Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "WIkileaks" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Paul Merrell

WikiLeaks to publish more Hillary Clinton emails - Julian Assange | Media | The Guardian - 0 views

  • Julian Assange, the founder of WikiLeaks, has said his organisation is preparing to publish more emails Hillary Clinton sent and received while US secretary of state. Clinton, the presumptive Democratic presidential nominee, is under FBI investigation to determine whether she broke federal law by using her private email in sending classified information. A new WikiLeaks release of Clinton emails is likely to fan a controversy that has bedevilled her campaign and provide further ammunition for Donald Trump, her Republican presidential rival, who has used the issue to attack her. Assange’s comments came in an interview on ITV’s Peston on Sunday. “We have upcoming leaks in relation to Hillary Clinton … We have emails pending publication, that is correct,” Assange said.He did not specify when or how many emails would be published. WikiLeaks launched a searchable archive in March of 30,322 emails and email attachments sent to and from Clinton’s private email server while she was secretary of state. The 50,547 pages of documents are from 30 June 2010 to 12 August 2014, and 7,570 of the documents were sent by Clinton, who served as secretary of state from 2009 to 2013. Assange, a trenchant Clinton critic, said she was receiving constant personal updates on his situation.
  • Assange said it was highly unlikely that the US attorney general, Loretta Lynch, would indict Clinton. “She’s not going to indict Hillary Clinton, that’s not possible. It’s not going to happen. But the FBI can push for concessions from a Clinton government,” he said.
  • His attacks on Clinton may be dismissed as highly partial, but the email controversy continues to dog her. An internal report last month found she had broken several government rules by using a private server rather than more secure official communication systems. The 78-page investigation by the inspector general of the state department singled out several previously unknown breaches while Clinton was secretary of state, including the use of mobile devices to conduct official business without checking whether they posed a security risk.
Paul Merrell

Turkish WikiLeaks Cache Links AKP and Libya's Al-Qaeda Chief Belhaj - nsnbc international | nsnbc international - 0 views

  • WikiLeaks released about 300,000 e-mails styled to Turkey’s ruling AKP. While no link to the “failed” military coup on July 15 was discovered, the cache contains mails suggesting that Libyan Al-Qaeda leader AbdelHakim Belhaj reached out to acquire help with laundering and investing funds stolen from the ousted Libyan government in 2011. The former “victim of US rendition” later hobnobbed with celebrities like U.S. Senator John McCain.
  • WikiLeaks released a cache with 294,548 emails on Tuesday. All of the emails which were released were attributed to Turkey’s AKP at akparti.org.tr, which is the primary domain of Turkey’s ruling party. The mails cover a period from 2010 up until July 6, 2016. That is, a few days before the “failed” military coup on July 15. An initial search has not resulted in the discovery of mails that would suggest foreknowledge about the coup and it is not sure that it will. After all, who would post mails about such a highly sensitive issue over a relatively unsecured party server, or over the internet in general. Although, after the FBI concluded that former U.S. Secretary of State Hillary Clinton sent and received mails on issues that were classified Top Secret / Compartmentalized via a personal e-mail server, one would not be surprised if there were mails about the upcoming coup in the cache. Time will show. A brief search for “buzz words” that reflect Turkey’s role in the so-called Arab Spring and the wars in and against Libya and Syria, however, gave an immediate “bonus” result.
  • One of the mails styled to a AKP member via the party server appears to have been sent from AbdelHakim Belhaj. Belhaj was up until the overthrow of the Libyan government in 2011 the chief of the Libyan Al-Qaeda franchise the Libyan Islamic Fighting Group (LIFG). After the overthrow of the Libyan government, Belhaj (Belhadj) would become the chief of the Tripoli Military Council and hobnob with celebrities like U.S. Secretary of State Hillary Clinton and US. Senator John McCain. Not bad, for someone who previously has been through the treadmill of the United States’ illegal extraordinary rendition program. Belhadj is today one of the most controversial figures in Libyan politics and, according to many, one of the main stumbling blocks on a road to peace and reconciliation. It is noteworthy that Abdelhakim Belhaj (Belhadj) and his second in command in the LIFG, Mahdi Al-Harati, have been linked to the British intelligence service MI6. Al-Harati would after 2011 move on to Syria. In 2012 al-Harati led two major campaigns of the so-called Libyan Brigade against the Syrian Arab Army from Jordan. Both campaigns failed at ousting the Syrian government, but increased the chaos in the country.
  • ...1 more annotation...
  • The defeat of the about 20,000 strong Libyan Brigade and other, predominantly Muslim Brotherhood linked “rebels” in 2012 would lead to the influx of Salafi / Wahhabi fighters in 2013, as outlined in a detailed report entitled “Tentative Jihad” published by the International Crisis Group. Ironically, McCain would later appear on a photo, taken in a safe house in Idlib, Syria, meeting with Ilamic State leader al-Baghdai (a.k.a. al-Bhadri or Caliph Ibrahim). Links between the AKP and the LIFG have been alleged since 2011. The email discovered in the WikiLeaks cache, however, may be the first that substantiates a direct link between a member of the AKP and Belhaj. Because Turkey has blocked access to WikiLeaks, and because the website allegedly has been subject to a sustained cyber attack, we will re-publish the email in its entirety here:
Gary Edwards

Arnold Ahlert: Russia Would Love a Third Obama Term - The Patriot Post - 0 views

  • New York Post columnist John Crudele obliterates the despicable word-parsing. “Clinton was so careless when using her BlackBerry that the Russians stole her password,” he writes. “All Russian President Vladimir Putin’s gang had to do was log into Clinton’s account and read whatever they wanted.” When it comes to the DNC hack, “The Russians did it” is the theme-du-jour. Clinton campaign manager, Robby Mook stated Sunday that “experts are telling us that Russian state actors broke into the DNC, stole these emails, [and are] releasing these emails for the purpose of helping Donald Trump.” The campaign itself echoed that assertion. “This is further evidence the Russian government is trying to influence the outcome of the election.”
  • The reliably leftist Politico — so far left that reporter Ken Vogel remains employed there despite sending a story to the DNC before he sent it to his own editor — is quite comfortable advancing that agenda, using it as a vehicle to buff up Clinton’s tenure as secretary of state. “Former U.S. officials who worked on Russia policy with Clinton say that Putin was personally stung by Clinton’s December 2011 condemnation of Russia’s parliamentary elections, and had his anger communicated directly to President Barack Obama,” Politico reports. “They say Putin and his advisers are also keenly aware that, even as she executed Obama’s ‘reset’ policy with Russia, Clinton took a harder line toward Moscow than others in the administration. And they say Putin sees Clinton as a forceful proponent of ‘regime change’ policies that the Russian leader considers a grave threat to his own survival.” Yet even Politico is forced to admit the payback angle is “speculation,” and that some experts remain “unconvinced that Putin’s government engineered the DNC email hack or that it was meant to influence the election in Trump’s favor as opposed to embarrassing DNC officials for any number of reasons.”
  • Americans would also be wise to remain highly skeptical of this claim for any number of reasons. WikiLeaks founder Julian Assange asserts there is “there is no proof whatsoever” Russia is behind the hack and that “this is a diversion that’s being pushed by the Hillary Clinton campaign.” To be fair, Assange is a Russian sympathizer, and leftists aren’t the only ones attributing the hack to the Russians. The same FBI that gave Clinton a pass will be investigating the DNC hack, and at some point the bureau will reach a conclusion. In the meantime, it might be worth considering that this smacks of a carefully orchestrated disinformation campaign similar to the one Clinton and several other Obama administration officials engineered with regard to Benghazi. While Clinton was never held personally or legally accountable for the deaths of four Americans, it is beyond dispute that she lied unabashedly about a video causing the attack, while sending her daughter a damning email at 11:12 p.m. on Sept. 11, 2012, admitting the administration knew “the attack had nothing to do with the film. It was a planned attack, not a protest.” The theme of this coordinated narrative? Clinton campaign chair John Podesta referred Monday night to “a kind of bromance going on” between Putin and Trump. Clinton campaign manager Robby Mook echoed that assertion, insisting the email dump comes on the heels of “changes to the Republican platform to make it more pro-Russian.”
  • ...3 more annotations...
  • The Leftmedia were equally obliging. “The theory that Moscow orchestrated the leaks to help Trump … is fast gaining currency within the Obama administration because of the timing of the leaks and Trump’s own connections to the Russian government,” reports the Daily Beast. Other Leftmedia examples abound. “Until Friday, that charge, with its eerie suggestion of a Kremlin conspiracy to aid Donald J. Trump, has been only whispered,” shouted the New York Times. “Because the leaks are widely suspected of being the result of a Russian hacking operation, they can be used to reinforce the narrative that Russian President Vladimir Putin is rooting for Trump and that Trump, in turn, would be too accommodating to Moscow,” adds the Los Angeles Times. “Why would Russian President Vladimir Putin want to help Donald Trump win the White House?” asks NPR. “If you want to indulge in a bit of conspiracy theory, remember that Russian President Vladimir Putin has praised candidate Trump as recently as June,” states the Burlington Free Press.
  • Ultimately, here’s the question: If the Russians could access the DNC server, they could certainly access Clinton’s unsecure server. And if they could access Clinton’s server, including the 33,000 emails she deleted (maybe some were about how the Clintons profited from selling American uranium to Russia), ask yourself who they’d rather have in the Oval Office: Donald Trump, who professed admiration for Putin but remains a highly unpredictable individual — or Hillary Clinton, who could be subjected to blackmail for as long as eight years? Russia’s clear objective would be to have the weakest American leadership they can get. Blackmail aside, what would be weaker than an extension of Obama’s presidency?
  • Moreover, it is just as likely a number of the so-called “experts” as well as Clinton’s useful idiot media apparatchiks have considered the blackmail possibility and are trying to divert attention from it with a phony Trump connection story. Democrats can theorize, complain and blame to their hearts' content, but none of it obscures the reality that the DNC — and by extension Hillary Clinton and the entire Democrat Party — are a conglomeration of morally bereft, utterly incompetent individuals wholly ill-equipped to handle internal security, much less national security. And they are aided and abetted by an equally corrupt media, more than willing to abide that potentially catastrophic reality as long as it gets a Democrat in the Oval Office. WikiLeaks has promised additional dumps with be forthcoming. How much deeper Democrats sink is anyone’s guess.
  •  
    "If one lives by the vulnerable server, one dies by the vulnerable server. As the week unfolds, America is witnessing the ultimate unmasking of the Democrat Party, an entity whose self-aggrandizing claims of unity, fairness and intellectual honesty have been revealed as utterly fraudulent by a flood of DNC emails released by WikiLeaks. Moreover, a stunning level of hypocrisy attends the entire exposure, as DNC Chairwoman Debbie Wasserman Schultz is sent packing for this breach of confidential party information, while Hillary Clinton, whose equally accessible private server contained far more critical top-secret information, officially became the party's standard-bearer. But not to worry, assured FBI Director James Comey, who insisted there was no direct evidence that Clinton's server had been hacked by hostile actors - before adding it was possible that hostile actors "gained access" to Clinton's accounts. Clinton was equally adept at making semantical distinctions. "If you go by the evidence, there is no evidence that the system was breached or hacked successfully," Clinton said. "And I think that what's important here is follow the evidence. And there is no evidence. And that can't be said about a lot of other systems, including government systems.""
Paul Merrell

Wikileaks Releases "NightSkies 1.2": Proof CIA Bugs "Factory Fresh" iPhones | Zero Hedge - 0 views

  • The latest leaks from WikiLeaks' Vault 7 is titled “Dark Matter” and claims that the CIA has been bugging “factory fresh” iPhones since at least 2008 through suppliers.
  • And here is the full press release from WikiLeaks: Today, March 23rd 2017, WikiLeaks releases Vault 7 "Dark Matter", which contains documentation for several CIA projects that infect Apple Mac Computer firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA's Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain 'persistence' on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware.   Among others, these documents reveal the "Sonic Screwdriver" project which, as explained by the CIA, is a "mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting" allowing an attacker to boot its attack software for example from a USB stick "even when a firmware password is enabled". The CIA's "Sonic Screwdriver" infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.   "DarkSeaSkies" is "an implant that persists in the EFI firmware of an Apple MacBook Air computer" and consists of "DarkMatter", "SeaPea" and "NightSkies", respectively EFI, kernel-space and user-space implants.   Documents on the "Triton" MacOSX malware, its infector "Dark Mallet" and its EFI-persistent version "DerStake" are also included in this release. While the DerStake1.4 manual released today dates to 2013, other Vault 7 documents show that as of 2016 the CIA continues to rely on and update these systems and is working on the production of DerStarke2.0.   Also included in this release is the manual for the CIA's "NightSkies 1.2" a "beacon/loader/implant tool" for the Apple iPhone. Noteworthy is that NightSkies had reached 1.2 by 2008, and is expressly designed to be physically installed onto factory fresh iPhones. i.e the CIA has been infecting the iPhone supply chain of its targets since at least 2008.   While CIA assets are sometimes used to physically infect systems in the custody of a target it is likely that many CIA physical access attacks have infected the targeted organization's supply chain including by interdicting mail orders and other shipments (opening, infecting, and resending) leaving the United States or otherwise.
Paul Merrell

Obama calls Japanese leader to express regret for WikiLeaks spying scandal | US news | The Guardian - 0 views

  • Barack Obama has called Japan’s leader to express regret over recent WikiLeaks allegations that the US had spied on senior Japanese officials. Obama told prime minister Shinzo Abe that he thought the trouble the revelations caused Abe and his government was regrettable, a Japanese government spokesman told reporters. The 40-minute call took place Wednesday morning Japan time. Japanese officials faced questioning from the media and in parliament after WikiLeaks posted online what appeared to be five US National Security Agency reports on Japanese positions on international trade and climate change. They date from 2007 to 2009. WikiLeaks also posted what it says was an NSA list of 35 Japanese targets for telephone intercepts.
Paul Merrell

NSA tapped German Chancellery for decades, WikiLeaks claims | US news | The Guardian - 0 views

  • The US National Security Agency tapped phone calls involving German chancellor Angela Merkel and her closest advisers for years and spied on the staff of her predecessors, according to WikiLeaks. A report released by the group on Wednesday suggested NSA spying on Merkel and her staff had gone on far longer and more widely than previously realised. WikiLeaks said the NSA targeted 125 phone numbers of top German officials for long-term surveillance . The release risks renewing tensions between Germany and the US a month after they sought to put a row over spying behind them, with Barack Obama declaring in Bavaria that the two nations were “inseparable allies”. WikiLeaks published what it said were three NSA intercepts of Merkel’s conversations, and data it said listed telephone numbers for the chancellor, her aides, her office and even her fax machine. “The names associated with some of the targets indicate that spying on the Chancellery predates Angela Merkel as it includes staff of former Chancellor Gerhard Schroeder (in office 1998-2002), and his predecessor Helmut Kohl,” WikiLeaks added in a statement.
Paul Merrell

Argentina Prosecutor Who Accused Kirchner Had Steady Contact With US Embassy, Leaked Cables Show | VICE News - 0 views

  • Alberto Nisman, the prosecutor who accused Argentina's president of a cover-up plot over the 1994 bombing of a Jewish center before being found shot to death, met repeatedly with the US embassy in Buenos Aires during his investigation, leaked diplomatic cables show.Nisman gave US officials advanced notice on his procedural moves and was apparently coached by the embassy in "improving" his requests for arrest warrants for Iranians that Nisman suspected of carrying out the deadly attack against the Argentine Israeli Mutual Association, or AIMA, according to cables published by Wikileaks."Embassy can now more logically approach the [government of Argentina] about [its] anticipated next steps and ways we might be able to coordinate outreach to other governments [...] to bring attention to the warrants and pressure to bear on Iran and Hezbollah," says one US cable dated November 1, 2006, after a meeting with Nisman.The revelations are adding fodder to the entangled scandal over the AIMA center bombing, Nisman's mysterious death, and the reactions of President Cristina Fernandez de Kirchner and her government loyalists.The president and her supporters have piled doubt on Nisman's investigation, suggesting he didn't himself write the inquiry accusing Kirchner of a cover-up deal with Iran, and that he was influenced by foreign agents in his claims. Kirchner said this week that Nisman was manipulated and double-crossed by government spies plotting against her.
  • Nisman on January 16 told VICE News he had proof that Kirchner sought a back-channel deal with Iran — swapping Iranian oil for Argentine grain — in exchange for abandoning efforts to prosecute former Iranian diplomats in connection to the Jewish center bombing.Eight-five people were killed in the terror attack, which remains unsolved. Survivors and opposition forces are now blaming Kirchner's government for Nisman's death.
  • The prosecutor, who was found dead the night before making his blockbuster claim against Kirchner and her foreign minister in Argentina's Congress, is mentioned in 46 leaked US cables.In the cable from November 2006, Nisman informed US officials of the likelihood that a judge would follow his recommendations to seek charges against Iranian suspects for the bombing. American embassy officials discussed plans to inform "other governments" ahead of time, in an apparent push to make the case against the Iranians an international matter.Another cable, dated January 19, 2007, suggests the US embassy had a hand in shaping Nisman's warrant requests with Interpol, the international diplomatic police force. The cable shows US officials thought Nisman's work was shoddy and needed help.Before the Justice Department's Office of International Affairs intervened in the warrant applications, the cable says, Nisman's paperwork contained "statements that were presumptuous conclusions of guilt."Nisman took on the case of the AIMA center bombing in 2004, at the request of the then-President Nestor Kirchner, Cristina Fernandez's late husband. In his interview with VICE News — perhaps his last with a foreign news organization — Nisman denied connections with any foreign spy agencies.
  • ...4 more annotations...
  • "You won't find reports from the CIA, Mossad, or the MI5 in my files. I have no doubt that there is a link between them and the Argentine intelligence agency, but I never dealt with any foreign intelligence agencies," Nisman said, two days before he was found dead.The US embassy in Buenos Aires declined to discuss its officers' interactions with Nisman. "We will not comment on the contents of these alleged cables that purport to include classified information," an embassy spokesman told VICE News.
  • The relationship was apparently so involved that Nisman apologized for not letting then-ambassador Earl Anthony Wayne know that he would call for the arrest of former president Carlos Menem in relation to the case."AMIA Special Prosecutor Alberto Nisman called the Ambassador on May 23 to apologize for not giving the Embassy advance notice of his request for the arrest of former President Menem and other [government of Argentina] officials for their alleged roles in the cover up of the 'local connection' in the 1994 terrorist bombing of the AMIA Jewish community center," says a cable from May 2008.The prosecutor also apologized that the judicial order coincided with a visit to Argentina from the former deputy director of the FBI, John Pistole, adding it was "completely unintentional," the cable shows."He noted that he was very sorry and that he sincerely appreciates all of the [US government's] help and support and in no way meant to undermine that," the cable continues.
  • The cable also notes that US officials "have for the past two years recommended to Nisman that he focus on the perpetrators of the terrorist attack and not on the possible mishandling of the first investigation."Santiago O'Donnell, author of two books based on the cables released by Julian Assange, said in an interview that the leaked cables show the US influenced Nisman throughout his work on the AIMA bombing investigation."The embassy gave instructions to the prosecutor Nisman for him to follow the Iranian lead, and not follow other leads, like the Syrian lead, or the local connection, because that would detract from the terrorist image that the US was trying to impose on Iran," O'Donnell said.President Kirchner this week proposed in a nationally televised address to disband and reform the government's intelligence agency. In doing so, she said rogue government spies were responsible for Nisman's death. Opposition voices, meanwhile, said the reform plan for the Secretaría de Inteligencia, or SI, would further politicize the work of the embattled spy agency and make it more responsive to the president's political whims.
  • Alberto Nisman, the prosecutor who accused Argentina's president of a cover-up plot over the 1994 bombing of a Jewish center before being found shot to death, met repeatedly with the US embassy in Buenos Aires during his investigation, leaked diplomatic cables show.Nisman gave US officials advanced notice on his procedural moves and was apparently coached by the embassy in "improving" his requests for arrest warrants for Iranians that Nisman suspected of carrying out the deadly attack against the Argentine Israeli Mutual Association, or AIMA, according to cables published by Wikileaks."Embassy can now more logically approach the [government of Argentina] about [its] anticipated next steps and ways we might be able to coordinate outreach to other governments [...] to bring attention to the warrants and pressure to bear on Iran and Hezbollah," says one US cable dated November 1, 2006, after a meeting with Nisman.
  •  
    Well this is interesting. The U.S. was covertly working through an Argentinian prosecutor to topple Argentina's head of state. On the plan to reform the Argentine intelligence service, that service's subordination to the CIA was the prototype operation than led to Operation Condor, in which the CIA subverted most intelligence services in Latin America, leading to coups and the deaths and disappearnaces of hundreds of thousands Latin American citizens suspected of being left-leaning. The overthrow of the Allende government in Chile is perhaps the best known in the U.S. 
Paul Merrell

Kim Dotcom: I Knew Seth Rich, He Was The Wikileaks Source - 0 views

  • Last week, Fox News dropped a bombshell report officially confirming, via anonymous FBI sources, what many had suspected for quite some time, that murdered DNC staffer Seth Rich was the WikiLeaks source for leaks which proved that the DNC was intentionally undermining the campaign of Bernie Sanders. In addition to exposing the corruption of the DNC, the leaks cost Debbie Wasserman In addition to exposing the corruption of the DNC, the leaks cost Debbie Wasserman Schultz her job as Chairwoman. Of course, if it’s true that WikiLeaks’ emails came from a DNC insider it would end the “Russian hacking” narrative that has been perpetrated by Democrats and the mainstream media for the past several months.
  • Moreover, it would corroborate the one confirmation that Julian Assange has offered regarding his source, namely that it was “not a state actor.” Meanwhile, the plot thickened a little more over the weekend when Kim Dotcom confirmed via Twitter that he was working with Seth Rich to get leaked emails to WikiLeaks.
  • Meanwhile, Kim Dotcom has promised more information will be released on his interaction with Seth Rich by tomorrow.
  • ...1 more annotation...
  • why is he just now coming forward with such information? Second, while Seth Rich may explain the DNC leaks we still don’t know who is responsible for the “Podesta Files” which we’re certain will continue to be attributed to “Russian hackers.” Which leads to the most important question of all: is this all just another fake news diversion, or is there more to the Seth Rich murder?
Paul Merrell

Assange: Why I Created WikiLeaks' Searchable Database of 30,000 Emails from Clinton's Private Server | Democracy Now! - 0 views

  • In March, WikiLeaks launched a searchable archive for over 30,000 emails & email attachments sent to and from Hillary Clinton’s private email server while she was secretary of state. The 50,000 pages of documents span from June 2010 to August 2014; 7,500 of the documents were sent by Hillary Clinton. The State Department released the emails as a result of a Freedom of Information Act request.
  • JULIAN ASSANGE:
  • So, those Hillary Clinton emails, they connect together with the cables that we have published of Hillary Clinton, creating a rich picture of how Hillary Clinton performs in office, but, more broadly, how the U.S. Department of State operates. So, for example, the disastrous, absolutely disastrous intervention in Libya, the destruction of the Gaddafi government, which led to the occupation of ISIS of large segments of that country, weapons flows going over to Syria, being pushed by Hillary Clinton, into jihadists within Syria, including ISIS, that’s there in those emails. There’s more than 1,700 emails in Hillary Clinton’s collection, that we have released, just about Libya alone.
  •  
    Too rich: Hillary and ISIL emails. The searchable Wikileaks archive of Hillary's emails is at https://Wikileaks.org/clinton-emails/ Punch in "Islamic State" (in quotes) to have some fun.
Paul Merrell

Julian Assange to be questioned inside embassy as Ecuador agrees to set date | Media | The Guardian - 0 views

  • Julian Assange will be questioned by Swedish prosecutors inside the Ecuadorian embassy in London, in a possible breakthrough to end the impasse over his case. The Ecuadorian attorney general delivered a document agreeing to a request by the Swedish prosecutor to question the founder of WikiLeaks. He is wanted for questioning over a rape allegation, which he denies. If he goes to Sweden he believes he will be taken to the US because of the activities of WikiLeaks. Assange has been living inside the embassy for more than four years and has been granted political asylum by Ecuador.
  • He has offered to be questioned inside the embassy but Swedish prosecutors have only recently agreed. A statement issued in Ecuador said: “In the coming weeks a date will be established for the proceedings to be held at the embassy of Ecuador in the United Kingdom.
  • The statement said the proceedings did not affect the recent opinion of the Working Group on Arbitrary Detentions of the United Nations, which found that Assange was being arbitrarily detained. The working group called for Assange to be released and given compensation for violation of his rights. The Ecuador statement added: “Ecuador’s foreign ministry reiterates its commitment to the asylum granted to Julian Assange in August 2012, and reaffirms that the protection afforded by the Ecuadorian state shall continue while the circumstances persist that led to the granting of asylum, namely fears of political persecution.”
  •  
    Assange justifiably fears that if he submits to extradition to Sweden, that nation would in turn hand him over to the U.S. for prosecution under the Espionage Act. It is known that a grand jury handed down indictments in the case involving a leak of massive numbers of State Department cables by Chelsea (formerly Bradley) Manning. Wikileaks received and published those documents. Soon after, a prosecutor in Sweden began a rape investigation, despite both women involved saying that they were not raped. No rape charges have actually been filed. The British courts later granted Sweden's extradition request, despite there being no charges pending, at which point Assange was granted asylum by Ecuador and has been effectively imprisoned in that nation's London embassy ever since.
Paul Merrell

The FBI could have stopped the Stratfor leak at any point - Sue Crabtree - News - World - The Voice of Russia: News, Breaking news, Politics, Economics, Business, Russia, International current events, Expert opinion, podcasts, Video - 0 views

  • The persecution of Jeremy Hammond is largely being ignored by the US mass media but the case of the young man  accused of being involved in the passing of the Stratfor E-Mails to WikiLeaks is full of contradictions and serious reasons to question the motives of the judge and the entire prosecution, including the FBI which, it has been revealed, not only orchestrated the hack through an FBI informant known by the code name "Sabu", but could have stopped the leak of the files anytime had they wanted. The FBI were in fact storing the "Stratfor Files" on their own servers for two weeks before they were released to WikiLeaks. According to Sue Crabtree, a close friend of Jeremy and the mother of the family who took Jeremy in and whose children considered him a brother, the FBI may have been interested in the activities of Stratfor which may explain why they held the material on their servers for so long. Mrs. Crabtree also believes that the FBI was interested in selling the material to WikiLeaks so that charges of espionage could be brought.
  •  
    Way interesting! Seems that Jeremy Hammond was the unwitting sock puppet of the FBI and that the Stratfor files he filched at the FBI's request were even stored on FBI-controlled servers before being turned over to Wikileaks, with the FBI's knowledge. I wish that I could automatically reject such allegations as preposterous, but given the way our government has been behaving lately ... 
Paul Merrell

Saudi Arabia warns against sharing 'faked' cables - Al Jazeera English - 0 views

  • Saudi Arabia has urged its citizens not to distribute "documents that might be faked" in an apparent response to WikiLeaks' publication on Friday of more than 60,000 documents it says are secret Saudi diplomatic communications. The statement, made by the foreign ministry on its Twitter account on Friday, did not directly deny the documents' authenticity, Reuters news agency reported. But on Sunday, foreign ministry spokesperson Osama Naqli warned the country not to "allow enemies of the state to achieve their intentions in regards to exchanging or publishing any documents" and said "many of them had been fabricated in a very obvious manner". Naqli said investigations were under way and that the ministry would prosecute those involved, a statement on the Saudi news agency said.
  • The released documents, which WikiLeaks said were embassy communications, emails between diplomats and reports from other state bodies, include discussions of Saudi Arabia's position regarding regional issues and efforts to influence media.
  • WikiLeaks said the released documents were a batch of more than half a million Saudi documents it has obtained and plans to publish. WikiLeaks did not say where it obtained the documents, but it referred in a press release to Riyadh's statement in May that it had suffered a breach of its computer networks, an attack later claimed by a group calling itself the Yemeni Cyber Army.
Paul Merrell

WikiLeaks statement on the mass recording of Afghan telephone calls by the NSA - 0 views

  • The National Security Agency has been recording and storing nearly all the domestic (and international) phone calls from two or more target countries as of 2013. Both the Washington Post and The Intercept (based in the US and published by eBay chairman Pierre Omidyar) have censored the name of one of the victim states, which the latter publication refers to as country "X". Both the Washington Post and The Intercept stated that they had censored the name of the victim country at the request of the US government. Such censorship strips a nation of its right to self-determination on a matter which affects its whole population. An ongoing crime of mass espionage is being committed against the victim state and its population. By denying an entire population the knowledge of its own victimisation, this act of censorship denies each individual in that country the opportunity to seek an effective remedy, whether in international courts, or elsewhere. Pre-notification to the perpetrating authorities also permits the erasure of evidence which could be used in a successful criminal prosecution, civil claim, or other investigations.
  • We know from previous reporting that the National Security Agency’s mass interception system is a key component in the United States’ drone targeting program. The US drone targeting program has killed thousands of people and hundreds of women and children in Afghanistan, Pakistan, Yemen and Somalia in violation of international law. The censorship of a victim state’s identity directly assists the killing of innocent people. Although, for reasons of source protection we cannot disclose how, WikiLeaks has confirmed that the identity of victim state is Afghanistan. This can also be independently verified through forensic scrutiny of imperfectly applied censorship on related documents released to date and correlations with other NSA programs (see http://freesnowden.is). We do not believe it is the place of media to "aid and abet" a state in escaping detection and prosecution for a serious crime against a population. Consequently WikiLeaks cannot be complicit in the censorship of victim state X. The country in question is Afghanistan.
Paul Merrell

In the Democratic Echo Chamber, Inconvenient Truths Are Recast as Putin Plots - 0 views

  • Donald Trump, for reasons I’ve repeatedly pointed out, is an extremist, despicable, and dangerous candidate, and his almost-certain humiliating defeat is less than a month away. So I realize there is little appetite in certain circles for critiques of any of the tawdry and sometimes fraudulent journalistic claims and tactics being deployed to further that goal. In the face of an abusive, misogynistic, bigoted, scary, lawless authoritarian, what’s a little journalistic fraud or constant fearmongering about subversive Kremlin agents between friends if it helps to stop him? But come January, Democrats will continue to be the dominant political faction in the U.S. — more so than ever — and the tactics they are now embracing will endure past the election, making them worthy of scrutiny. Those tactics now most prominently include dismissing away any facts or documents that reflect negatively on their leaders as fake, and strongly insinuating that anyone who questions or opposes those leaders is a stooge or agent of the Kremlin, tasked with a subversive and dangerously un-American mission on behalf of hostile actors in Moscow. To see how extreme and damaging this behavior has become, let’s just quickly examine two utterly false claims that Democrats over the past four days — led by party-loyal journalists — have disseminated and induced thousands of people, if not more, to believe. On Friday, WikiLeaks published its first installment of emails obtained from the account of Clinton campaign chair John Podesta. Despite WikiLeaks’ perfect, long-standing record of only publishing authentic documents, MSNBC’s favorite ex-intelligence official, Malcolm Nance, within hours of the archive’s release, posted a tweet claiming — with zero evidence and without citation to a single document in the WikiLeaks archive — that it was compromised with fakes:
  • As you can see, more than 4,000 people have re-tweeted this “Official Warning.” That includes not only random Clinton fans but also high-profile Clinton-supporting journalists, who by spreading it around gave this claim their stamp of approval, intentionally leading huge numbers of people to assume the WikiLeaks archive must be full of fakes, and its contents should therefore simply be ignored. Clinton’s campaign officials spent the day fueling these insinuations, strongly implying that the documents were unreliable and should thus be ignored. Poof: Just like that, unpleasant facts about Hillary Clinton disappeared, like a fairy protecting frightened children by waving her magic wand and sprinkling her dust over a demon, causing it to scatter away. Except the only fraud here was Nance’s claim, not any of the documents published by WikiLeaks. Those were all real. Indeed, at Sunday night’s debate, when asked directly about the excerpts of her Wall Street speeches found in the release, Clinton herself confirmed their authenticity. And news outlets such as the New York Times and AP reported — and continue to report — on their contents without any caveat that they may be frauds. No real print journalists or actual newsrooms (as opposed to campaign operatives masquerading as journalists) fell for this scam, so this tactic did not prevent reporting from being done.
  •  
    Glenn Greenwald chastises Dems for claiming leaked Clintone emails are forgeries.
Paul Merrell

As Democrats Gather, a Russian Subplot Raises Intrigue - The New York Times - 0 views

  • An unusual question is capturing the attention of cyberspecialists, Russia experts and Democratic Party leaders in Philadelphia: Is Vladimir V. Putin trying to meddle in the American presidential election?Until Friday, that charge, with its eerie suggestion of a Kremlin conspiracy to aid Donald J. Trump, has been only whispered.But the release on Friday of some 20,000 stolen emails from the Democratic National Committee’s computer servers, many of them embarrassing to Democratic leaders, has intensified discussion of the role of Russian intelligence agencies in disrupting the 2016 campaign. #conventions-briefing-promo .interactive-graphic { margin-bottom: 0; } .g-briefing-promo a { color: #000; } .g-briefing-promo .g-headline { font: 700 21px/1.1 nyt-cheltenham, georgia, serif; font-style: italic; } .viewport-medium-10 .g-briefing-promo .g-headline { font-size: 24px; line-height: 1.2; } .g-briefing-promo .g-kicker { color: #a81817; } .g-briefing-promo .g-item { font: 400 14px/1.3 nyt-franklin, helvetica, arial, sans-serif; padding: 9px 0 1px 16px; display: block; } .viewport-medium-10 .g-briefing-promo .g-item { font-size: 15px; line-height: 1.2; padding-bottom: 3px; } .g-briefing-promo .g-item:before { content: '•'; display: block; position: absolute; margin-top: 2px; margin-left: -14px; font-size: 11px; }
  • The emails, released first by a supposed hacker and later by WikiLeaks, exposed the degree to which the Democratic apparatus favored Hillary Clinton over her primary rival, Senator Bernie Sanders of Vermont, and triggered the resignation of Debbie Wasserman Schultz, the party chairwoman, on the eve of the convention’s first day.Proving the source of a cyberattack is notoriously difficult. But researchers have concluded that the national committee was breached by two Russian intelligence agencies, which were the same attackers behind previous Russian cyberoperations at the White House, the State Department and the Joint Chiefs of Staff last year. And metadata from the released emails suggests that the documents passed through Russian computers. Though a hacker claimed responsibility for giving the emails to WikiLeaks, the same agencies are the prime suspects. Whether the thefts were ordered by Mr. Putin, or just carried out by apparatchiks who thought they might please him, is anyone’s guess.
  •  
    Yes, talk about anything but the contents of the emails.
Paul Merrell

Press Release - Secret Trade in Services Agreement (TISA) - Financial Services Annex - 0 views

  • Today, WikiLeaks released the secret draft text for the Trade in Services Agreement (TISA) Financial Services Annex, which covers 50 countries and 68.2%1 of world trade in services. The US and the EU are the main proponents of the agreement, and the authors of most joint changes, which also covers cross-border data flow. In a significant anti-transparency manoeuvre by the parties, the draft has been classified to keep it secret not just during the negotiations but for five years after the TISA enters into force. Despite the failures in financial regulation evident during the 2007-2008 Global Financial Crisis and calls for improvement of relevant regulatory structures2, proponents of TISA aim to further deregulate global financial services markets. The draft Financial Services Annex sets rules which would assist the expansion of financial multi-nationals – mainly headquartered in New York, London, Paris and Frankfurt – into other nations by preventing regulatory barriers. The leaked draft also shows that the US is particularly keen on boosting cross-border data flow, which would allow uninhibited exchange of personal and financial data. TISA negotiations are currently taking place outside of the General Agreement on Trade in Services (GATS) and the World Trade Organization (WTO) framework. However, the Agreement is being crafted to be compatible with GATS so that a critical mass of participants will be able to pressure remaining WTO members to sign on in the future. Conspicuously absent from the 50 countries covered by the negotiations are the BRICS countries of Brazil, Russia, India and China. The exclusive nature of TISA will weaken their position in future services negotiations. The draft text comes from the April 2014 negotiation round - the sixth round since the first held in April 2013. The next round of negotiations will take place on 23-27 June in Geneva, Switzerland.
  •  
    "Today, WikiLeaks released the secret draft text for the Trade in Services Agreement (TISA) Financial Services Annex, which covers 50 countries and 68.2%1 of world trade in services. The US and the EU are the main proponents of the agreement, and the authors of most joint changes, which also covers cross-border data flow. In a significant anti-transparency manoeuvre by the parties, the draft has been classified to keep it secret not just during the negotiations but for five years after the TISA enters into force. Despite the failures in financial regulation evident during the 2007-2008 Global Financial Crisis and calls for improvement of relevant regulatory structures2, proponents of TISA aim to further deregulate global financial services markets. The draft Financial Services Annex sets rules which would assist the expansion of financial multi-nationals - mainly headquartered in New York, London, Paris and Frankfurt - into other nations by preventing regulatory barriers. The leaked draft also shows that the US is particularly keen on boosting cross-border data flow, which would allow uninhibited exchange of personal and financial data. TISA negotiations are currently taking place outside of the General Agreement on Trade in Services (GATS) and the World Trade Organization (WTO) framework. However, the Agreement is being crafted to be compatible with GATS so that a critical mass of participants will be able to pressure remaining WTO members to sign on in the future. Conspicuously absent from the 50 countries covered by the negotiations are the BRICS countries of Brazil, Russia, India and China. The exclusive nature of TISA will weaken their position in future services negotiations. The draft text comes from the April 2014 negotiation round - the sixth round since the first held in April 2013. The next round of negotiations will take place on 23-27 June in Geneva, Switzerland."
Paul Merrell

WikiLeaks' Julian Assange warns: Google is not what it seems - 1 views

  • Back in 2011, Julian Assange met up with Eric Schmidt for an interview that he considers the best he’s ever given. That doesn’t change, however, the opinion he now has about Schmidt and the company he represents, Google.In fact, the WikiLeaks leader doesn’t believe in the famous “Don’t Be Evil” mantra that Google has been preaching for years.Assange thinks both Schmidt and Google are at the exact opposite spectrum.“Nobody wants to acknowledge that Google has grown big and bad. But it has. Schmidt’s tenure as CEO saw Google integrate with the shadiest of US power structures as it expanded into a geographically invasive megacorporation. But Google has always been comfortable with this proximity,” Assange writes in an opinion piece for Newsweek.
  • “Long before company founders Larry Page and Sergey Brin hired Schmidt in 2001, their initial research upon which Google was based had been partly funded by the Defense Advanced Research Projects Agency (DARPA). And even as Schmidt’s Google developed an image as the overly friendly giant of global tech, it was building a close relationship with the intelligence community,” Assange continues.Throughout the lengthy article, Assange goes on to explain how the 2011 meeting came to be and talks about the people the Google executive chairman brought along - Lisa Shields, then vice president of the Council on Foreign Relationship, Jared Cohen, who would later become the director of Google Ideas, and Scott Malcomson, the book’s editor, who would later become the speechwriter and principal advisor to Susan Rice.“At this point, the delegation was one part Google, three parts US foreign-policy establishment, but I was still none the wiser.” Assange goes on to explain the work Cohen was doing for the government prior to his appointment at Google and just how Schmidt himself plays a bigger role than previously thought.In fact, he says that his original image of Schmidt, as a politically unambitious Silicon Valley engineer, “a relic of the good old days of computer science graduate culture on the West Coast,” was wrong.
  • However, Assange concedes that that is not the sort of person who attends Bilderberg conferences, who regularly visits the White House, and who delivers speeches at the Davos Economic Forum.He claims that Schmidt’s emergence as Google’s “foreign minister” did not come out of nowhere, but it was “presaged by years of assimilation within US establishment networks of reputation and influence.” Assange makes further accusations that, well before Prism had even been dreamed of, the NSA was already systematically violating the Foreign Intelligence Surveillance Act under its director at the time, Michael Hayden. He states, however, that during the same period, namely around 2003, Google was accepting NSA money to provide the agency with search tools for its rapidly-growing database of information.Assange continues by saying that in 2008, Google helped launch the NGA spy satellite, the GeoEye-1, into space and that the search giant shares the photographs from the satellite with the US military and intelligence communities. Later on, 2010, after the Chinese government was accused of hacking Google, the company entered into a “formal information-sharing” relationship with the NSA, which would allow the NSA’s experts to evaluate the vulnerabilities in Google’s hardware and software.
  • ...1 more annotation...
  • “Around the same time, Google was becoming involved in a program known as the “Enduring Security Framework” (ESF), which entailed the sharing of information between Silicon Valley tech companies and Pentagon-affiliated agencies at network speed.’’Emails obtained in 2014 under Freedom of Information requests show Schmidt and his fellow Googler Sergey Brin corresponding on first-name terms with NSA chief General Keith Alexander about ESF,” Assange writes.Assange seems to have a lot of backing to his statements, providing links left and right, which people can go check on their own.
  •  
    The "opinion piece for Newsweek" is an excerpt from Assange's new book, When Google met Wikileaks.  The chapter is well worth the read. http://www.newsweek.com/assange-google-not-what-it-seems-279447
Paul Merrell

New Leak Of Final TPP Text Confirms Attack On Freedom Of Expression, Public Health - 0 views

  • Offering a first glimpse of the secret 12-nation “trade” deal in its final form—and fodder for its growing ranks of opponents—WikiLeaks on Friday published the final negotiated text for the Trans-Pacific Partnership (TPP)’s Intellectual Property Rights chapter, confirming that the pro-corporate pact would harm freedom of expression by bolstering monopolies while and injure public health by blocking patient access to lifesaving medicines. The document is dated October 5, the same day it was announced in Atlanta, Georgia that the member states to the treaty had reached an accord after more than five years of negotiations. Aside from the WikiLeaks publication, the vast majority of the mammoth deal’s contents are still being withheld from the public—which a WikiLeaks press statement suggests is a strategic move by world leaders to forestall public criticism until after the Canadian election on October 19. Initial analyses suggest that many of the chapter’s more troubling provisions, such as broader patent and data protections that pharmaceutical companies use to delay generic competition, have stayed in place since draft versions were leaked in 2014 and 2015. Moreover, it codifies a crackdown on freedom of speech with rules allowing widespread internet censorship.
Paul Merrell

Drone strikes counterproductive, says secret CIA report - 0 views

  • Drone strikes and other "targeted killings" of terrorist and insurgent leaders favoured by the US and supported by Australia can strengthen extremist groups and be counterproductive, according to a secret CIA report published by WikiLeaks.According to a leaked document by the CIA's Directorate of Intelligence, "high value targeting" (HVT) involving air strikes and special forces operations against insurgent leaders can be effective, but can also havenegative effects including increasing violence and greater popular support for extremist groups.The leaked document is classified secret and "NoForn" (meaning not to be distributed to non-US nationals) and reviews attacks by the United States and other countries engaged in counter-insurgency operations over the past 50 years.The CIA assessment is the first leaked secret intelligence document published by WikiLeaks since 2011. Led by Australian publisher Julian Assange, the anti-secrecy group says the CIA assessment is the first in what will be a new series of leaked documents relating to the US agency.
  • The 2009 CIA study lends support to critics of US drone strikes in Afghanistan, Iraq, Pakistan, Somalia and Yemen by warning that such operations "may increase support for the insurgents, particularly if these strikes enhance insurgent leaders' lore, if non-combatants are killed in the attacks, if legitimate or semi-legitimate politicians aligned with the insurgents are targeted, or if the government is already seen as overly repressive or violent".
  • The CIA study observes that the US-led coalition in Afghanistan made "a sustained effort since 2001 to target Taliban leaders", but "Afghan government corruption and lack of unity, insufficient strength of Afghan and NATO security forces, and the country's endemic lawlessness have constrained the effectiveness of these counter-insurgency elements"."Senior Taliban leaders' use of sanctuary in Pakistan has also complicated the HVT effort," the CIA says. "Moreover, the Taliban has a high overall ability to replace lost leaders, a centralised but flexible command and control overlaid with egalitarian Pashtun structures, and good succession planning and bench strength, especially at the middle levels."The CIA study also reports mixed results for such tactics in Iraq, noting that al-Qaeda in Iraq "initially lost several iterations of its senior leadership and numerous local emirs, but these losses initially did little to slow AQI's momentum".
  • ...2 more annotations...
  • Similarly, the CIA observes that Israel's "targeted-killings campaign" against Hamas and Hezbollah was of limited effectiveness owing to "decentralised command structures, compartmented leadership, strong succession planning, and deep ties to their communities, making the[se] groups highly resilient to leadership losses".The CIA review does suggest that targeted killings can be useful when they are part of a broader counter-insurgency strategy that employs other military and non-military counter-insurgency instruments. 
  • Drone strikes and other "targeted killings" of terrorist and insurgent leaders favoured by the US and supported by Australia can strengthen extremist groups and be counterproductive, according to a secret CIA report published by WikiLeaks.According to a leaked document by the CIA's Directorate of Intelligence, "high value targeting" (HVT) involving air strikes and special forces operations against insurgent leaders can be effective, but can also havenegative effects including increasing violence and greater popular support for extremist groups.
  •  
    The report is at http://www.wikileaks.org/cia-hvt-counterinsurgency/ Apparently we have a new leaker with access to top secret/no foreign documents.  
Paul Merrell

The ultimate goal of the NSA is total population control | Antony Loewenstein | Comment is free | theguardian.com - 0 views

  • William Binney is one of the highest-level whistleblowers to ever emerge from the NSA. He was a leading code-breaker against the Soviet Union during the Cold War but resigned soon after September 11, disgusted by Washington’s move towards mass surveillance.On 5 July he spoke at a conference in London organised by the Centre for Investigative Journalism and revealed the extent of the surveillance programs unleashed by the Bush and Obama administrations.
  • “At least 80% of fibre-optic cables globally go via the US”, Binney said. “This is no accident and allows the US to view all communication coming in. At least 80% of all audio calls, not just metadata, are recorded and stored in the US. The NSA lies about what it stores.”The NSA will soon be able to collect 966 exabytes a year, the total of internet traffic annually. Former Google head Eric Schmidt once argued that the entire amount of knowledge from the beginning of humankind until 2003 amount to only five exabytes.Binney, who featured in a 2012 short film by Oscar-nominated US film-maker Laura Poitras, described a future where surveillance is ubiquitous and government intrusion unlimited.“The ultimate goal of the NSA is total population control”, Binney said, “but I’m a little optimistic with some recent Supreme Court decisions, such as law enforcement mostly now needing a warrant before searching a smartphone.”
  • It shows that the NSA is not just pursuing terrorism, as it claims, but ordinary citizens going about their daily communications. “The NSA is mass-collecting on everyone”, Binney said, “and it’s said to be about terrorism but inside the US it has stopped zero attacks.”The lack of official oversight is one of Binney’s key concerns, particularly of the secret Foreign Intelligence Surveillance Court (Fisa), which is held out by NSA defenders as a sign of the surveillance scheme's constitutionality.“The Fisa court has only the government’s point of view”, he argued. “There are no other views for the judges to consider. There have been at least 15-20 trillion constitutional violations for US domestic audiences and you can double that globally.”
  • ...4 more annotations...
  • He praised the revelations and bravery of former NSA contractor Edward Snowden and told me that he had indirect contact with a number of other NSA employees who felt disgusted with the agency’s work. They’re keen to speak out but fear retribution and exile, not unlike Snowden himself, who is likely to remain there for some time.
  • Binney recently told the German NSA inquiry committee that his former employer had a “totalitarian mentality” that was the "greatest threat" to US society since that country’s US Civil War in the 19th century. Despite this remarkable power, Binney still mocked the NSA’s failures, including missing this year’s Russian intervention in Ukraine and the Islamic State’s take-over of Iraq.The era of mass surveillance has gone from the fringes of public debate to the mainstream, where it belongs. The Pew Research Centre released a report this month, Digital Life in 2025, that predicted worsening state control and censorship, reduced public trust, and increased commercialisation of every aspect of web culture.It’s not just internet experts warning about the internet’s colonisation by state and corporate power. One of Europe’s leading web creators, Lena Thiele, presented her stunning series Netwars in London on the threat of cyber warfare. She showed how easy it is for governments and corporations to capture our personal information without us even realising.Thiele said that the US budget for cyber security was US$67 billion in 2013 and will double by 2016. Much of this money is wasted and doesn't protect online infrastructure. This fact doesn’t worry the multinationals making a killing from the gross exaggeration of fear that permeates the public domain.
  • Wikileaks understands this reality better than most. Founder Julian Assange and investigative editor Sarah Harrison both remain in legal limbo. I spent time with Assange in his current home at the Ecuadorian embassy in London last week, where he continues to work, release leaks, and fight various legal battles. He hopes to resolve his predicament soon.At the Centre for Investigative Journalism conference, Harrison stressed the importance of journalists who work with technologists to best report the NSA stories. “It’s no accident”, she said, “that some of the best stories on the NSA are in Germany, where there’s technical assistance from people like Jacob Appelbaum.” A core Wikileaks belief, she stressed, is releasing all documents in their entirety, something the group criticised the news site The Intercept for not doing on a recent story. “The full archive should always be published”, Harrison said.
  • With 8m documents on its website after years of leaking, the importance of publishing and maintaining source documents for the media, general public and court cases can’t be under-estimated. “I see Wikileaks as a library”, Assange said. “We’re the librarians who can’t say no.”With evidence that there could be a second NSA leaker, the time for more aggressive reporting is now. As Binney said: “I call people who are covering up NSA crimes traitors”.
‹ Previous 21 - 40 of 154 Next › Last »
Showing 20 items per page