTING EVIDENCE AGAINST…to the news media this past weekend by WikiLeaks add to the mounting evidence that the…been asked to make for nearly a decade. WikiLeaks uncovers much that has been missing… More Information

5.
Congressional Bills. 111th Congress. Introduced in House. Wednesday, December 15, 2010.

…unlawfully disclosed and provided to WikiLeaks and public press outlets…unlawfully disclosed and provided to WikiLeaks and public press outlets. Resolved…unlawfully disclosed and provided to WikiLeaks and select public press outlets,… More Information

6.
Congressional Record. Mr. HOLT. Tuesday, August 10, 2010.

…Extensions of Remarks] [Page E1574] THE WIKILEAKS SCANDAL ______ HON. RUSH D. HOLT…Afghanistan that were published by the WikiLeaks.org website. Before rushing to judgment…so-called “Afghan War Diary” of WikiLeaks.org. Some of the documents I… More Information

7.
Congressional Record Index. Friday, December 31, 2010.

[Congressional Record Index (2010)] WIKILEAKS (Internet site) Bills and resolutions Dept. of State…classified documents unlawfully disclosed and provided to WikiLeaks (Internet site) and the news media (see H. Res…. More Information

8.
History of Bills. 111th Congress, 2nd Session. Introduced. 2010.

…all classified Department of State documents assessed by the Department to have been unlawfully disclosed and provided to WikiLeaks and public press outlets; to the Committee on Foreign Affairs. By Ms. ROS-LEHTINEN, H8520… More Information

9.
Congressional Hearings. General. Appropriations; Armed Services. Thursday, November 17, 2011.

…Nation’s vital secrets to prevent another Wikileaks episode and any further neutralization…challenge. Senator McCain. On the issue of Wikileaks, what’s your understanding of the status of investigations into the cause of Wikileaks? Dr. Vickers. Sir, the Office… More Information

10.
Congressional Record. Mr. FRANKS of Arizona, Mr. LAMBORN, and others. Tuesday, November 30, 2010.

…to start out tonight by addressing the WikiLeaks issue. I know that a lot of people across…my mind that what we’ve seen on the WikiLeaks issue is really more confirmatory than…that’s informative. In many ways what the WikiLeaks information has demonstrated is… More Information

11.
Congressional Record. Regarding H.J. Res. 64. Mr. KUCINICH, Mr. BERMAN, and others. Tuesday, July 27, 2010.

…here is that this Congress ignores the WikiLeaks documents that point out a connection…AID and civilian personnel to go. The WikiLeaks documents, with all the transparency…continue to rise. Documents released by WikiLeaks report that Pakistan intelligence… More Information

12.
Congressional Hearings. General. Foreign Affairs. Wednesday, December 1, 2010.

…which were unfortunately released by Wikileaks. However much one might deplore the…raising points based on revelations from WikiLeaks, but I am going to make an exception…York Times claim, based, it says, on WikiLeaks documents, that Iran has acquired… More Information

13.
Congressional Record. Regarding S. 4000. Ms. COLLINS and Mr. ENSIGN. Thursday, December 2, 2010.

…this year, the organization known as WikiLeaks, led by an Australian citizen named…al-Qaida in Afghanistan. In October, WikiLeaks dumped 400,000 classified documents…of Iraq. Now, just a few days ago, WikiLeaks has dumped another 250,000… More Information

14.
United States Courts Opinions. United States District Court District of Massachusetts. Judge Denise J. Casper: ORDER entered. MEMORANDUM AND ORDER – denying Defendants’ motion to dismiss. (Maynard, Timothy). Wednesday, March 28, 2012.

…having disclosed restricted material to WikiLeaks. Compl. ¶¶ 9, 12. Manning’s arrest followed WikiLeaks’ publication of “Collateral Murder…Filed 03/28/12 Page 3 of 27 4 and WikiLeaks were, at the time the complaint… More Information

15.
Congressional Hearings. General. Homeland and Governmental Affairs. Wednesday, March 30, 2011.

…indicated. There is no question that WikiLeaks‘ unauthorized publication of sensitive…share information. For instance, the WikiLeaks disclosures exposed the risks of what…course, but that in the aftermath of WikiLeaks, information must be shared in a… More Information

16.
Congressional Record. Regarding H. Res. 1556. Mr. McGOVERN, Mr. DREIER, and others. Tuesday, July 27, 2010.

…revelations in the documents published by WikiLeaks echoed these disturbing conclusions…just came out this past weekend, the WikiLeaks report that has been carried widely in…Pakistan, becomes urgent in light of the WikiLeaks expose, which has indicated that… More Information

17.
United States Courts Opinions. United States District Court District of Columbia. MEMORANDUM OPINION. Signed by Judge Colleen Kollar-Kotelly on July 23, 2012. (lcckk3). Monday, July 23, 2012.

…after being published by third-party WikiLeaks and because the State Department has allegedly…after being published by third-party WikiLeaks and because the State Department…precedent. No matter how extensive, the WikiLeaks disclosure is no substitute for… More Information

18.
Congressional Hearings. General. Armed Services. Thursday, December 2, 2010.

…we are very deeply concerned about Wikileaks, the impact that it has had on identifying…you held any individual responsible for Wikileaks, punished anyone, put anyone on leave…concerned, Admiral Mullen, about the Wikileaks issue. General Petraeus said:… More Information

19.
Congressional Hearings. Authorization. Armed Services. Thursday, February 17, 2011.

…just briefly. Anything more on the Wikileaks investigation? Secretary Gates…would be sufficient to prevent another Wikileaks event? If not, what other changes would…the major contributing factors in the WikiLeaks incident was the large amount of… More Information

20.
Congressional Hearings. General. Armed Services. Thursday, November 18, 2010.

McGRATH; MICHAEL J. McCORD; SHARON E. BURKE; SOLOMON B. WATSON; KATHERINE G. HAMMACK; VADM JAMES A. WINNEFELD, JR., USN; LTG KEITH B. ALEXANDER, USA; GEN RAYMOND T. ODIERNO, USA; LTG LLOYD J. AUSTIN III, USA; GEN DAVID H. PETRAEUS, USA; GEN. JAMES N. MATTIS, USMC; JONATHAN WOODSON,… More Information

21.
Congressional Hearings. General. Congressional-Executive Commission on China. Wednesday, March 24, 2010.

…security flaws. They posted the document at Wikileaks.\30\ Another anonymous group of Chinese…censorship software,” posted June 2009 on Wikileaks.org at:… More Information

22.
Congressional Reports. Committee on Homeland Security. Wednesday, December 28, 2011.

…dissemination of classified information on the WikiLeaks.org website, and the authorization…SENSITIVE INFORMATION In July 2010, WikiLeaks.org posted thousands of sensitive and…Security. The threat was compounded when WikiLeaks.org, in November 2010, released… More Information

23.
Congressional Hearings. General. Armed Services, Subcommittee on Emerging Threats and Capabilities. Wednesday, April 6, 2011.

…vulnerabilities, such as those identified in the WikiLeaks incident. Specifically, we have requested…insider threat-type setback, such as the WikiLeaks affair, is going to hamper further efforts…information? And what effect has the WikiLeaks case had on our… More Information

24.
Congressional Reports. Committee on Homeland Security. Tuesday, June 12, 2012.

…dissemination of classified information on the WikiLeaks.org website, and the authorization…SENSITIVE INFORMATION In July 2010, WikiLeaks.org posted thousands of sensitive and…security. The threat was compounded when WikiLeaks.org, in November 2010, released… More Information

25.
Congressional Reports. Committee on Homeland Security. Tuesday, June 28, 2011.

…SENSITIVE INFORMATION In July 2010, Wikileaks posted thousands of sensitive and classified…That threat was only compounded when Wikileaks, in November 2010, released another…of Treasury seeking the designation of Wikileaks and its founder on the Specially… More Information

26.
Congressional Hearings. General. Armed Services. Thursday, March 10, 2011.

…classified documents subsequently released by WikiLeaks. Speaking from an intelligence perspective…release of classified U.S. documents by WikiLeaks. While the impacts of the WikiLeaks disclosures are still being assessed, we… More Information

27.
Congressional Hearings. General. Homeland Security, Subcommittee on Oversight, Investigations, and Management; Homeland Security, Subcommittee on Counterterrorism and Intelligence. Wednesday, October 26, 2011.

…Saudi ambassador reportedly was quoted in Wikileaks that came out in the press as saying…State Department cable made public by WikiLeaks quotes Ambassador Jubeir as telling American…17\ “WikiLeaks Cable Hints at Motive for Alleged… More Information

28.
Congressional Hearings. Authorization. Armed Services. Wednesday, March 2, 2011.

…Obviously, in the light of the whole WikiLeaks thing, there have been heightened concerns…wants to add, obviously, you mentioned WikiLeaks, Mr. Smith. You are absolutely right…of things that happen with respect to WikiLeaks does not happen again. Beyond… More Information

29.
Congressional Record. Mrs. MILLER of Michigan. Tuesday, December 7, 2010.

…MILLER of Michigan. Mr. Speaker, since WikiLeaks has begun releasing American top secret…this. I believe that the actions of WikiLeaks provide material support to our terrorist…organization. Others have argued that WikiLeaks is simply a media organization… More Information

30.
Congressional Record. Mr. PAUL. Thursday, December 9, 2010.

…minutes. Mr. PAUL. Mr. Speaker, WikiLeaks‘ release of classified information has…information that he did not steal? And if WikiLeaks is to be prosecuted for publishing classified…number of deaths: Lying us into war or WikiLeaks‘ revelations or the release of the… More Information

31.
Congressional Record Index. Friday, December 31, 2010.

…unlawfully disclosed and provided to WikiLeaks (Internet site) and the news media…H2525-H2530 [14AP], E553 [15AP] WikiLeaks (Internet site): release of classified…the FCC (S. 649), S1615 [16MR] WikiLeaks (Internet site): release of… More Information

32.
Congressional Record Index. Friday, December 31, 2010.

…unlawfully disclosed and provided to WikiLeaks (Internet site) and the news media…Daily News: anniversary, H271 [21JA] WikiLeaks (Internet site): release of classified…tribute (S. Res. 494), S2481 [20AP] WikiLeaks (Internet site): release of… More Information

33.
Congressional Record Index. Friday, December 31, 2010.

…unlawfully disclosed and provided to WikiLeaks (Internet site) and the news media…antipersonnel landmines, E871 [18MY] WikiLeaks (Internet site): release of classified…antipersonnel landmines, S3864 [18MY] WikiLeaks (Internet site): release of… More Information

34.
Congressional Record Index. Friday, December 31, 2010.

…unlawfully disclosed and provided to WikiLeaks (Internet site) and the news media…committee members, H7301-H7304 [29SE] WikiLeaks (Internet site): release of classified…PATRIOT) Act: reform, S2108 [25MR] WikiLeaks (Internet site): release of… More Information

35.
Congressional Reports. Thursday, March 17, 2011.

…Committee also held a hearing on the Wikileaks organization and the principle of “need to know.” Wikileaks is an international organization that…matters. The Committee’s review of Wikileaks and other unauthorized releases… More Information

36.
Congressional Record Index. Friday, December 31, 2010.

…unlawfully disclosed and provided to WikiLeaks (Internet site) and the news media…28SE], H8333 [14DE], E2176 [16DE] WikiLeaks (Internet site): release of classified…S. 624), S7222- S7224 [20SE] WikiLeaks (Internet site): release of… More Information

37.
Congressional Record Index. Friday, December 31, 2010.

…unlawfully disclosed and provided to WikiLeaks (Internet site) and the news media…H846-H848, H895-H901 [25FE] WikiLeaks (Internet site): release of classified…tribute to National Guard, S5740 [12JY] WikiLeaks (Internet site): release of… More Information

38.
Congressional Record Index. Friday, December 31, 2010.

…unlawfully disclosed and provided to WikiLeaks (Internet site) and the news media…Writing on America Award, E1455 [28JY] WikiLeaks (Internet site): release of classified…Tribune: anniversary, S4843 [10JN] WikiLeaks (Internet site): release of… More Information

39.
Congressional Record Index. Friday, December 31, 2010.

…unlawfully disclosed and provided to WikiLeaks (Internet site) and the news media…H846-H848, H895-H901 [25FE] WikiLeaks (Internet site): release of classified…reform, S2108 [25MR] WikiLeaks (Internet site): release of… More Information

40.
Congressional Record. Regarding S. 3240. Mr. REID, Ms. MIKULSKI, and others. Tuesday, June 5, 2012.

…a 22-year-old Army private in the Wikileaks matter and former CIA employees in other…personnel such as the Army private in the WikiLeaks matter or the former CIA employee who…one thing to have a private, in the WikiLeaks matter, who had access to it,… More Information

41.
Congressional Record Index. Friday, December 31, 2010.

…unlawfully disclosed and provided to WikiLeaks (Internet site) and the news media…veterans and survivors, H2731 [21AP] WikiLeaks (Internet site): release of classified…Afghanistan (S. 3234), S4146 [24MY] WikiLeaks (Internet site): release of… More Information

42.
Congressional Record Index. Friday, December 31, 2010.

…unlawfully disclosed and provided to WikiLeaks (Internet site) and the news media…H8102, H8104 [8DE], E2202 [18DE] WikiLeaks (Internet site): release of classified…authority (S. 3847), S7560 [27SE] WikiLeaks (Internet site): release of… More Information

43.
Congressional Record Index. Friday, December 31, 2010.

…unlawfully disclosed and provided to WikiLeaks (Internet site) and the news media…convene (H.R. 5006), E522 [13AP] WikiLeaks (Internet site): release of classified…antipersonnel landmines, S3864 [18MY] WikiLeaks (Internet site): release of… More Information

44.
Congressional Record Index. Friday, December 31, 2010.

…unlawfully disclosed and provided to WikiLeaks (Internet site) and the news media…29JN] U.S. policy, H6047 [27JY] WikiLeaks (Internet site): release of classified…S5481, S5497 [28JN], S7587 [28SE] WikiLeaks (Internet site): release of… More Information

45.
Congressional Reports. Committee on the Judiciary. Monday, January 3, 2011.

…Legal and Constitutional Issues Raised by WikiLeaks. Committee on the Judiciary. December…Legal and Constitutional Issues Raised by WikiLeaks (Serial No. Not Available as of Jan…release of U.S. government documents by WikiLeaks, including the constitutional and… More Information

46.
Congressional Record Index. Friday, December 31, 2010.

…of bias in coverage of immigration issues, E1782 [29SE] WikiLeaks (Internet site): release of classified documents to the…attacks in Federal court in New York, NY, S1250 [8MR] WikiLeaks (Internet site): release of Dept. of Defense… More Information

47.
Compilation of Presidential Documents. Supplementary Materials. Friday, December 31, 2010.

…National Security Adviser James L. Jones, Jr., on the WikiLeaks web site posting documents concerning military operations…Released November 28 Statement by the Press Secretary on the WikiLeaks web site posting Department of State documents… More Information

48.
Congressional Hearings. General. Commerce. Wednesday, June 29, 2011.

…anonymous, the underground group associated with last year’s Wikileaks-related cyber attacks openly called for and carried out…Anonymous, the underground group associated with last year’s WikiLeaks-related cyber attacks, openly called for and carried… More Information

49.
Congressional Record. Thursday, March 10, 2011.

…behalf. [[Page D221]] INFORMATION SHARING IN THE ERA OF WIKILEAKS Committee on Homeland Security and Governmental Affairs…concluded a hearing to examine information sharing in the era of WikiLeaks, focusing on balancing security and collaboration,… More Information

50.
Congressional Hearings. Appropriation. Appropriations, Subcommittee on State, Foreign Operations, and Related Programs. Thursday, February 25, 2010.

…make a brief comment about the recent leaks that were from WikiLeaks. To be clear, as President Obama said yesterday, that…Afghanistan. You just cannot impose order from above. The WikiLeaks was just–not new history, ancient history. You… More Information

51.
Congressional Record. Wednesday, December 1, 2010.

…by Chairman Levin and Representative Brady (TX). BRIEFING–WIKILEAKS Permanent Select Committee on Intelligence: Met in executive session to receive a briefing on WikiLeaks Unauthorized Disclosures of Classified Information. The… More Information

52.
Congressional Record. Regarding H.R. 1. Mr. ROGERS of Kentucky, Mr. DICKS, and others. Tuesday, February 15, 2011.

…Maryland is recognized for 5 minutes. Mr. BARTLETT. Last week, there was WikiLeaks activity that pointed out a huge problem that we in the world face. WikiLeaks released some confidential emails that indicated that the Saudis had only… More Information

53.
Congressional Hearings. Appropriation. Appropriations, Subcommittee on Commerce, Justice, Science, and Related Agencies. Wednesday, March 2, 2011.

…cases, you almost have to start over. Mr. Wolf. Yes. Look at the pain and suffering that WikiLeaks has created. I mean, what took place in WikiLeaks has resulted in the death of people and the fall of governments. It has done a pretty… More Information

54.
Congressional Record. Thursday, December 9, 2010.

…Department of Justice; and public witnesses. BRIEFING–WIKILEAKS UPDATE Permanent Select Committee on Intelligence: Met in executive session to receive a briefing on Update on WikiLeaks Unauthorized Disclosures. The Committee was briefed… More Information

55.
Congressional Hearings. General. Judiciary, Subcommittee on Intellectual Property, Competition, and the Internet. Wednesday, May 25, 2011.

…attack that wreaks the most damage as demonstrated by the WikiLeaks case where thousands of classified State Department documents…the Government have increased at an alarming rate. Although WikiLeaks has become the face of security breaches within the… More Information

56.
Congressional Hearings. General. Armed Services. Thursday, March 3, 2011.

…have. Now, you have to shrink Saudi Arabia a bit because WikiLeaks, a couple weeks ago, indicated they have been fibbing about…China, are demanding hugely increased amounts of oil. The WikiLeaks thing indicates there is less oil out there than we… More Information

57.
Congressional Hearings. General. Science, Space, and Technology. Thursday, March 3, 2011.

…oil, and Saudi Arabia needs to be diminished of it because Wikileaks a couple weeks ago indicated they have been fibbing about…India, using hugely increased amounts of oil. We have the Wikileaks a couple weeks ago indicating that… More Information

58.
Congressional Hearings. General. Homeland Security. Thursday, March 10, 2011.

…can to keep our homeland secure.” When asked about WikiLeaks and the potential prosecution of Julian Assange, Holder said, “it’s an ongoing investigation.” “What Wikileaks did, at the end of the day, was harmful to… More Information

59.
Congressional Record. Regarding H. Res. 79. Mr. DREIER, Mr. SENSENBRENNER, and others. Thursday, February 10, 2011.

…Twitter provide the account details of people connected to the WikiLeaks easel including its founder, Julian Assange, isn’t noteworthy…inform the people whose records the government was seeking. WikiLeaks says it suspects that other large sites like Google and… More Information

60.
Congressional Record. Mr. FRANKS of Arizona. Thursday, December 16, 2010.

…cited by the New York Times but has not yet been posted by Wikileaks says that Saudi donors remain the chief financiers of Sunni…CPC” to receive an indefinite waiver. In one of the Wikileaks cables written earlier this year on Saudi King Abdullah… More Information

61.
Compilation of Presidential Documents. Interviews With the News Media. Friday, March 11, 2011.

…USA, who is accused of leaking classified documents to the WikiLeaks organization . Categories: Interviews With the News Media…Criminal Court, International; Defense and national security : WikiLeaks publication of classified U.S. Government… More Information

62.
Congressional Hearings. General. Homeland Security, Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies. Wednesday, March 16, 2011.

…as field reports on Pakistan) were obtained by the group WikiLeaks.org. According to DOD, this investigation was related…new oil and gas field bid negotiations. As we saw with the WikiLeaks document disclosures brought about by a malicious… More Information

63.
Congressional Record. Regarding H.R. 4899. Mr. OBEY, Mr. LEWIS of California, and others. Tuesday, July 27, 2010.

…distinguished gentleman from Ohio (Mr. Kucinich). Mr. KUCINICH. Wikileaks released 92,000 previously secret documents, totaling 200…It would be good if Congress had announced hearings once WikiLeaks documents came forward. But what we’ve learned is… More Information

64.
Congressional Record. Mr. PAUL. Wednesday, January 26, 2011.

…to attack. A State Department cable recently published by WikiLeaks confirmed that U.S. Ambassador April Glaspie did indeed…seems willing to end. Julian Assange, the publisher of the WikiLeaks memo, is now considered an enemy of the state…. More Information

65.
Congressional Record. Regarding H.R. 1586. Mr. ALEXANDER, Mr. NELSON of Florida, and others. Monday, August 2, 2010.

…Florida. Mr. President, last weekend, a Web page called WikiLeaks posted what they titled the “Afghan War Diary.” It…right now in Newsweek: “Taliban Seeks Vengeance in Wake of WikiLeaks. Leaked U.S. Intel documents listed the names and… More Information

66.
Congressional Record. Thursday, December 16, 2010.

…Pages D1206-D1207] Committee Meetings ESPIONAGE ACT/WIKILEAKS Committee on the Judiciary: Held a hearing on the Espionage Act and the Legal and Constitutional Issues Raised by WikiLeaks. Testimony was heard from public witnesses…. More Information

67.
Congressional Hearings. Nomination. Select Committee on Intelligence of the United States Senate. Thursday, September 22, 2011.

…Intelligence Community, especially within Washington. While WikiLeaks garnered a lot of attention because of its scope, there continue…IG with respect to compromises or potential compromises and WikiLeaks-type situations. I think that there tends to be a… More Information

68.
Congressional Hearings. General. Judiciary. Wednesday, March 16, 2011.

…mortgage fraud, for example–it seems that we know some things and we have learned through WikiLeaks and those who received some of the WikiLeaks information about Bank of America and Bank of America is involved with the Balboa… More Information

69.
Congressional Hearings. General. Appropriations; Foreign Relations. Wednesday, March 16, 2011.

gpo.gov/fdsys/ _____ U.S. GOVERNMENT PRINTING OFFICE 74-273 PDF WASHINGTON : 2009 ———————————————————————– For sale by the Superintendent of Documents, U.S. Government Printing Office Internet:… More Information

70.
Congressional Record. Mr. SMITH of Texas. Thursday, December 2, 2010.

…classified State Department documents obtained illegally by WikiLeaks. But one year ago, The Times declined to print information…contradictory temperature data. Regarding its decision to print the WikiLeaks documents, The Times wrote: “For The Times to… More Information

71.
Congressional Record Index. Friday, December 31, 2010.

…their families, and recognize efforts of emergency response workers at the mine disaster (H. Res. 1236), E590 [20AP] WikiLeaks (Internet site): release of Dept. of Defense classified documents to the news media related to Pakistan and… More Information

72.
Congressional Record Index. Friday, December 31, 2010.

…attack the U.S. be considered enemy combatants to be tried by military tribunals instead of civilian courts, H7745 [30NO] WikiLeaks (Internet site): release of classified documents to the news media, H7743, H7745 [30NO] World War II:… More Information

73.
Congressional Record Index. Friday, December 31, 2010.

…Votes: position on missed, H8966 [22DE], E265 [26FE] Wheelin’ Team 457 (organization): tribute, E86 [26JA] WikiLeaks (Internet site): release of classified documents to the news media, H7760 [1DE], H8035 [7DE] Remarks in House… More Information

74.
Congressional Record Index. Friday, December 31, 2010.

…War II veterans traveling to Washington, DC, to visit memorials built in their honor (H. Res. 1673), E1754 [28SE] WikiLeaks (Internet site): release of classified documents to the news media, H8278 [9DE] Remarks in House relative to… More Information

75.
Congressional Record Index. Friday, December 31, 2010.

…and approval to amendments made by Maryland, Virginia, and the District of Columbia (S.J. Res. 25), H2522 [14AP] WikiLeaks (Internet site): release of classified documents to the news media, E2044 [2DE] World Intellectual Property Day:… More Information

76.
Congressional Record Index. Friday, December 31, 2010.

…provide whistleblower protections to certain workers in the offshore oil and gas industry (H.R. 5851), H6489 [30JY] WikiLeaks (Internet site): release of Dept. of Defense classified documents to the news media related to Pakistan and… More Information

77.
United States Courts Opinions. United States District Court Eastern District of California. FINDINGS and RECOMMENDATIONS signed by Magistrate Judge Kendall J. Newman on 12/17/10 RECOMMENDING that Pltf’s 17 Motion to Remand be granted and this entire case be remanded to the Superior Court of the State of California, County of El Dorado; Third-Party Deft USA’s 35 Motion to Dismiss the First Amended Third-Party…. Monday, December 20, 2010.

…v. Nat’l Ass’n of Sec. Dealers, Inc., 159 F.3d 1209, 1211 (9th Cir. 1998); Bank Julius Baer & Co. v. Wikileaks, 535 F. Supp. 2d 980, 984 (N.D. Cal. 2008). District courts have diversity jurisdiction over “all civil… More Information

78.
Congressional Record. Friday, March 4, 2011.

…Counsel, 10 a.m., SD-342. March 10, Full Committee, to hold hearings to examine information sharing in the era of WikiLeaks, focusing on balancing security and collaboration, 3 p.m., SD-342. Committee on the Judiciary: March 9, to… More Information

79.
Compilation of Presidential Documents. Addresses and Remarks. Tuesday, July 27, 2010.

…Force, commander; Afghanistan : U.S. military forces :: Deployment; Afghanistan : U.S. policy review; Afghanistan : WikiLeaks publication of classified U.S. military documents; Armed Forces, U.S. : Funding; Business and industry :… More Information

80.
Congressional Hearings. General. Oversight and Government Reform, Subcommittee on National Security, Homeland Defense and Foreign Operations. Wednesday, May 25, 2011.

…attacked Google and at least 80 other U.S. companies. Not all threats to Federal cybersecurity are external. In June 2010, Wikileaks released thousands of classified Department of State and Department of Defense documents. Immediately following the… More Information

81.
Congressional Hearings. General. Homeland Security, Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment. Tuesday, December 15, 2009.

…Eco-Terrorism: Environmental and Animal Rights Militants in The United States, (May 7, 2008), available at http://wikileaks.org/leak/dhs-ecoterrorism-in-us- 2008.pdf. \34\ T.J. Greaney, `Fusion Center’ Data Draws Fire… More Information

82.
Congressional Hearings. General. Judiciary. Wednesday, April 29, 2009.

…cover anybody who Tweets regularly or who posts reports about current events on a Web site like Facebook, or even sites like Wikileaks that encourage people to disseminate classified information illegally. My staff has met with your staff on this bill,… More Information

83.
Congressional Hearings. General. Homeland Security, Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment. Wednesday, March 18, 2009.

…Eco-Terrorism: Environmental and Animal Rights Militants in the United States, (May 7, 2008), available at http://wikileaks.org/leak/dhs-ecoterrorism-in-us-… More Information

84.
Congressional Hearings. General. Foreign Relations. Tuesday, May 24, 2011.

…largely by the Haqqani network, the ferocious Taliban militia based in Pakistan’s tribal regions. According to a July 2009 WikiLeaks cable from the U.S. consulate in Peshawar, which abuts the Pakistani tribal regions, Jalaluddin Haqqani, the… More Information

85.
Congressional Record. Mr. SANDERS. Thursday, March 10, 2011.

…session of the Senate on March 10, 2011, at 3 p.m. to conduct a hearing entitled “Information Sharing in the Era of WikiLeaks: Balancing Security and Collaboration.” The PRESIDING OFFICER. Without objection, it is so ordered. Committee on… More Information

86.
Congressional Record. Regarding H.R. 1892. Mr. ROGERS of Michigan, Mr. RUPPERSBERGER, and others. Friday, December 16, 2011.

…country safe, technological advances have also increased the risks of this cooperation. As we saw last year with the damage of Wikileaks the threat from a malicious insider, with the “keys to the kingdom,” is real. This bill requires the Director… More Information

87.
United States Courts Opinions. United States Bankruptcy Court Southern District of New York. (Written Opinion) Memorandum of Opinion Signed on 7/22/2011 Regarding the Applicant, Dr. Martin Prager. (Porter, Marguerite). Friday, July 22, 2011.

…900120, at *7 (E.D. Va. March 11, 2011) (application of 18 U.S.C. § 2703(d) to foreign users involved in WikiLeaks investigation not an extraterritorial application of U.S. law because statute governs disclosure by the American… More Information

88.
Congressional Record. Mr. KUCINICH. Tuesday, July 27, 2010.

…AMERICA (Mr. KUCINICH asked and was given permission to address the House for 1 minute.) Mr. KUCINICH. Wake up, America. WikiLeaks‘ release of secret war documents gave us 92,000 reasons to end the wars. Pick one. Wake up, America. Main Street… More Information

89.
Congressional Record. Mr. BOND, Mr. DURBIN, and others. Wednesday, November 17, 2010.

…disclosed, and the lives that will likely be lost, as a result of the obscene amount of classified information compromised by Wikileaks. Of course, to call this a leak case is gross mischaracterization; it is more like a tidal wave. We are blessed with… More Information

90.
Congressional Record. Regarding H.R. 1892. Mr. ROGERS of Michigan, Mr. RUPPERSBERGER, and others. Friday, September 9, 2011.

…country safe, unrestrained and unregulated access can put our country at great risk. As we have seen from both the damage of WikiLeaks and historical espionage cases, the threat from a malicious insider with the keys to the kingdom is very real. We are… More Information

91.
Congressional Record. Mr. McCONNELL, Mr. KYL, and others. Thursday, December 16, 2010.

…nuclear missile defense to a significant degree. I am not persuaded that that has not occurred. For example, the latest WikiLeaks reveal that the administration negotiated away President Bush’s plan for a forward missile defense site in Poland in… More Information

92.
Congressional Record Index. Friday, December 31, 2010.

[Congressional Record Index (2010)] ASSANGE, JULIAN Remarks in House WikiLeaks (Internet site): release of classified documents to the news media, H8035… More Information

93.
Congressional Record Index. Friday, December 31, 2010.

…rates, H3761 [25MY] Votes: position on missed, H6124 [27JY], E201, E208, E213 [23FE], E894, E897 [20MY] WikiLeaks (Internet site): release of classified documents to the news media, H7744 [30NO] Tributes Popps, Dean G.,… More Information

94.
Congressional Record Index. Friday, December 31, 2010.

…H138 [13JA] ——transmit to the House of Representatives classified documents unlawfully disclosed and provided to WikiLeaks (Internet site) and the news media (see H. Res. 1763), H8520 [15DE] Developing countries: protect girls… More Information

95.
Congressional Hearings. General. Foreign Affairs, Subcommittee on the Middle East and South Asia. Wednesday, June 20, 2012.

…I think was warranted. We’ve had a long history of problems with Ms. Abul Naga. If you go back and look back at these Wikileaks documents, you’ll see a stack about this thick of complaints from the U.S. Embassy about how Ms. Abul Naga… More Information

96.
Congressional Record. Regarding S. Res. 4. Monday, March 7, 2011.

…SH-219 3 p.m. Homeland Security and Governmental Affairs To hold hearings to examine information sharing in the era of WikiLeaks, focusing on balancing security and collaboration. SD-342 MARCH 15 10 a.m. Budget To hold hearings to examine the… More Information

97.
Congressional Record. Regarding H.R. 754. Ms. KLOBUCHAR and Mrs. FEINSTEIN. Thursday, May 26, 2011.

…requiring the intelligence community to prevent another security disaster, such as the recent leaks of classified information to Wikileaks, through the implementation of automated information technology threat detection programs that must be fully… More Information

98.
Congressional Hearings. General. Oversight and Government Reform, Subcommittee on Federal Workforce, U.s. Postal Service and Labor Policy. Tuesday, November 15, 2011.

…what you are offering. The Federal Government has a hard time keeping secrets. Don’t take my word for it, just look at WikiLeaks. The idea that somehow we can feel secure that you all have created a system that is going to be secure. Mr. Berry…. More Information

99.
Congressional Hearings. General. Judiciary, Subcommittee on Crime, Terrorism, and Homeland Security. Thursday, February 17, 2011.

…S.? And what do we do when criminals start using secure communication tools provided by developers associated with the WikiLeaks organization, who will ignore requests by U.S. law enforcement agencies? Ms. Caproni. Thank you for that… More Information

100.
Congressional Record. Regarding S. Res. 4. Wednesday, March 2, 2011.

…SH-219 3 p.m. Homeland Security and Governmental Affairs To hold hearings to examine information sharing in the era of WikiLeaks, focusing on balancing security and collaboration. SD-342 MARCH 15 10:15 a.m. Judiciary To hold hearings to… More Information

101.
Congressional Record. Friday, December 10, 2010.

…Foreclosed Justice: Causes and Effects of the Foreclosure Crisis– Part II, 10 a.m., 2141 Rayburn. December 16, hearing on the Espionage Act and the Legal and Constitutional Issues Raised by WikiLeaks, 9:30 a.m., 2141… More Information

102.
Congressional Record. Mr. KERRY, Mr. INOUYE, and others. Friday, December 17, 2010.

…would all acknowledge it is becoming less and less so, as we have all painfully seen, even in things like the most recent WikiLeaks situation that occurred on cable traffic. There are growing problems in Iran and North Korea, and all of the concerns… More Information

103.
Congressional Record. Regarding H.R. 754. Mr. ROGERS of Michigan, Mr. RUPPERSBERGER, and others. Thursday, May 12, 2011.

…NCTC. The bill also adds hundreds of millions of dollars for intelligence above current levels. In response to the Web site WikiLeaks, the bill includes an insider threat detection program that automatically monitors unauthorized access to classified… More Information

104.
Congressional Record. Tuesday, November 30, 2010.

…Insurers and Patients, 10:30 a.m., 2141 Rayburn. Permanent Select Committee on Intelligence, executive, briefing on WikiLeaks Unauthorized Disclosures of Classified Information, 11 a.m., 304-HVC. Subcommittee on Intelligence Community… More Information

105.
Congressional Record. Mr. NELSON of Florida. Tuesday, November 30, 2010.

…To betray those sources, to now put their lives in jeopardy by the indiscriminate turning over to an organization called WikiLeaks that suddenly puts all of this up on the Web, is the height of irresponsibility, an act against humanity, and it has… More Information

106.
Congressional Record Index. Friday, December 31, 2010.

…17JN] Dept. of State: transmit to the House of Representatives classified documents unlawfully disclosed and provided to WikiLeaks (Internet site) and the news media (see H. Res. 1763), H8520 [15DE] Executive Office of the President: request… More Information

107.
Congressional Hearings. General. Energy and Commerce, Subcommittee on Commerce, Manufacturing, and Trade. Thursday, June 2, 2011.

…believe, is unprecedented in its size and scope. Initially anonymous, the underground group associated with last year’s WikiLeaks-related cyber attacks openly called for and carried out massive denial-of-service attacks against numerous Sony… More Information

108.
United States Courts Opinions. United States District Court District of Columbia. MEMORANDUM OPINION AND ORDER that Mr. Paracha shall file the past-due report by May 2, 2011; government’s opposition to the emergency application is due by May 11, 2011; and reply is due by May 18, 2011. Signed by Judge Paul L. Friedman on April 29, 2011. (MA). Friday, April 29, 2011.

…petitioner Saifullah Paracha’s counsel filed an emergency application for immediate access to all publicly available WikiLeaks documents relevant to Mr. Paracha’s case. See Emergency Application at 1, Apr. 27, 2011. The following day,… More Information

109.
Congressional Hearings. General. Commerce. Wednesday, May 11, 2011.

…secure communications networks or our research and development efforts. Now, some of them are being outsourced thanks to WikiLeaks, et cetera, but we have to find a way to deal with all of this. Co-Chair Hutchison, I just had a long meeting… More Information

110.
Congressional Record. Mr. BARTLETT. Tuesday, May 24, 2011.

…look like if the size of the country was relative to how much oil it had. Now we’ve got to modify this a little because WikiLeaks just exposed some papers from Saudi Arabia that said they’ve been fibbing about how much oil they have, that they… More Information

111.
Congressional Reports. Committee on Armed Services. To accompany S. 1253. Wednesday, June 22, 2011.

…Further interactions with the Department have not settled the issue. On the one hand, especially in the aftermath of the Wikileaks disaster, the Department really has dramatically, and one assumes permanently, reduced the number of computers and… More Information

112.
Congressional Hearings. General. Banking, Subcommittee on Securities, Insurance, and Investment; Homeland and Governmental Affairs, Permanent Subcommittee on Investigations. Wednesday, December 8, 2010.

…make sure, while this data is being collected and for the right purposes, that it is secure and that we do not read about WikiLeaks or anything else with our positions because that would be catastrophic to our clients. Chairman Levin. OK. But… More Information

113.
Congressional Hearings. General. Armed Services. Tuesday, March 1, 2011.

…There is now escalating unrest in the Arab world where most of the world’s oil reserves are. And a couple of weeks ago, WikiLeaks indicated that Saudi Arabia has 40 percent less oil reserves than they were claiming. That is probably true of most of… More Information

114.
Congressional Hearings. General. Judiciary, Subcommittee on the Constitution, Civil Rights, and Civil Liberties. Thursday, December 9, 2010.

…information, sensitive information. We don’t want to tell you. It is why you know more about the United States from reading WikiLeaks than you get in classified briefings from this executive branch and previous ones. It is not a partisan issue; it… More Information

115.
Congressional Record. Wednesday, March 9, 2011.

…of Special Counsel, 10 a.m., SD-342. Full Committee, to hold hearings to examine information sharing in the era of WikiLeaks, focusing on balancing security and collaboration, 3 p.m., SD-342. Committee on the Judiciary, business… More Information

116.
Congressional Record. Regarding H. Con. Res. 28. Ms. ROS-LEHTINEN, Mr. KUCINICH, and others. Thursday, March 17, 2011.

…committing many more American lives and hundreds of billions of additional U.S. dollars for many years to come. As the WikiLeaks war diary comprised of more than 91,000 secret reports on the Afghanistan War makes clear, any sense of American and… More Information

117.
Congressional Hearings. General. Foreign Affairs, Subcommittee on Africa, Global Health, and Human Rights. Thursday, December 8, 2011.

…a dozen European and American companies have helped their government to put them in jail. According to files released by WikiLeaks in partnership with five news media outlets last week, more than 160 companies are actually involved. The surveillance… More Information

118.
Congressional Record. Regarding H. Res. 493. Mr. BISHOP of Utah, Mr. HASTINGS of Florida, and others. Wednesday, December 14, 2011.

…job-creating small businesses, and also the inclusion of important cyberprotections to prevent future incidents similar to WikiLeaks. This bill will also ensure the long-term strength of programs critical to our naval dominance and strategic… More Information

119.
Congressional Record. Mr. LEAHY, Mr. CHAMBLISS, and others. Monday, September 12, 2011.

…it. Unfortunately, some of the old tendencies to restrict intelligence are recurring, particularly amid concerns about Wikileaks. I share the anger about the many leaks of classified information that have jeopardized successful intelligence… More Information

120.
Congressional Record. Regarding H. Res. 1735. Mr. BERMAN, Mr. POE of Texas, and others. Tuesday, November 30, 2010.

…denuclearization issue for the past 20 years. The unconscionable revelations of classified information in the past few days by WikiLeaks have nonetheless opened our eyes to the full extent of the North Korean cooperation with the little tyrant from the… More Information

121.
Congressional Record Index. Friday, December 31, 2010.

…Unemployment: provide additional emergency unemployment compensation, S2189 [12AP] ——rates, S137 [22JA] WikiLeaks (Internet site): release of classified documents to the news media, S8270 [30NO] ——release of Dept. of… More Information

122.
United States Courts Opinions. United States District Court Eastern District of California. FINDINGS and RECOMMENDATIONS signed by Magistrate Judge Kendall J. Newman on 7/19/10 RECOMMENDING that the Judicial Defendants’ motion to dismiss 107 be granted and that plaintiffs’ claims against defendants Thomas A. Anderson, Candace Heidelberger, Delores Spindler, Hilary Berardi (formerly known as Hilary Burget…. Tuesday, July 20, 2010.

…Investor Life Ins. Co. v. Waddell & Reed Inc., 360 F.3d 960, 966-67 (9th Cir. 2004); Bank Julius Baer & Co. v. Wikileaks, 535 F. Supp. 2d 980, 984 (N.D. Cal. 2008). Case 2:09-cv-00522-JAM-KJN Document 144 Filed… More Information

123.
Congressional Reports. Committee on Armed Services. Monday, January 3, 2011.

…Afghanistan and Iraq July 21, 2010–Skelton Honors WWII and Current Service Members July 26, 2010–Skelton Statement on WikiLeaks July 27, 2010–Skelton Statement on the Vote on the War Supplemental July 29, 2010–Skelton on Army Health… More Information

124.
Congressional Hearings. Authorization. Judiciary, Subcommittee on Crime, Terrorism, and Homeland Security. Wednesday, March 9, 2011.

…What is wrong with those protections? Mr. Sanchez. Well, I think the problem here is that as, for example, the recent WikiLeaks disclosures have made clear, when databases, however protected or classified they may be, are allowed to contain… More Information

125.
Congressional Hearings. General. Oversight and Government Reform. Thursday, July 7, 2011.

…regards to ensuring we have the latest and greatest products installed. HBSS is an example as we kind of worked through the Wikileaks mitigation but continuous efforts working with them on threat mitigation. Mr. Baker. A significant amount of… More Information

126.
Congressional Hearings. General. Armed Services . Thursday, September 23, 2010.

…countries on our–through the–via the Internet. I am concerned, given the case of Private Manning and–and the WikiLeaks case, as well, about attacks within, you know–in other words, people that have access to our systems that… More Information

127.
Congressional Hearings. General. Natural Resources, Subcommittee on Energy and Mineral Resources. Thursday, June 16, 2011.

…40 of the overall oil price when oil was at its height. http://www.mcclatchydc.com/2011/05/25/114759/wikileaks– saudis-often-warned.html See also: http://www.mcclatchydc.com/2011/05/&#8230; More Information

128.
Congressional Record. Mr. MARKEY. Tuesday, January 18, 2011.

…Boston Globe, Dec. 29, 2010] Probe Both Sides in Sri Lanka No foreign leader has fared worse in the cables released by WikiLeaks than Sri Lanka’s President Mahinda Rajapaksa, who has been resisting calls for an international inquiry into possible… More Information

129.
Congressional Record. Wednesday, December 8, 2010.

…Civil Liberties, hearing on Civil Liberties and National Security, 9:30 a.m., 2141 Rayburn. Permanent Select Committee on Intelligence, executive, briefing on Update on WikiLeaks Unauthorized Disclosures, 1 p.m.,… More Information

130.
Congressional Record. Mr. BROUN of Georgia, Mrs. LOWEY, and others. Friday, February 18, 2011.

…terrorists, given that they had exported 15 of the 19 homicide bombers on September 11, given that just in December when the WikiLeaks came out, it was learned in a quote from the Secretary of State, “It has been an ongoing challenge to persuade… More Information

131.
Congressional Record. Mr. SCHUMER, Mr. REID, and others. Friday, December 3, 2010.

…investments to secure Federal information systems. We have just been briefed on the profound and deleterious impact of the WikiLeaks. We have a lot of work to do to improve our security systems. Are those unobligated funds coming out of that program?… More Information

132.
Congressional Record. Mr. KERRY and Mr. DORGAN. Monday, November 29, 2010.

…the Office of Senate Security and read the transcript of that hearing, which I suspect will stay there and not appear in WikiLeaks. If my colleagues want a public statement on verification, I would once again cite what James Clapper, the Director… More Information

133.
Congressional Record Index. Friday, December 31, 2010.

…civilian courts, H7745 [30NO] U.S.-Russian Strategic Arms Reduction Treaty (START): renewal, H2570, H2571 [14AP] WikiLeaks (Internet site): release of classified documents to the news media, H7743 [30NO] Remarks in House relative to… More Information

134.
Congressional Hearings. General. Judiciary, Subcommittee on Crime, Terrorism, and Homeland Security. Tuesday, November 15, 2011.

…are concerned that we are witnessing the opening salvos of a new kind of conflict waged in cyberspace. As we learned in the Wikileaks case, one individual with access to classified data can threaten America’s national operational security, and as we… More Information

135.
Congressional Documents. 111th Congress. Wednesday, December 22, 2010.

…States. We need to have a law of war which allows us to hold them. As a final thought on intelligence, however, the recent WikiLeaks scandal has shown us what damage the Internet can do to our diplomatic efforts as well as the safety of those in… More Information

136.
United States Courts Opinions. United States District Court Eastern District of California. ORDER signed by Magistrate Judge Kendall J. Newman on 3/9/2010 GRANTING plaintiff’s 2 6 Motions to Proceed In Forma Pauperis. Plaintiff obligated to pay filing fee of $350 for action. The 1 Complaint is DISMISSED w/leave to amend. Within 30 days from date of Order, plaintiff shall complete attached Notice of Amendment…. Wednesday, March 10, 2010.

…Investor Life Ins. Co. v. Waddell & Reed Inc., 360 F.3d 960, 966-67 (9th Cir. 2004); Bank Julius Baer & Co. v. Wikileaks, 535 F. Supp. 2d 980, 984 (N.D. Cal. 2008). Although the captions in plaintiff’s form complaint and… More Information

137.
Congressional Hearings. General. Financial Services, Subcommittee on Financial Institutions and Consumer Credit. Wednesday, September 14, 2011.

…perpetrate malicious activity. We saw evidence of this in the denial-of-service attacks on the payment card industry after WikiLeaks events last year. One such botnet targeting the financial services industry is called Qakbot. It is a sophisticated… More Information

138.
Congressional Reports. Permanent Select Committee on Intelligence. To accompany H.R. 754. Tuesday, May 3, 2011.

…threat is complex and real and growing by the day. Incidents like the unauthorized disclosure of classified information by Wikileaks also show us that despite the tremendous progress made since 9/11 in information sharing, we still need to have… More Information

139.
Congressional Record. Mrs. MALONEY. Thursday, December 15, 2011.

…the Saudi intelligence chief and as ambassador to the United States, suggested that Saudi Arabia may seek nuclear weapons. Wikileaks revealed that Egypt’s leaders told U.S. officials that Egypt would acquire nuclear weapons if Iran did. This lends… More Information

140.
Congressional Hearings. General. Intelligence. Thursday, February 3, 2011.

…or making it more efficient I’d just urge you to think outside the box and let us help you do that. Lastly, since the Wikileaks disclosure began the tug between the need to know versus the need to share has come under increased scrutiny. What are… More Information

141.
Congressional Hearings. General. Intelligence. Wednesday, February 16, 2011.

…Perhaps the most prominent example recently is the unauthorized downloading of classified documents, subsequently released by WikiLeaks. From an intelligence perspective, these disclosures have been very damaging. I want to assure the Committee that as… More Information

142.
Congressional Hearings. Appropriation. Appropriations, Subcommittee on Financial Services and General Government Appropriations. Thursday, February 10, 2011.

…give us that that information would be kept secure? Now, that is not an issue with your agency, per se. We have seen the Wikileaks. So what sort of assurances could we have? Mr. Shulman. I think there has been some inaccurate commentary about the… More Information

143.
Congressional Record. Regarding H.R. 1905. Ms. ROS-LEHTINEN, Mr. KUCINICH, and others. Tuesday, December 13, 2011.

…A. headquarters, described Amano as being “ready for prime time.” According to the cable, which was obtained by WikiLeaks, in a meeting in September, 2009, with Glyn Davies, the American permanent representative to the I.A.E.A.,… More Information

144.
Congressional Record. Mr. LEAHY. Wednesday, December 22, 2010.

…and national security posed by data breaches have not gone away. The recently reported cyber attacks in response to the WikiLeaks disclosures are fresh reminders of the urgent need to have national standards to protect the privacy of America’s… More Information

145.
Congressional Record. Regarding H. Con. Res. 335. Mr. BERMAN, Mrs. LOWEY, and others. Friday, December 17, 2010.

…interventions and times that I dealt with him on a particular project over the years, but I feel like I would be bringing WikiLeaks to the House floor were I to go through all of those. So I will restrain myself just to say he truly was one of a… More Information

146.
Congressional Record. Regarding H.R. 4853. Mr. REID, Mr. McCONNELL, and others. Tuesday, December 14, 2010.

…States. We need to have a law of war which allows us to hold them. As a final thought on intelligence, however, the recent WikiLeaks scandal has shown us what damage the Internet can do to our diplomatic efforts as well as the safety of those in… More Information

147.
Congressional Record. Wednesday, December 15, 2010.

…closed hearings to examine certain intelligence matters, 2:30 p.m., SH-219. House Committee on the Judiciary, hearing on the Espionage Act and the Legal and Constitutional Issues Raised by WikiLeaks, 10 a.m., 2141… More Information

148.
Congressional Record. Mrs. BACHMANN, Mr. SKELTON, and others. Wednesday, December 15, 2010.

…all classified Department of State documents assessed by the Department to have been unlawfully disclosed and provided to WikiLeaks and public press outlets; to the Committee on Foreign Affairs. By Mr. BERMAN (for himself, Mr. Poe of Texas, Ms…. More Information

149.
Congressional Record. Monday, November 29, 2010.

…of 2010, 3 p.m., H-313 Capitol. Permanent Select Committee on Intelligence, December 1, executive, briefing on WikiLeaks Unauthorized Disclosures of Classified Information, 11 a.m., 304-HVC. December 1, Subcommittee on Intelligence… More Information

150.
Congressional Record. Mr. BARTLETT. Friday, December 2, 2011.

…may have 22 percent of all the reserves in the world. You may remember, oh, 6 weeks or a couple months ago, there was a WikiLeaks expose that said that maybe the Saudis had overestimated their oil reserves by as much as 40 percent. So the map might… More Information


WIKILEAKS intervenes in the U.S. federal election

 

Dear WikiLeaks Friend,

From today WikiLeaks has decided to intervene in the U.S. federal election. It is clear that whether Republicans or Democrats are in power, without the sort of pressure we can exert when we are at our strongest, the U.S. government will continue to declare the whole world a battleground. Last Friday, the Pentagon publicly reissued its threats against WikiLeaks, demanding that we destroy our previous publications and cease “soliciting” U.S. military whistleblowers — and that our failure to do so was an ongoing “crime” and “law enforcement matter”. The FBI file for the pending prosecution of WikiLeaks, according to court records from earlier this year, has reached 42,135 pages. WikiLeaks is determined to stop these and other moves towards what appears to be ?€? let’s be honest ?€? a transnational security state dystopia. We believe knowledge is power and that knowledge should be in the hands of the people. By placing huge quantities of secret knowledge into your hands we can stop the concentration of power that is driving these trends. We ask that you cast the only vote that matters, and vote with your wallet. It is possible for you to make donations with your credit card, despite the attempted blockade. To do so, visit http://wikileaks.org/donate Also, please consider visiting our campaign website, at http://wikileaks.org/donate2012 and passing it on to your friends and family. Below are some suggestions Friends of WikiLeaks might want to consider to support WikiLeaks in this campaign: -Show your support to the world AND financially assist WikiLeaks: Buy a Tshirt at the official WikiLeaks store: http://www.wikileaks.spreadshirt.com – Download a poster to print and display from: http://www.somersetbean.blogspot.com – write to your national papers to correct libels against Assange and WikiLeaks: eg Julian Assange has not been charged with any crime anywhere, yet publications state the contrary. – write articles, facebook posts, tweets emails etc titled ‘Why I will not be voting for Obama’ or ‘Why I will not be voting from Romney – Contact your friends, family, colleagues and classmates organise a WikiLeaks campaign event – Create a WikiLeaks Campaign/Defence Group at your school, college, University or work place Solidarity, Julian Assange and Team

Unveiled – The Syria Files by Wikileaks

Julian Assange, investigative partnership organised by WikiLeaks and the data obtained by WikiLeaks.

Bernd Pulch, MA, Publisher and Journalist

 

 

 

 

Dear Readers,

in continuing our partnership with Wikiileweaks we will soon publish the Syria Files by Wikileaks.

WikiLeaks began publishing the Syria Files – more than two million emails from Syrian political figures, ministries and associated companies, dating from August 2006 to March 2012.

This extraordinary data set derives from 680 Syria-related entities or domain names, including those of the Ministries of Presidential Affairs, Foreign Affairs, Finance, Information, Transport and Culture.

Over the next two months, ground-breaking stories derived from the files will appear in WikiLeaks (global), Al Akhbar (Lebanon), Al Masry Al Youm (Egypt), ARD (Germany), Associated Press (US), L’Espresso (Italy), Owni (France) and Publico.es (Spain). Other publications will announce themselves closer to their publishing date.

WikiLeaks founder Julian Assange said: “The material is embarrassing to Syria, but it is also embarrassing to Syria’s opponents. It helps us not merely to criticise one group or another, but to understand their interests, actions and thoughts. It is only through understanding this conflict that we can hope to resolve it.”

At this time Syria is undergoing a violent internal conflict that has killed between 6,000 and 15,000 people in the last 18 months. The Syria Files shine a light on the inner workings of the Syrian government and economy, but they also reveal how the West and Western companies say one thing and do another.

The range of information extends from the intimate correspondence of the most senior Baath party figures to records of financial transfers sent from Syrian ministries to other nations.

The database comprises 2,434,899 emails from the 680 domains. There are 678,752 different email addresses that have sent emails and 1,082,447 different recipients. There are a number of different languages in the set, including around 400,000 emails in Arabic and 68,000 emails in Russian. The data is more than eight times the size of ’Cablegate’ in terms of number of documents, and more than 100 times the size in terms of data. Around 42,000 emails were infected with viruses or trojans. To solve these complexities, WikiLeaks built a general-purpose, multi-language political data-mining system which can handle massive data sets like those represented by the Syria Files.

In such a large collection of information, it is not possible to verify every single email at once; however, WikiLeaks and its co-publishers have done so for all initial stories to be published. We are statistically confident that the vast majority of the data are what they purport to be.

We would like to thank our sources, technical team, donors and defenders without whom this contribution to the historical record would not be possible. https://wlfriends.org/

For more information on the Syria Files, please see: http://wikileaks.org/syria-files/re…

For media enquiries, please see: http://wikileaks.org/Press

Sincerely your

Bernd Pulch, MA, Publisher and Journalist

>Cryptome unveils AntiLeaks Questions

AntiLeaks Questions

 


A sends:

Antileaks,

Several questions:

1. What do you hope to gain by your recent attack upon WL?

2. Are you affiliated officially or unofficially with any US
governmental organization? Meaning, are you acting on "orders" or
autonomously?

3. If (2) is a positive, or even as allegedly US citizens, how do you
reconcile your actions with the First Amendment to the Bill of Rights?

4. What would you say to other American Citizens who have viewed your
cyber actions in a negative light?

5. Would you like to comment on the logistics of your attacks? It was
reported that several thousands of computers were taken over for the
attack. Do you confirm these reports?

6. Do you view your actions as: criminal acts, acts of vigilantes or
otherwise?

7. Does antileaks view WL as a "online publisher", a terrorist group
or otherwise?

8. Is antileaks opposed to all "leaks"? Is there any situation when a
leak is justified in the minds of "antileaks" by governmental or
non-governmental actors (and in the realm of any historical context)?

Appreciated.

Sex, Lies and Julian Assange – Full Movie

He had just humiliated the most powerful nation in the world, heading one of the most controversial cyber operations in history. So when Julian Assange arrived in Sweden in August 2010 he was greeted like a conquering hero. But within weeks there was a warrant out for his arrest and he was being investigated for rape and sexual molestation. However, as the details of the allegations against Assange emerged, suspicions arose over the legal barrage being aimed at him. Exploring the mysterious circumstances surrounding the case, this doc gets to the heart of a bizzare tale of international cat and mouse.
“Sitting outdoors with the world’s coolest, smartest people! It’s amazing!”, Anna Ardin tweeted, as she sat at a barbecue she had arranged for Assange. Yet according to the allegations she would later bring against him he had recently sexually abused her. “You wouldn’t send such messages if you had been raped by someone the night before”, argues Assange’s lawyer. Both Assange and his supporters believe the attempt to force his return to Sweden is simply the first step in a plan to see him extradited to the United States and that the case against him is a set up.
It’s clear that when Assange arrived in Sweden Anna Ardin & Sofia Wilen were both enthralled by the Wikileaks phenomena and he slept with both women over a period of weeks. The charges originated with a misunderstanding in a Stockholm police station that “some sort of sex crime had been committed”. Wilen refused to sign what had been taken down. Assange was interviewed but not charged with any offence. But 12 days after being given permission to leave the country, the case was re-opened and the Swedes issued a warrant for his arrest.
At this point Assange was at the height of his powers and three weeks later he delivered a massive hit against America: the Iraq War Logs. An outraged US labelled him a “traitor” and were overcome with calls to “shoot the son-of-a-bitch”. Shortly afterwards Sweden issued an Interpol Red Notice for his arrest; a highly unusual move. “Red Notices are normally the preserve of terrorists and dictators. Even Gaddafi was not subject to a Red Notice.”
After 500 days of fighting extradition from the UK to Sweden, Assange made his dramatic dash to the Ecuadorian embassy. In an interview from inside, Assange claims he had sensed the net tightening around him when, “the Swedish government publicly announced that it would detain me without charge in severe conditions. On the same evening security contractors turned up unannounced at 10:30pm and insisted on fitting another manacle to my leg”.
Following the complex twists and turns of the entire saga, this documentary charts a case far more complex than the Swedes seem to be admitting to. When pressed about the strange manner in which the charges were brought the answer is baffling: “I can very well understand the confusion…it is very difficult to understand, well, exactly how it works.” And as Assange’s US lawyer points out, he should be worried. “I’d be very nervous, because if the United States get their hands on you, you’re a goner.”

 

 

Unveiled – Why Assange Remained Within an Embassy Window

Why Assange Remained Within an Embassy Window to Deliver a Speech

Assange speech photos: http://cryptome.org/2012-info/assange-juliets/assange-juliets-romedia.htm

 


[Image]

Based on photos of Assange’s appearance at the Ecuadorian Embassy he carefully did not cross the legal boundary of the embassy, that is, the national boundary of Ecuador, by stepping onto the balcony where two videographers were positioned. (A protruding balcony is considered to be outside a building in most laws governing buildings.) This could indicate recognition that if he had crossed the boundary police could have entered the embassy to arrest him on the grounds that he had breached the national boundary and thereby lost asylum protection.

An inadvertent transgression, violating a precise definition of a boundary like a national border, has been used in many other cases to pursue a person across the boundary — borders of the Soviet satellites and US borders, for example.

Assange was awkwardly positioned in the embassy window frame to face the entire widespread crowd as he would have been able to do if he had stood on the balcony.

Toward the end of his speech Assange looked skyward, perhaps toward a helicopter which may have been video-taping his exact position. A toe, a foot, an arm might be forgiven, but a fully body likely not. Evidence will tell if he went too far, or will be accused of doing so.

His own two videographers will have evidence of compliance, although it is not clear if his lower body was taped. Photographs taken by the crowd could show more if they were zoomed to the border of Ecuador at Assange’s lower body.

Not to be overlooked, however, is that his position within the window frame could have been for quick escape against violence or kidnap, official or otherwise.

[Image]

Assange is an inch or so taller than the interior frame of the window (photos show he stooped to pass through the frame). Thus it would have been more convenient to move to the balcony for the speech if not advised against it.

[Image]

Assange’s shoe remains on the window sill, the Ecuador national boundary. Shoe and sill enlarged below.

[Image]

Shoe toe over the sill edge but within the Ecuador boundary.

 

 


 

 

 


 

 

 


 

Unveiled – Assange Juliets the Romedia Photos

Assange Juliets the Romedia Photos

Based on photos of Assange’s appearance at the Ecuadorian Embassy he carefully did not cross the legal boundary of the embassy, that is, the national boundary of Ecuador, by stepping onto the balcony where two videographers were positioned. (A protruding balcony is considered to be outside a building in most laws governing buildings.) This could indicate recognition that if he had crossed the boundary police could have entered the embassy to arrest him on the grounds that he had breached the national boundary and thereby lost asylum protection.

An inadvertent transgression, violating a precise definition of a boundary like a national border, has been used in many other cases to pursue a person across the boundary — borders of the Soviet satellites and US borders, for example.

Assange was awkwardly positioned in the embassy window frame to face the entire widespread crowd as he would have been able to do if he had stood on the balcony.

Toward the end of his speech Assange looked skyward, perhaps toward a helicopter which may have been video-taping his exact position. A toe, a foot, an arm might be forgiven, but a fully body likely not. Evidence will tell if he went too far, or will be accused of doing so.

His own two videographers will have evidence of compliance, although it is not clear if his lower body was taped. Photographs taken by the crowd could show more if they were zoomed to the border of Ecuador at Assange’s lower body.

Not to be overlooked, however, is that his position within the window frame could have been for quick escape against violence or kidnap, official or otherwise.

 


Julian Assange, founder of WikiLeaks re-enters the embassy after making a statement from a balcony of the Equador Embassy in London, Sunday, Aug. 19, 2012. Assange called on United States President Barack Obama to end a “witch hunt” against the secret-spilling WikiLeaks organization. AP

[Image]

WikiLeaks founder Julian Assange looks up as he retreats from the window of Ecuadorian Embassy in central London after making a statement to the media and supporters outside, Sunday, Aug. 19, 2012. Assange called on United States President Barack Obama to end a “witch hunt” against the secret-spilling WikiLeaks organization. AP

[Image]

WikiLeaks founder Julian Assange makes a statement to the media and supporters at a window of Ecuadorian Embassy in central London, Sunday, Aug. 19, 2012. Julian Assange entered the embassy in June in an attempt to gain political asylum to prevent him from being extradited to Sweden, where he faces allegations of sex crimes, which he denies. AP

[Image]

[Image]

[Image]

[Image]

[Image]

[Image]

[Image]

[Image]

 


WikiLeaks founder Julian Assange, left, with his legal adviser Balthasar Garcon, right, talk inside the Ecuadorian embassy in London, Sunday Aug. 19, 2012. WikiLeaks founder Julian Assange took refuge inside Ecuador’s Embassy in London two months ago, seeking to avoid extradition to Sweden for questioning over sexual misconduct allegations. Woman at centre unidentified. AP

[Image]

Police officers stand outside the Ecuadorian Embassy [balcony perhaps to be Assange pulpit] in London on August 19, 2012. WikiLeaks founder Julian Assange was to face the world’s media today from Ecuador’s embassy in London where he has been holed up for two months, but the Australian risks arrest if he steps outside.

[Image]

 


 

 

 

 


 

 

 


 

Unveiled – Assange Protest Photos EC Embassy 12-0816

Julian Assange Protest Photos 16 August 2012

[Image]

AP

[Image]

British police officers stand guard outside the Ecuadorian Embassy in central London, Thursday, Aug. 16, 2012 after Ecuadorean Foreign Minister Ricardo Patino announced that he had granted political asylum to WikiLeaks founder Julian Assange. He’s won asylum in Ecuador, but Julian Assange is no closer to getting there. The dramatic decision by the Latin American nation to identify the WikiLeaks founder as a political refugee is a symbolic boost for the embattled ex-hacker, but legal experts say that does little to help him avoid extradition to Sweden and does much to drag Britain and Ecuador into a contentious international faceoff. AP

[Image]

AP

[Image]

Getty

[Image]

AP

[Image]

Getty

[Image]

AP

[Image]

Getty

[Image]

Reuters

[Image]

Getty

[Image]

Getty

[Image]

Getty

[Image]

Getty

[Image]

Reuters

[Image]

Reuters

[Image]

Getty

[Image]

Getty

[Image]

Getty

[Image]

Getty

[Image]

Reuters

[Image]

Getty

[Image]

AP

[Image]

Getty

[Image]

Ecuador’s Foreign Minister Ricardo Patino speaks during a news conference in Quito August 16, 2012. Ecuador has granted political asylum to WikiLeaks’ founder Julian Assange, Patino said on Thursday, a day after the British government threatened to storm the Ecuadorean embassy in London to arrest Assange. Britain has said it is determined to extradite the former computer hacker, who enraged Washington in 2010 when his WikiLeaks website published secret U.S. diplomatic cables, to Sweden where he has been accused of rape and sexual assault. Reuters

Video – Ecuador Grants Assange Asylum

DemocracyNow.org – As Ecuador prepared to announce its decision on granting asylum to WikiLeaks founder Julian Assange, Britain threatened to raid the Ecuadorian embassy in London where Assange has taken refuge for the past two months. Britain told Ecuador that giving Julian Assange asylum would not change a thing and that it might still revoke the diplomatic status of Quito’s embassy in London to allow the extradition of the WikiLeaks founder to Sweden, to face questioning over alleged sexual misconduct. We’re joined by Michael Ratner, an attorney for Julian Assange and President Emeritus of the Center for Constitutional Rights; and by Ben Griffin, an activist with Veterans for Peace U.K., participating in a vigil in support of Assange outside the Ecuadorean embassy in London. “Is this really about the U.S. being the ‘hidden hand’ behind what the British are doing so they can eventually get a hold of Julian Assange, try him for espionage and put him in a jail?” Ratner asks. “That’s what’s going on here — lets not kid ourselves.”

Watch all Democracy Now! reports on Julian Assange at:http://www.democracynow.org/topics/julian_assange

To watch the complete weekday independent news hour, read the transcript, download the podcast, search our vast archive, or to find more information about Democracy Now! and Amy Goodman, visithttp://www.democracynow.org/

FOLLOW DEMOCRACY NOW! ONLINE:
Facebook: http://www.facebook.com/democracynow
Twitter: @democracynow
Subscribe on YouTube: http://www.youtube.com/democracynow
Listen on SoundCloud: http://www.soundcloud.com/democracy-now
Daily Email News Digest: http://www.democracynow.org/subscribe

Please consider supporting independent media by making a donation to Democracy Now! today, visit http://www.democracynow.org/donate/YT

Info – New WikiLeaks Donation Gateway

Dear WikiLeaks Friend,

We urge all our supporters around the world to use their Visa and MasterCard to donate to WikiLeaks today with a new system, whilst they still can –

http://shop.wikileaks.org/donate#dccard

In a statement at 11am BST today, Wednesday 18th July, WikiLeaks announced the opening of a new payment gateway that allows the public to donate to WikiLeaks with their Visa and MasterCards, depsite the banking blockade.

The banking blockade by US financial institutions that has been running for almost two years has meant that WikiLeaks has lost 95% of its donations and have been forced to run off reserve funds. These reserve funds will run out in a few months.

However, today, WikiLeaks has found a way around this blockade with a new payment system of FDNN using Carte Bleue. The French credit card system, Carte Bleue, is coupled with the VISA/MasterCard system globally. VISA and MasterCard are contractually barred from directly cutting off merchants through the Carte Bleue system.

The French non-profit FDNN (Fund for the Defense of Net Neutrality- Fonds de Défense de la Net Neutralité) has set up a Carte Bleue fund for WikiLeaks.

Julian Assange, WikiLeaks’ founder said: “We beat them in Iceland and, by God, we’ll beat them in France as well. Let them shut it down. Let them demonstrate to the world once again their corrupt pandering to Washington. We’re waiting. Our lawyers are waiting. The whole world is waiting. Do it.”

———————-

To support WikiLeaks and find out all the ways to donate, including our new creditcard system, PayPal, Flattr and Bitcoin and keep us strong at https://shop.wikileaks.org/donate.

For the full press release and new donation video go to:

http://www.wikileaks.org/Press-Release-WikiLeaks-opens-path.html

 


 

 


 

 

 


	

Cryptome – Whistleblowing in a Wikileaks World

Whistleblowing in a Wikileaks World

 


Date: Fri, 3 Aug 2012 14:05:12 +0200
From: “Patrice Riemens” <patrice[at]xs4all.nl>
To: nettime-l[at]kein.org
Subject: <nettime> Gregory M Bernard’s [MA] thesis on ‘Whistleblowing in a Wikileaks World’ (ExecSum)

Gregory M Bernard
Whistleblowing in a Wikileaks World
A Model for Responsible Disclosure in Homeland Security MA thesis (March 2012)
Naval Postgraduate School (US Navy)
Monterey, California

Full text thru: http://calhoun.nps.edu/public/handle/10945/6769

EXECUTIVE SUMMARY

Introduction

A dramatic change in the information-sharing environment has occurred over the last decade. New technologies, the rapid evolution of the Internet, and innovations in social media have provided the ability to gather and share information at an unprecedented level. The Executive Branch of the U.S. Government touts the virtues of transparency, while Congress defines whistleblowing and the disclosure of government fraud/waste/abuse as a “civic duty”, and yet the Freedom of Information Act (FOIA) process is broken, the Whistleblower Protection Act (WPA) is woefully inadequate, and secrecy continues to run rampant. The disclosure of hundreds of thousands of potentially classified documents to the organization Wikileaks may be an example of what this contradiction has caused. The existence of Wikileaks as an organization is irrelevant now, and their most significant contribution is not the release of 1.2 million documents. Rather, the most significant impact of Wikileaks is their successful demonstration and validation of the ‘Wikileaks model.’ Wikileaks has demonstrated the power of the Internet using web technologies to provide protections through anonymity, while giving individuals access to a worldwide audience. The current troubles faced by the organization may or may not portend the end of Wikileaks; however, it does provide a glimpse into the future of whistleblowing. Building upon the apparent success of the Wikileaks model, the Wall Street Journal and Al-Jazeera have both implemented “anonymous” whistleblower submission sites. This new paradigm for communications, as enabled by the innovative uses of the Internet and social media, provides both opportunities and areas for concern regarding government transparency.

Problem Statement

Whistleblowing serves as a critical check and balance system to government bureaucracy, helping to circumvent administrative roadblocks and to provide a mechanism through which homeland security can monitor and increase efficiency in its operations. Homeland security also deals with information that can be of a sensitive or secret nature, the unauthorized disclosure of which can cause damage to both homeland security efforts and national security. Maintaining the balance between secrecy and transparency is a difficult proposition; however, current government efforts, particularly its handling of whistleblowers, places that balance in jeopardy. The government has taken some steps to address some of these problems; however, the government has also taken extreme measures to prosecute any whistleblowers who stray outside the appropriate submission process (i.e., deemed an unauthorized leak of sensitive/classified information) or are not protected by the WPA. Instead of acknowledging that current policy on whistleblowers is broken, the government’s current course of action decreases the likelihood important fraud/waste/abuse information will be received from whistleblowers, while possibly influencing their decision and encouraging them to bypass authorized channels and instead utilize the Internet to protect themselves from identification and retaliation. The current lack of public trust in government, and the existence of alternative avenues for disclosure that provide greater protections than those currently offered by the U.S. Government, serve to exacerbate the problem.

Research Question

What policy model and associated technological process could the U.S. DHS implement that will encourage whistleblowers to submit information through authorized channels as opposed to leaking information to unauthorized parties?

Analysis

To answer the research question, this thesis explores three primary areas. The first is the whistleblowing environment, to include definitions, applicable policies, laws (both domestic and international), authorized and unauthorized processes, motivations, public trust, requirements, and intentions of all parties involved. The second area of focus is technology, specifically, the available options, best practices, and vulnerabilities of potential technological solutions (e.g., phone, email, web). The final portion of thesis serves to develop and evaluate policy options based on the findings and conclusions identified in the first two areas of analysis.

Those findings are as follows:

• Overclassification is a problem• Information sharing is critical to both U.S. security and U.S democracy

• Homeland security efforts require public (to include its employees and partners) trust and support to succeed

• The ability to keep secrets and maintain control of classified information will continue to decrease

• Decreasing overclassification will save the United States money

• Whistleblowing is a civic duty xvi

• The government is committed to providing whistleblower protections

• Whistleblowers are in large part motivated by patriotism

• Anonymity is a positive incentive for whistleblowers

• Fourth and Fifth Estates (media and stateless news organizations) provide alternatives to the government process

• Public trust in the government has declined

• Public trust can be increased through the use of third parties

• Technology exists to provide anonymity to whistleblowers

• Current options for whistleblowing are inadequate These premises form the foundation and justification for the implementation of any solution.

Current legitimate/authorized processes, such as submission through standard government channels, present significant risks to the whistleblower. Clandestine/unauthorized processes, such as the Internet (Wikileaks) and mainstream media, represent a clear breach of the law, which is in conflict with the “do the right thing” mindset of many whistleblowers. If whistleblowers had a way to communicate identified issues through an authorized third party that would serve as a proxy on their behalf, it would undermine the current processes (both legitimate and clandestine), potentially making them obsolete. It would reduce the personal risk faced by whistleblowers by providing the anonymity that makes the clandestine approach attractive, without clearly breaking the law. The Department of Homeland Security has an opportunity to build upon and improve the “Wikileaks Model,” to harness its use of technology and process to create a solution that would meet the needs of both whistleblowers and the government. If implemented correctly, the number of legitimate whistleblower complaints would increase (overall submissions would increase), and the number of whistleblowers who choose unauthorized avenues would be expected to decrease.

Recommendation

For any solution to be considered successful, it is critical to establish a clear definition of success. This thesis proposes the following definition of success for any whistleblowing solution. To promote the voluntary disclosure of information by any man or woman who reasonably believes that organizational wrongdoing has occurred, the facilitation of corrective action to address the wrongdoing, and providing for the protection of the submitter while maintaining information security, all within the bounds of U.S. law.

Four key pillars create the foundation for success.

• Whistleblowers must have the support of leadership• Legislation and policies must be clear and straightforward

• Whistleblowing policies must enforce accountability

• Authorized channels must provide at least as much protection as unauthorized channels

The conclusions drawn in this thesis, including the policy model ultimately recommended, is based on the research and the findings identified above. Combined with a current understanding of the problem, the evaluation criteria, and the potential solutions available, it is recommended that the government establish a partnership with a non-government organization (NGO) within U.S. legal jurisdiction, and subsidize the establishment of a government sponsored whistleblower submission website and virtual private network. This solution would allow whistleblowers to submit information to the government with the protection of anonymity, through the third party NGO. Establishing this policy provides whistleblowers who truly believe in improving government operations through the submission of information on fraud/waste/abuse or other types of concerns, a legitimate way to achieve their goal without risking their career and future on the weak whistleblower protections currently in place. While it may not completely eliminate leaks to the media or organizations, such as Wikileaks, the researcher believes those leaks will decrease as more whistleblowers give the government an opportunity to act on their submission.

 



	

TOP-SECRET – Australian Department of the Prime Minister and Cabinet WikiLeaks Talking Points

The following documents were publicly released on July 11, 2012 in response to a Freedom of Information request to the Australian Department of the Prime Minister and Cabinet for:

“All documents (including electronic documents) that have been sent by the Department of the Prime Minister and Cabinet to the Prime Minister between 1 January 2011 and 4 June 2012 that relate to WikiLeaks, Mr Julian Paul Assange and/or United States Army private Bradley Manning.”

Australian Department of the Prime Minister and Cabinet WikiLeaks Talking Points

DOWNLOAD THE ORIGINAL DOCUMENT HERE:

 

AU-DPMC-WikiLeaks

Networth of Julian Assange

Julian Assange is an Australian publisher, journalist, computer programmer and Internet activist, with a net worth of $300 thousand. Julian Assange has earned his net worth as the editor in chief of WikiLeaks, which is a whistleblower website to create open governments, by exposing private, secret, and classified media from anonymous news sources, news leaks, and whistleblowers. Assange was born in Townsville, Queensland, Australia, on July 3, 1971. He is well-known for his public appearances in many parts of the world, to speak out about freedom of the press, censorship and investigative journalism.

Some topics that have been published on his WikiLeaks site include; extrajudicial killings in Kenya, toxic waste dumping in Cote d’Ivoire, and procedures at Guantanamo Bay. WikiLeaks has five international print media partners, which include; Der Spiegel, e Monde, The Guardian, El Pais and The New York Times. In November, of 2010 WikiLeaks and its five media partners began publishing detailed correspondence between the U.S State Department and its diplomatic missions around the world, (also known as Cablegate).

How much is Julian Assange worth?

Julian Assange Net Worth

Assange has won many awards and nominations, including the 2009 Amnesty International Media Award and Readers’ Choice for TIME magazine’s 2010 Person of the Year. In his youth he was referred to as “Australia’s most famous, ethical, computer hacker” by the Personal Democracy Forum. As a youth, he was charged with 31 counts of hacking and related crimes. It took three years for the case to make it to court where Julian pled guilty to 25 charges of hacking. The other six charges were dropped. He was released on bond for good conduct, after being fined AUD $2,100. Assange has never been married, however, he does have one son with an ex-girlfriend. After a custody battle that lasted for years, the couple formed an activist group, referred to as, “Parent Inquiry Into Child Protection,” which created a “central databank” for otherwise inaccessible legal records, related to child custody issues in Australia.

Unveiled by Wikileaks – BULGARIA – Stasi mayor unacceptable

Date 2011-07-12 13:27:06 From ben.preisler@stratfor.com
To eurasia@stratfor.com
Others Listname: mailto:eurasia@stratfor.com
MessageId: <4E1C2F8A.8000705@stratfor.com>
InReplyTo: 4E1B2BD5.9000703@stratfor.com
Text Glasove – Bulgaria. Bulgaria’s governing party Gerb is putting
up a former State Security officer as its candidate for mayor
of Bulgaria’s fifth largest city Russe in the Bulgarian local
elections scheduled for October. The opposition online
newspaper Glasove is disgusted: “Stoilov was a permanent
employee of the State Security who openly admits that he
recruited soldiers for military counter-espionage and is proud
of it to boot. In an interview last year he said that many
things in Bulgaria would have turned out differently had the
State Security been reformed in the right way. … You must
have a screw loose if you can’t find anyone better than a guy
with a Stasi past after four years on the city council.”
(11/07/2011) +++
http://www.glasove.com/gerb-mozhe-da-specheli-mestnite-izbori-samo-ako-gi-falshifitsira-14877

Benjamin Preisler
+216 22 73 23 19

Investigative Partnership organised by WikiLeaks – the Data was obtained by WikiLeaks.

TOP-SECRET – Activation Order – ADM Cyberstalker Client

Activation Order –ADM Cyberstalker

Client – ADM Corporate Security Division

Overview – The client has requested a new cyberstalker report regarding their CEO, Patricia A. Woertz and her immediate family.

Deliverable – Stratfor will provide a written report detailing the available public information regarding the Woertz family. The report will include only information obtained from publicly available sources.

ACTIVATION ORDER – Cyberstalker Report

Date 2007-10-01 18:32:44
From alfano@stratfor.com
To howerton@stratfor.com
mfriedman@stratfor.com
gfriedman@stratfor.com
stewart@stratfor.com
McCullar@stratfor.com
greg.sikes@stratfor.com
briefers@stratfor.com
Others MessageId: <00df01c80448$b27a6020$8ead1cac@stratfor.com>
InReplyTo: 000c01c7fabf$b265ebf0$ae01a8c0@stratfor.com

The report will contain two primary sections.  The first section will be prose detailing our findings—this section will be approximately four to five pages long.  The second section will be appendices that will provide a copy and paste view of the actual information that we were able to obtain.

The final report should be delivered in PDF format.

Timeline – Anya will write this report.  Following comments from Stick, I’ll send the report to Mike McCullar for edit before COB on Thursday, October 4.  Mike will return the finished product to me by COB on Wednesday, October 10.

Comments –   Client is making decision about whether to conduct full re-investigations on other members of the family.

Investigative Partnership organised by WikiLeaks – the Data was obtained by WikiLeaks.

Unveiled – B4/G4 – GERMANY/RUSSIA – STASI Allegations Haunt German Gazprom Executive

 

B4/G4 – GERMANY/RUSSIA – Stasi Allegations Haunt German Gazprom Executive

Date 2008-05-07 17:05:55
From goodrich@stratfor.com
To os@stratfor.com
gvalerts@stratfor.com
Others InReplyTo: 4EE0BAE9.9020601@stratfor.com
Text
Stasi Allegations Haunt German Gazprom Executive

07.05.2008

An investigation has been launched into the alleged Stasi involvement of a
senior executive at the Russian gas monopoly Gazprom.

Felix Strehober, chief financial officer of Gazprom Germania, was under
investigation for his work as an undercover officer of the Stasi,
according to a Wednesday report in the German newspaper Die Welt.

Die Welt said Strehober, who was born in East Berlin, could be charged in
Cologne with perjury. Stehober had made a statutory declaration last year
declaring that he had never “been a salaried employee of the Ministry of
State Security (Stasi) or the equivalent.”

The prosecutor’s office in Cologne confirmed that Strehober is under
investigation.

More than 100 pages in official German archives showed that Strehober had
been an undercover officer for the Stasi, the hated East German police
notorious for its surveillance and imprisonment of ordinary Germans.

Gazprom not taking action

The German subsidiary of Gazprom, the world’s biggest gas company, said
the case was “an employee’s private matter.” A company spokesman said
Gazprom did not see any reason to take action, and added that Strehober
had placed the matter in the hands of a lawyer.

A statutory declaration is a legal affirmation equivalent to a statement
under a religious oath.

http://www.dw-world.de/dw/article/0,,3317092,00.html?maca=en-rss-en-all-1573-rdf

Lauren Goodrich
Director of Analysis
Senior Eurasia Analyst
Stratfor
Strategic Forecasting, Inc.
T: 512.744.4311
F: 512.744.4334
lauren.goodrich@stratfor.com
http://www.stratfor.com

 

 

Investigative Partnership organised by WikiLeaks – the Data was obtained by WikiLeaks.

TOP-SECRET – Stratfor – Re: [OS] GERMANY – computer to reassemble 45 million shredded STASI files

Investigative Partnership organised by WikiLeaks – the Data was obtained by WikiLeaks.

Re: [OS] GERMANY – computer to reassemble 45 million shredded Stasi files

Date 2007-05-11 21:46:04
From goodrich@stratfor.com
To analysts@stratfor.com
davison@stratfor.com
aaric.eisenstein@stratfor.com
Others MessageId: <4644C7FC.5000007@stratfor.com>
InReplyTo: 0e6f01c79404$f1f258c0$8a01a8c0@stratfor.com
Text
OMG… you can tell you have a kid!Aaric Eisenstein wrote:Get this to The King right away. There may yet be time to save Humpty
Dumpty!

Aaric S. Eisenstein

Stratfor

VP Publishing

700 Lavaca St., Suite 900

Austin, TX 78701

512-744-4308

512-744-4334 fax

———————————————————————-

From: os@stratfor.com [mailto:os@stratfor.com]
Sent: Friday, May 11, 2007 2:38 PM
To: analysts@stratfor.com
Subject: [OS] GERMANY – computer to reassemble 45 million shredded Stasi
files
New Computer Program to Reassemble Shredded Stasi Files
Millions of files consigned to paper shredders in the late days of the
East German regime will be pieced together by computer. The massive job
of reassembling this puzzle from the late Cold War was performed, until
now, by hand.

It’s been years in the making, but finally software designed to
electronically piece together some 45 million shredded documents from
the East German secret police went into service in Berlin on Wednesday.
Now, a puzzle that would take 30 diligent Germans 600 to 800 years to
finish by hand, according to one estimate, might be solved by computer
in seven.

Photo Gallery: Reconstructing the Cold War
Click on a picture to launch the image gallery (4 Photos)

“It’s very exciting to decode Stasi papers,” said Jan Schneider, head
engineer on the project at the Fraunhofer Institute for Production
Systems and Design Technology located in the German capital. “You have
the feeling you are making history.”

Or at least putting it back together again. In 1989, with the looming
collapse of the Communist regime becoming increasingly evident, agents
of the East German Staatssicherheitsdienst or Stasi feverishly plowed
millions of active files through paper shredders, or just tore them up
by hand.

Rights activists interrupted the project and rescued a total of 16,250
garbage bags full of scraps. But rescuing the history on those sheets of
paper amounted to an absurdly difficult jigsaw puzzle. By 2000, no more
than 323 sacks were legible again — reconstructed by a team of 15
people working in Nuremburg — leaving 15,927 to go. So the German
government promised money to any group that could plausibly deal with
the remaining tons of paper.

The Fraunhofer Institute won the contract in 2003, and began a pilot
phase of the project on Wednesday. Four hundred sacks of scraps will be
scanned, front and back, and newly-refined software will try to arrange
the digitized fragments according to shape, texture, ink color,
handwriting style and recognizable official stamps.

NEWSLETTER
Sign up for Spiegel Online’s daily newsletter and get the best of Der
Spiegel’s and Spiegel Online’s international coverage in your In- Box
everyday.

Gu:nter Bormann, from the agency that oversees old Stasi documents (the
Federal Commission for the Records of the national Security Service of
the Former German Democratic Republic), says most of the paper probably
dates from the years 1988 and 1989. “This is what Stasi officers had on
their desks at the end,” he says. “It’s not material from dusty
archives.”

Still-unknown Stasi informants — ordinary East Germans who spied on
other East Germans — stand to be uncovered. International espionage
files are reportedly not among the thousands of sacks; most of those
having been more conclusively destroyed.

The Fraunhofer Institute’s computers will start with documents torn by
hand, because large irregular fragments lend themselves to shape
recognition more readily than uniform strips from shredding machines.
The institute received a promise of EUR6.3 million ($8.53 million) in
April from the German parliament for this phase, which is expected to
take about two years.

If it’s deemed successful, the rest of the job would take four to five
years, according to project chief Bertram Nickolay. The final cost will
be up to EUR30 million.

msm/ap

Re: [OS] GERMANY – computer to reassemble 45 million shredded Stasi files

Date 2007-05-11 21:46:04
From goodrich@stratfor.com
To analysts@stratfor.com
davison@stratfor.com
aaric.eisenstein@stratfor.com
Others MessageId: <4644C7FC.5000007@stratfor.com>
InReplyTo: 0e6f01c79404$f1f258c0$8a01a8c0@stratfor.com
Text
OMG… you can tell you have a kid!Aaric Eisenstein wrote:

Get this to The King right away. There may yet be time to save Humpty
Dumpty!

Aaric S. Eisenstein

Stratfor

VP Publishing

700 Lavaca St., Suite 900

Austin, TX 78701

512-744-4308

512-744-4334 fax

———————————————————————-

From: os@stratfor.com [mailto:os@stratfor.com]
Sent: Friday, May 11, 2007 2:38 PM
To: analysts@stratfor.com
Subject: [OS] GERMANY – computer to reassemble 45 million shredded Stasi
files
New Computer Program to Reassemble Shredded Stasi Files
Millions of files consigned to paper shredders in the late days of the
East German regime will be pieced together by computer. The massive job
of reassembling this puzzle from the late Cold War was performed, until
now, by hand.

It’s been years in the making, but finally software designed to
electronically piece together some 45 million shredded documents from
the East German secret police went into service in Berlin on Wednesday.
Now, a puzzle that would take 30 diligent Germans 600 to 800 years to
finish by hand, according to one estimate, might be solved by computer
in seven.

Photo Gallery: Reconstructing the Cold War
Click on a picture to launch the image gallery (4 Photos)

“It’s very exciting to decode Stasi papers,” said Jan Schneider, head
engineer on the project at the Fraunhofer Institute for Production
Systems and Design Technology located in the German capital. “You have
the feeling you are making history.”

Or at least putting it back together again. In 1989, with the looming
collapse of the Communist regime becoming increasingly evident, agents
of the East German Staatssicherheitsdienst or Stasi feverishly plowed
millions of active files through paper shredders, or just tore them up
by hand.

Rights activists interrupted the project and rescued a total of 16,250
garbage bags full of scraps. But rescuing the history on those sheets of
paper amounted to an absurdly difficult jigsaw puzzle. By 2000, no more
than 323 sacks were legible again — reconstructed by a team of 15
people working in Nuremburg — leaving 15,927 to go. So the German
government promised money to any group that could plausibly deal with
the remaining tons of paper.

The Fraunhofer Institute won the contract in 2003, and began a pilot
phase of the project on Wednesday. Four hundred sacks of scraps will be
scanned, front and back, and newly-refined software will try to arrange
the digitized fragments according to shape, texture, ink color,
handwriting style and recognizable official stamps.

NEWSLETTER
Sign up for Spiegel Online’s daily newsletter and get the best of Der
Spiegel’s and Spiegel Online’s international coverage in your In- Box
everyday.

Gu:nter Bormann, from the agency that oversees old Stasi documents (the
Federal Commission for the Records of the national Security Service of
the Former German Democratic Republic), says most of the paper probably
dates from the years 1988 and 1989. “This is what Stasi officers had on
their desks at the end,” he says. “It’s not material from dusty
archives.”

Still-unknown Stasi informants — ordinary East Germans who spied on
other East Germans — stand to be uncovered. International espionage
files are reportedly not among the thousands of sacks; most of those
having been more conclusively destroyed.

The Fraunhofer Institute’s computers will start with documents torn by
hand, because large irregular fragments lend themselves to shape
recognition more readily than uniform strips from shredding machines.
The institute received a promise of EUR6.3 million ($8.53 million) in
April from the German parliament for this phase, which is expected to
take about two years.

If it’s deemed successful, the rest of the job would take four to five
years, according to project chief Bertram Nickolay. The final cost will
be up to EUR30 million.

msm/ap

Investigative Partnership organised by WikiLeaks – the Data was obtained by WikiLeaks.

TOP-SECRET – Former STASI Cryptographers Now Develop Technology for NATO]

Investigative Partnership organised by WikiLeaks – the Data was obtained by WikiLeaks.

[Eurasia] [Fwd: Re: Former Stasi Cryptographers Now Develop Technology for NATO]

Date 2010-09-27 20:24:23
From lena.bell@stratfor.com
To eurasia@stratfor.com
Others Listname: mailto:eurasia@stratfor.com
MessageId: <4CA0E157.50106@stratfor.com>
InReplyTo: 263969146.2106108.1285610199486.JavaMail.root@core.stratfor.com
Text
——– Original Message ——–Subject: Re: Former Stasi Cryptographers Now Develop Technology for
NATO
Date: Mon, 27 Sep 2010 13:21:39 -0500
From: Marko Papic <marko.papic@stratfor.com>
To: Lena Bell <lena.bell@stratfor.com>
References: <4CA0DEFD.2020800@stratfor.com>Feel free to send these to eurasia@stratfor.comVery interesting articles. I’m a big fan of Spiegel.Lena Bell wrote:thpught you’d find this interesting Marko

Former Stasi Cryptographers Now Develop Technology for NATO

http://www.spiegel.de/international/germany/0,1518,719726,00.html

09/27/2010

After the fall of the Berlin Wall, the West Germans were desperate to
prevent the Stasi’s top codebreakers from falling into the wrong hands
and set up a company to hire the East German cryptographers. Now the
former Stasi scientists develop technology used by Angela Merkel and
NATO.

Every morning, while going to his office in Berlin’s Adlershof district,
Ralph W. passes a reminder of his own past, a small museum that occupies
a room on the ground floor of the building. The museum could easily
double as a command center run by the class enemy in an old James Bond
film. A display of coding devices from various decades includes the
T-310, a green metal machine roughly the size of a huge refrigerator,
which East German officials used to encode their telex messages.

The device was the pride of the Stasi, the feared East German secret
police, which was W.’s former employer. Today he works as a cryptologist
with Rohde & Schwarz SIT GmbH (SIT), a subsidiary of Rohde & Schwarz, a
Munich-based company specializing in testing equipment, broadcasting and
secure communications. W. and his colleagues encode sensitive
information to ensure that it can only be read or heard by authorized
individuals. Their most important customers are NATO and the German
government.

Rohde & Schwarz is something of an unofficial supplier of choice to the
German government. Among other things, the company develops bugproof
mobile phones for official use. Since 2004, its Berlin-based subsidiary
SIT, which specializes in encryption solutions, has been classified as a
“security partner” to the German Interior Ministry, which recently
ordered a few thousand encoding devices for mobile phones, at about
EUR1,250 ($1,675) apiece. Even German Chancellor Angela Merkel has used
phones equipped with SIT’s encryption technology. In other words, the
Stasi’s former cryptographers are now Merkel’s cryptographers.

Secret Operation

The transfer of Ralph W. and other cryptologists from the East German
Ministry for State Security, as the Stasi was officially known, to West
Germany was handled both seamlessly and discreetly. West German
officials were determined to make sure that no one would find out about
the integration of East Germany’s top cryptologists into the west. The
operation was so secret, in fact, that it has remained unknown to this
day.

Only a handful of officials were involved in the operation, which was
planned at the West German Interior Ministry in Bonn. In January 1991,
Rohde & Schwarz SIT GmbH was founded. The company was established
primarily to provide employment for particularly talented Stasi
cryptologists that the Bonn government wanted to keep in key positions.

Ralph W. is one of those specialists. W., who holds a doctorate in
mathematics, signed a declaration of commitment to the Stasi on Sept. 1,
1982. By the end of his time with the Stasi, he was making 22,550 East
German marks a year — an excellent salary by East German standards. And
when he was promoted to the rank of captain in June 1987, his superior
characterized W. as one of the “most capable comrades in the
collective.” While with the Stasi, W. worked in Department XI, which
also boasted the name “Central Cryptology Agency” (ZCO).

Looking for the Top Performers

The story begins during the heady days of the East German revolution in
1990. Officially, the East German government, under its last communist
premier, Hans Modrow, had established a government committee to dissolve
the Ministry for State Security which reported to the new East German
interior minister, Peter-Michael Diestel. In reality, the West German
government was already playing a key role in particularly sensitive
matters. Then-West German Interior Minister Wolfgang Scha:uble (who is
the current German finance minister) had instructed two senior Interior
Ministry officials, Hans Neusel and Eckart Werthebach, to take care of
the most politically sensitive remnants of the 40-year intelligence war
between the two Germanys.

The government of then-Chancellor Helmut Kohl was interested in more
than just the politically explosive material contained in some of the
Stasi’s files. It also had its eye on the top performers in the former
East German spy agency. The cryptologists were of particular interest to
the Kohl government, which recognized that experts capable of developing
good codes would also be adept at breaking them. The Stasi cryptologists
were proven experts in both fields.

Documents from the Stasi records department indicate that the one of the
Stasi cryptologists’ achievements was to break Vericrypt and Cryptophon
standards that had been used until the 1980s. This meant that they were
capable of decoding encrypted radio transmissions by the two main West
German intelligence agencies — the Office for the Protection of the
Constitution and the Federal Intelligence Service (BND) — and the West
German border police. The East Germans even managed to decode the BND’s
orders to members of the clandestine “Gladio” group, which was intended
to continue anti-communist operations in the event of a Warsaw Pact
invasion of Western Europe.

The West German government was determined to prevent these highly
trained East German experts from entering the free market. The idea that
specialists who had spent decades working with West German encryption
methods and had successfully cracked West German intelligence’s codes
could defect to Middle Eastern countries like Syria was a nightmare.
Until then, the BND had had no difficulties listening in on intelligence
communications in the Middle East, an ability the potential defection of
Stasi experts would likely have compromised. Bonn also hoped to use
their skills to break into regions where its own agents were making no
headway. All of this meant that the Stasi experts had to be brought on
board in the West — even if it involved unconventional methods.

: Cherrypicking the Stasi’s Top Brains

The government officials in Bonn turned to an expert for advice: Otto
Leiberich, a cryptologist and mathematician who had headed the Central
Office for Cryptology, the equivalent of the Stasi’s ZCO at the West
German BND, until the mid-1970s. Leiberich’s task, after he was brought
in as a member of the secret operation, was to evaluate the professional
abilities of the Stasi experts.

Leiberich still has vivid memories of his first official trip to the
town of Hoppegarten, next to Berlin. One of the East German
cryptologists at the meeting greeted the members of the West German
delegation as “comrades,” Leiberich recalls. He was impressed by the
East Germans’ expertise, says Leiberich. “They were excellent
mathematicians who were not personally guilty of any misconduct.”

Leiberich says he would have liked to hire them, particularly the
Stasi’s then “chief decoder,” the ZCO department head, Horst M. A gaunt
chain-smoker who wore horn-rimmed glasses, M. was born in 1937 and had
earned a degree in mathematics at East Berlin’s Humboldt University. But
the West was also interested in younger people, in the expectation that
they would be of greater value in the nascent computer age.

A Free-Market Solution

Leiberich could have used the extra manpower, especially after 1990,
when the West German Central Office for Cryptology was spun off from the
BND and a law was enacted to form the new Federal Office for Information
Security (BSI). Leiberich, who was named the BSI’s first president,
headed a team consisting mainly of former intelligence colleagues.

But Neusel, the senior official from the West German Interior Ministry,
dismissed the idea as too precarious. Firstly, the government had
decided not to integrate former Stasi officials, because of their past
activities, into the bureaucracy of a unified Germany. Additionally, as
one person involved in the operation recalls, concerns about potential
traitors gave rise to a “sacred principle,” namely that “no one from the
Stasi was to be transferred to the West German intelligence agencies.”

It also didn’t help that the Stasi’s Central Cryptology Agency had been
hastily spun off into the East German Interior Ministry, because the
West German cabinet had decided not to allow any members of the East
German Interior Ministry to work in federal agencies.

But the free market was not restricted by any government resolutions. A
creative solution was needed, and no one was better suited for coming up
with the necessary fix than Hermann Schwarz, one of the two founders of
Rohde & Schwarz.

A Soft Spot for the East

Founded in 1933, the company, a provider of radio, measuring and
security technology, was dependent on government contracts and was a
reliable supplier to the West German intelligence agencies. Besides,
Schwarz had a soft spot for the East. He had earned his doctorate in
1931 in the eastern city of Jena, where he had also met his eventual
business partner, Lothar Rohde.

But to Schwarz, who was already elderly at the time and has since died,
allowing his company’s name to be used as a cover for a Stasi connection
seemed too risky. According to someone familiar with the operation, the
West Germans must have applied a bit of soft pressure on Schwarz, who
was “extremely worried that it would be made public one day.”

But the officials eventually did manage to convince Schwarz to play
along. His change of heart was probably due in part to the prospect of
additional research and federal contracts, which were in fact showered
on his company.

In the end, BSI head Leiberich and a senior Interior Ministry official
decided which former Stasi experts were to be transferred to the front
company. Former Stasi department head Horst M. was seamlessly integrated
into the market economy at SIT, where his wife also began working as a
secretary. Ralph W., who was in his 30s at the time and had been with
the Stasi for eight years, also fitted the desired profile, as did his
colleagues Wolfgang K. and Volker S. In total, about a dozen former
Stasi employees, most of them mathematicians, were given the chance to
embark on a second cryptology career in post-reunification Germany.

The federal government provided whatever assistance it could, but only
with the utmost discretion. SIT was initially headquartered in the town
of Gru:nheide in the eastern state of Brandenburg, in a former Stasi
children’s home.

‘Cosmic Top Secret’

An episode from the 1990s shows how conspiratorially the operation was
handled, even within the West German intelligence community. When the
BND needed a “D-channel filter” — a precursor to today’s firewalls —
to protect communications networks, it contacted the Federal Office for
Information Security (BSI). But BND officials pricked up their ears when
they discovered that the work was being done by SIT. A private company
protecting the computers of Germany’s foreign intelligence agency?
Nevertheless, the BND officials were told that it was “totally OK,” and
that the BSI would take responsibility for SIT.

For the parent company Rohde & Schwarz, the former problem child in
Brandenburg soon became a success story. SIT took over the cryptology
division of German engineering giant Siemens, and the company now
employs about 150 mathematicians, engineers and computer scientists at
its three locations. SIT, which proudly refers to itself as the
“preferred supplier of high-security cryptography” for NATO, even
includes in its product line devices classified as “Cosmic Top Secret,”
NATO’s highest secrecy level. SIT’s Elcrodat solution, standard
equipment on NATO submarines, frigates and military helicopters, has
provided the company with orders worth millions for years.

When approached by SPIEGEL, Rohde & Schwarz declined to comment on this
previously unknown part of its company history.

To show its gratitude for the company’s efforts, the federal government
did more than just provide it with lucrative contracts. Eckart
Werthebach, the Interior Ministry official, awarded the former managing
director of SIT, a senior Rohde & Schwarz executive originally from West
Germany, the Order of Merit of the Federal Republic of Germany for his
services. The executive received the decoration in a formal ceremony at
Villa Hammerschmidt in Bonn, the former official residence of the German
president.

– – – – – – – – – – – – – – – – –

Marko Papic

Geopol Analyst – Eurasia

STRATFOR

700 Lavaca Street – 900

Austin, Texas

78701 USA

P: + 1-512-744-4094

marko.papic@stratfor.com