The latest twist in the Julian Assange case, as we await Ecuador’s decision on granting him asylum (a decision which would not, as I’ve written before, in itself allow protection from arrest if he steps outside the embassy), is that people are wondering whether the UK can simply strip the embassy of its diplomatic status, so allowing police officers to enter it.
You need to be aware that there is a legal base in the UK, the Diplomatic and Consular Premises Act 1987, that would allow us to take actions in order to arrest Mr Assange in the current premises of the Embassy.
We sincerely hope that we do not reach that point, but if you are not capable of resolving this matter of Mr Assange’s presence in your premises, this is an open option for us.
In no case is land to be regarded as a State’s diplomatic or consular premises for the purposes of any enactment or rule of law unless it has been so accepted or the Secretary of State has given that State consent under this section in relation to it; and if—
(a) a State ceases to use land for the purposes of its mission or exclusively for the purposes of a consular post; or
(b) the Secretary of State withdraws his acceptance or consent in relation to land,
it thereupon ceases to be diplomatic or consular premises for the purposes of all enactments and rules of law.
On the face of it, then, the Secretary of State (in practice a foreign office minister) could now simply withdraw consent, and with one bound, police would be free to make an arrest.
But it’s not quite as simple as that. You’ll note that section 1(4) says
The Secretary of State shall only give or withdraw consent or withdraw acceptance if he is satisfied that to do so is permissible under international law
and that according to section 1(5), in deciding whether to withdraw consent, the minister
shall have regard to all material considerations, and in particular, but without prejudice to the generality of this subsection—
(a) to the safety of the public;
(b) to national security; and
(c) to town and country planning.
The “compliance with international law” requirement may present a problem, since article 21 of the Vienna Convention on Diplomatic Relations requires the UK to facilitate the acquisition by Ecuador of premises necessary for its mission, or assist it in obtaining accommodation. It’s not obvious this allows the UK to just de-recognise the current premises without helping arrange something new.
Section 1(5) is interesting because, in spite of the way the drafting clearly intends to preserve ministers’ ability to take account of anything they think relevant, I’ve no doubt lawyers for Ecuador could argue that the list of three particular concerns colours the scope of ministers’ considerations, the result being that only some particular difficulty relating to safety or to the premises themselves could justify withdrawal.
More importantly, they could argue that Assange’s presence in the embassy and Ecuador’s conduct in sheltering him is not a material consideration; and that since that clearly lay behind the withdrawal, ministers would in deciding to withdraw consent, have taken into account an irrelevant factor.
In addition, there’d be a potentially strong argument to be made that ministers had exercised their power for an improper purpose not intended by Parliament when it enacted the 1987 legislation – their desire to arrest Julian Assange.
Ecuador could judicially review any proposed withdrawal: I think the effect on Assange means this is the type of case in which, as Lord Sumption explained in a recent speech, the courts would consider intervening in a foreign policy decision. Perhaps Assange could obtain an injunction on judicial review, preventing any arrest pending the outcome of proceedings. Of course, if the government successfully fought off that judicial review, the arrest could go ahead. But I don’t think a defence would be easy, and at the very least, a judicial review would create further delay – which probably suits Assange fairly well. I’m not sure giving him a hook to hang one on would be the best tactical move for the government.
The Quito letter from the UK to Ecuador went on apparently to say
We need to reiterate that we consider the continued use of the diplomatic premises in this way incompatible with the Vienna Convention and unsustainable and we have made clear the serious implications that this has for our diplomatic relations.
If I were advising the government, I think I’d say that, if ministers are determined to allow the arrest of Assange, it might be better simply to cut off diplomatic relations with Ecuador, send the ambassador home, close the embassy and arrest Assange after that. Ending diplomatic relations is the major sort of foreign affairs decision I doubt the courts would interfere with. But that’d be a major diplomatic call.
BREAKING NEWS: Police are massing at the Ecuadorian embassy in London where Australian WikiLeaks founder Julian Assange is holed up after his request for political asylum.
One personoutside the embassy, identifying himself as a “citizen journalist” with the twitter account https://twitter.com/alburyj is video streaming UK police entering the building.
Aroundt midnight, local time, WikiLeaks tweeted this morning that two large police vans had arrived ‘‘to surround the Ecuadorian embassy in London’’.
UPDATE [3:30pm PST] – “Assange asylum rumor is false,” Correa confirmed on his Twitter feed. He added that he is waiting for a Foreign Ministry report on the issue, without which a decision will not be made.
Ecuador has reportedly granted asylum to WikiLeaks founder Julian Assange, who requested it after the British Supreme Court refused to reopen his appeal against extradition to Sweden where he is wanted for questioning over alleged sex crimes.
WikiLeaks founder has been holed up in the country’s London embassy since June 19.
The asylum guarantees him safe passage from the UK to Ecuador, says Professor Donald Rothwell from the Australian National University College of Law.
In Sweden the whistleblower is wanted for questioning over accusations of sex crimes, but Assange and most of his supporters fear that once he arrived in Sweden, he would be handed over to US authorities.
Assange and his lawyers believe that the US has already lodged a sealed indictment against Assange, and that his case might outdo the one of Bradley Manning.
The whistleblower website founded by Julian Assange has leaked hundreds of thousands of classified diplomatic cables, including top secret documents from the US Department of Defense, and secret cables from the State Department.
The Conspiracy driving Private Contractors, Private Security, and Privatized CyberSecurity. Major Players trying to remain Name-less. Government influence on outsourcing, etc.
In August 2012, Wikileaks revealed details about a system known as Trapwire that uses facial recognition and other techniques to track and monitor individuals captured on countless different closed-circuit cameras operated by cities and other insititutions. The software is billed as a method by which to prevent terrorism, but can of course also be used to provide unprecedented surveillance and data-mining capabilities to governments, corporations, and other insitutions, including many with a history of using new technologies to violate the rights of citizens. Trapwire is already used in New York, Los Angeles, Las Vegas, Texas, DC, London, and other locales.
The ex-CIA agents who help run the firm are old friends of Stratfor vice president Fred Burton, whom they’ve briefed on their own capabilities in e-mails obtained by Anonymous hackers and provided to Wikileaks. Stratfor has engaged in at least several surveillance operations against activists, such as those advocating for victims of the Bhopal disaster, on behalf of large U.S. corporatons; Burton himelf was revealed to have advocated “bankrupting” and “ruining the life” of activists like Julian Assange in e-mails to other friends.
Trapwire can be extremely expensive to maintain, and is usually done so at taxpayer expense; Los Angeles county spent over $1.4 million dollars on the software’s use in a single three-month period of 2007.
Although most of the regions in which Trapwire operates don’t share information with each other, all of this is set to change; as Abraxas Applications president Dan Botsch told Burton via e-mail, “I think over time the different networks will begin to unite,” noting that several networks had already begun discussions on merging their information. Abraxas itself has always had the ability to “cross-network matches” from every region at their own office. By June 2011, Washington D.C. police were engaged in a pilot project under the Departent of Homeland Security that’s likely to lead to more cities using Trapwire on a more integrated basis.
Abraxas, the firm whose spin-off Abraxas Applications developed Trapwire in 2007, has long been involved in a lesser-known practice known as persona management, which involves the use of fake online “people” to gather intelligence and/or disseminate disinformation. The firm Ntrepid, created by Abraxas owner Cubic Corporation, won a 2010 CENTCOM contract to provide such capabilities for use in foreign countries; several board members of Ntrepid also sit on Abraxas.
TrapWire®
TrapWire is a unique, predictive software system designed to detect patterns indicative of terrorist attacks or criminal operations. Utilizing a proprietary, rules-based engine, TrapWire detects, analyzes and alerts on suspicious events as they are collected over periods of time and across multiple locations. Through the systematic capture of these pre-attack indicators, terrorist or criminal surveillance and pre-attack planning operations can be identified — and appropriate law enforcement counter measures employed ahead of the attack. As such, our clients are provided with the ability to prevent the terrorist or criminal event, rather than simply mitigate damage or loss of life.
Former senior intelligence officials have created a detailed surveillance system more accurate than modern facial recognition technology — and have installed it across the US under the radar of most Americans, according to emails hacked by Anonymous.
Every few seconds, data picked up at surveillance points in major cities and landmarks across the United States are recorded digitally on the spot, then encrypted and instantaneously delivered to a fortified central database center at an undisclosed location to be aggregated with other intelligence. It’s part of a program called TrapWire and it’s the brainchild of the Abraxas, a Northern Virginia company staffed with elite from America’s intelligence community. The employee roster at Arbaxas reads like a who’s who of agents once with the Pentagon, CIA and other government entities according to their public LinkedIn profiles, and the corporation’s ties are assumed to go deeper than even documented.
The details on Abraxas and, to an even greater extent TrapWire, are scarce, however, and not without reason. For a program touted as a tool to thwart terrorism and monitor activity meant to be under wraps, its understandable that Abraxas would want the program’s public presence to be relatively limited. But thanks to last year’s hack of the Strategic Forecasting intelligence agency, or Stratfor, all of that is quickly changing.
Hacktivists aligned with the loose-knit Anonymous collective took credit for hacking Stratfor on Christmas Eve, 2011, in turn collecting what they claimed to be more than five million emails from within the company. WikiLeaks began releasing those emails as the Global Intelligence Files (GIF) earlier this year and, of those, several discussing the implementing of TrapWire in public spaces across the country were circulated on the Web this week after security researcher Justin Ferguson brought attention to the matter. At the same time, however, WikiLeaks was relentlessly assaulted by a barrage of distributed denial-of-service (DDoS) attacks, crippling the whistleblower site and its mirrors, significantly cutting short the number of people who would otherwise have unfettered access to the emails.
On Wednesday, an administrator for the WikiLeaks Twitter account wrote that the site suspected that the motivation for the attacks could be that particularly sensitive Stratfor emails were about to be exposed. A hacker group called AntiLeaks soon after took credit for the assaults on WikiLeaks and mirrors of their content, equating the offensive as a protest against editor Julian Assange, “the head of a new breed of terrorist.” As those Stratfor files on TrapWire make their rounds online, though, talk of terrorism is only just beginning.
Mr. Ferguson and others have mirrored what are believed to be most recently-released Global Intelligence Files on external sites, but the original documents uploaded to WikiLeaks have been at times unavailable this week due to the continuing DDoS attacks. Late Thursday and early Friday this week, the GIF mirrors continues to go offline due to what is presumably more DDoS assaults. Australian activist Asher Wolf wrote on Twitter that the DDoS attacks flooding the WikiLeaks server were reported to be dropping upwards of 40 gigabytes of traffic per second on the site.
According to a press release (pdf) dated June 6, 2012, TrapWire is “designed to provide a simple yet powerful means of collecting and recording suspicious activity reports.” A system of interconnected nodes spot anything considered suspect and then input it into the system to be “analyzed and compared with data entered from other areas within a network for the purpose of identifying patterns of behavior that are indicative of pre-attack planning.”
In a 2009 email included in the Anonymous leak, Stratfor Vice President for Intelligence Fred Burton is alleged to write, “TrapWire is a technology solution predicated upon behavior patterns in red zones to identify surveillance. It helps you connect the dots over time and distance.” Burton formerly served with the US Diplomatic Security Service, and Abraxas’ staff includes other security experts with experience in and out of the Armed Forces.
What is believed to be a partnering agreement included in the Stratfor files from August 13, 2009 indicates that they signed a contract with Abraxas to provide them with analysis and reports of their TrapWire system (pdf).
“Suspicious activity reports from all facilities on the TrapWire network are aggregated in a central database and run through a rules engine that searches for patterns indicative of terrorist surveillance operations and other attack preparations,” Crime and Justice International magazine explains in a 2006 article on the program, one of the few publically circulated on the Abraxas product (pdf). “Any patterns detected – links among individuals, vehicles or activities – will be reported back to each affected facility. This information can also be shared with law enforcement organizations, enabling them to begin investigations into the suspected surveillance cell.”
In a 2005 interview with The Entrepreneur Center, Abraxas founder Richard “Hollis” Helms said his signature product:
“can collect information about people and vehicles that is more accurate than facial recognition, draw patterns, and do threat assessments of areas that may be under observation from terrorists.” He calls it “a proprietary technology designed to protect critical national infrastructure from a terrorist attack by detecting the pre-attack activities of the terrorist and enabling law enforcement to investigate and engage the terrorist long before an attack is executed,” and that, “The beauty of it is that we can protect an infinite number of facilities just as efficiently as we can one and we push information out to local law authorities automatically.”
An internal email from early 2011 included in the Global Intelligence Files has Stratfor’s Burton allegedly saying the program can be used to “[walk] back and track the suspects from the get go w/facial recognition software.”
Since its inception, TrapWire has been implemented in most major American cities at selected high value targets (HVTs) and has appeared abroad as well. The iWatch monitoring system adopted by the Los Angeles Police Department (pdf) works in conjunction with TrapWire, as does the District of Columbia and the “See Something, Say Something” program conducted by law enforcement in New York City, which had 500 surveillance cameras linked to the system in 2010. Private properties including Las Vegas, Nevada casinos have subscribed to the system. The State of Texas reportedly spent half a million dollars with an additional annual licensing fee of $150,000 to employ TrapWire, and the Pentagon and other military facilities have allegedly signed on as well.
In one email from 2010 leaked by Anonymous, Stratfor’s Fred Burton allegedly writes, “God Bless America. Now they have EVERY major HVT in CONUS, the UK, Canada, Vegas, Los Angeles, NYC as clients.” Files on USASpending.gov reveal that the US Department of Homeland Security and Department of Defense together awarded Abraxas and TrapWire more than one million dollars in only the past eleven months.
News of the widespread and largely secretive installation of TrapWire comes amidst a federal witch-hunt to crack down on leaks escaping Washington and at attempt to prosecute whistleblowers. Thomas Drake, a former agent with the NSA, has recently spoken openly about the government’s Trailblazer Project that was used to monitor private communication, and was charged under the Espionage Act for coming forth. Separately, former NSA tech director William Binney and others once with the agency have made claims in recent weeks that the feds have dossiers on every American, an allegation NSA Chief Keith Alexander dismissed during a speech at Def-Con last month in Vegas.
Juice Rap News: Episode XIII – A NEWS HOPE. It is a time of corporate war; deprived of a reliable media the people of Planet Earth are kept misinformed and in a state of perpetual conflict. Is an honest Fourth Estate the only Force than can restore peace and balance to the Galaxy? To find out, we consult two of journalism’s most influential and inflammatory figures: Rebel journalist enfant terrible, Julian Assange, who awaits a verdict in London which could see him ‘extradited’ to Sweden. And on the opposite end of the journalistic spectrum: Rupert Murdoch, head of the mighty NewsCorp media Empire, embroiled in legal scandals that go to the highest and lowest levels of celebrity in Britain. In the manichean manner of some ancient laser sword and forcery epic, join the wisest news-anchor in the Galaxy, Robert Foster, as he attempts to wrangle these two figures together for a rap-debate. Will the light or the dark side prevail – and is it really that easy to know which is which? How many Bothans died to bring us this information? Is the Force Estate with Robert? Will we see THE RETURN OF THE JOURNALI before the EMPIRE EXTRADITES BACK? For answers to all these questions and more, pull down your blast shields, switch off your on-board computer and feel the Force, in this latest episode of Juice Rap News… or click play.
SUPPORT the creation of new episodes of Juice Rap News – a show which relies on private donations: http://thejuicemedia.com/donate
CREDITS:
– ARTWORK by Zoe Tame http://visualtonic.com.au
– ORIGINAL MUSIC: Main Beat: “The Golden Era” – by The GOAT, ILL Beat Constructor: http://www.thegoatbeats.com
– ORIGINAL RAP-WARS theme music composed by Adrian Sergovich.
– VIDEO: Special thanks to Jonas Schweizer in Germany for creating the animated intro and RapWars special FX. (ATM he’s working on an awesome new documentary project: http://www.indiegogo.com/CaribbeanNewcomer)
– Many thanks to the following humans for lending their time and talent to the making of this episode: Ellen (Brianna Manning and SwededTrooper_1) and Zoe (SwedeTrooper_2); Lucy for voiceovers (Admiral Gillard, Manning & SwedeTroopers); Rosie Dunlop for make-up magick; Dave Abbott for technical & video advice. And finally, to Kristinn Hrafnsson of WikiLeaks for his debut kameo.
CAPTIONS: Thanks Koolfy & Siltaar at La Quadrature du Net for English captions.
TRANSLATIONS: Thanks to Euclides for Portuguese translation :)
**If you would like to translate this episode into your language, please contact us first via: http://thejuicemedia.com/contact**
You may have noticed it last week. Anonymous claimed the scalp of yet another a major government agency.
Supporters of the the online movement of activists and internet trolls said they’d stolen 1.7 GB of data from an agency within the Department of Justice that aggregates crime data. They claimed to have nabbed “lots of shiny things such as internal emails and the entire database dump.” They branded the heist as “Monday Mail Mayhem,” said it could help people “know the corruption in their government.” They posted it on Pirate Bay as a torrent, for anyone to see — and 1.7 GB was just the size of the zipped file.
Not many people bothered to check what was actually in the huge file.
Step in Identity Finder, a software security firm. Privacy officer Aaron Titus downloaded the payload last week and sifted through it all, checking out the veracity of the claims by Anonymous.
Turned out they were overhyped.
The zipped file contained 6.5 GB of web server files and “does not appear to contain any sensitive personal information, internal documents, or internal emails,” according to Titus. A folder named “Mail” was mostly empty, though it contained two administrative email addresses. There were also no personal details (social security numbers or credit card numbers), and the worst the breach had done was reveal the site’s web server file, which could be leveraged by other hackers for future attacks.
It looked like the breach had done more to grab attention from the media and the Department of Justice than do any real damage.
Surprised? You shouldn’t be. This was another illustration of the power of Anonymous as a continuing online insurgency: not in hacking per se, but its constant ability to grab eyeballs, project power, and give followers a voice and sense of purpose unlike any they’ve experienced before. What’s important for companies and policy makers (the typical targets) to note is that it’s oftentimes more a tease than anything else.
Other examples:
1) Earlier this monthFox News reported that an online group called TheWikiBoat, aligned with Anonymous, planned to bring down the websites of 46 major companies on Friday May 25. TheWikiBoat said in a public statement that it had “no motives other then [sic] doing it for the lulz,” (ie. for shits and giggles). The FBI’s Cyber Division was concerned enough to send an email to the likes of Apple Computer, McDonald’s and ExxonMobile warning them of a potential attack — which didn’t happen.
2) Around this time last year, a single supporter of Anonymous managed to grab global headlines when he tweeted that he had a cache of bank of America emails. What he eventually released was an e-mail exchange between himself and a BofA ex-staffer who made (what admittedly looked like valid) complaints about the bank’s management. But it did nothing to the bank’s stock price, and the news agenda quickly moved on.
3) In December 2010 Anonymous claimed responsibility for taking down the websites of PayPal, MasterCard and Visa after these firms nixed online donations to WikiLeaks. How? Supporters implied it was thanks to thousands of volunteers who had become part of an cyber army by downloading a software tool called LOIC. What really happened: a couple of supporters with botnets temporarily took the sites down — but the notion that Anonymous was an international “army” of hacktivists was left floating around the Internet.
Time and again, online supporters have laid claim to the brand power of Anonymous, invoking its name, imagery such as the Guy Fawkes logo and headless, suited man surrounded by olive leaves, along with the tag line, “We are Anonymous… Expect us.” The result: news outlets and policy makers sit up and listen, more so than they would if those supporters used their real names, or were literally anonymous. The power of Anonymous is propagated by the continued use of a name wrapped in hype and disinformation, more than the occasional real hacks.
The Anonymous “brand” gets street cred from cyber attacks carried out by a minority of hackers who know how to use SQL injection techniques or who know people who control botnets. The additional hype comes from the impassioned, sometimes-threatening rhetoric of less-skilled-but-enthusiastic followers on Twitter or the imageboard 4chan.
Why do these supporters join in? Everyone has their own reasons — something to do, the engaging community of people to talk to, the thrill of being part of a secret crowd. Sources in Anonymous that I have spoken to over the last year often speak to a sense of purpose they get from Anonymous, and sometimes the justification to do the subversive, often-illegal things online that they would not otherwise do. It’s mob mentality with a twist — the activist element of protest, twinned with the culture of trolling and exaggeration that runs through image boards like 4chan.
For law enforcement, who happen to chase anarchists with particular zeal in the United States, there isn’t so much a criminal organization to rope in as the mirage of one. No system with leaders and rules, but a culture and etiquette that is changing all the time. Many of the figureheads who organized the Anonymous attacks against Scientology in 2008 have left the community to focus on college or full-time jobs, many happy to break away from the frenetic pace of operations and the constant paranoia about getting doxxed. Those who’ve been arrested are upheld as martyrs within the network, and there are many more who are joining, and who think they can do a better job of hiding from the police.
Anonymous will continue to exist for some time, taking new followers, changing tactics, and often staying one spontaneously-placed step ahead of the police. They’ll fight for the right to their anonymity, to expose other people’s information, or anything they want, and they’ll come and go from the headlines. But these chaotic actors will stick around, and their greatest power will continue to be not their skills or abilities, but the very name that they can invoke.
Nobel Peace Prize nominee PFC Bradley Manning, a 24-year-old Army intelligence analyst, is accused of releasing the Collateral Murder video, that shows the killing of unarmed civilians and two Reuters journalists, by a US Apache helicopter crew in Iraq. He is also accused of sharing the Afghan War Diary, the Iraq War Logs, and series of embarrassing US diplomatic cables. These documents were published by the anti-secrecy website WikiLeaks, and they have illuminated such issues as the true number and cause of civilian casualties in Iraq, along with a number of human rights abuses by U.S.-funded contractors and foreign militaries, and the role that spying and bribes play in international diplomacy. Given the war crimes exposed, if PFC Bradley Manning was the source for these documents, he should be given a medal of honor.
Not a single person has been harmed by the release of this information. Defense Secretary Robert M. Gates has called the effect of WikiLeaks’ releases on U.S. foreign relations “fairly modest.” Yet the Obama administration has chosen to persecute the whistle-blower rather than prosecute the war criminals who were exposed. While the prosecution has declared it does not intend to seek the death penalty, they do seek to lock PFC Bradley Manning away for life, with the most ridiculous charge of ‘aiding the enemy,’ even though chat logs attributed to Bradley by the FBI clearly show intent only to inform the public and promote “discussion, debates, and reforms.”
Soldiers are promised fair treatment and a speedy trial under the Uniform Code of Military Justice (UCMJ). However, the soldiers responsible for PFC Manning’s care took it upon themselves to abuse him by keeping him locked up in solitary confinement for the first 10 months of his incarceration. During this time, Bradley was denied meaningful exercise, social interaction, sunlight, and on a number of occasions he was forced to stay completely naked. These conditions were unique to Bradley and are illegal even under US military law, as they amount to extreme pre-trial punishment. In March 2011, chief US State Department spokesperson PJ Crowley called PFC Manning’s treatment at the Quantico, Virginia, Marine Corps brig “ridiculous and counterproductive and stupid.” He was forced to resign shortly after admitting this. Since resigning, he has stated that the prosecution’s heavy-handed persecution of PFC Manning has undermined the government’s credibility.
Bradley’s treatment sparked a probe by the United Nations special rapporteur on torture, Juan Mendez. Mr. Mendez stated that he has been “frustrated by the prevarication of the US government with regard to my attempts to visit Mr. Manning.” After having his requests to visit Bradley repeatedly blocked, and after completing a fourteen month investigation, Mr. Mendez issued a statement saying that PFC Bradley Manning’s treatment has been “cruel and inhuman.”
It only took one week in April 2011 to have over a half million people sign a petition calling on President Obama to end the isolation and torture of Bradley Manning. The Obama administration’s ongoing persecution of Bradley Manning has served as “a chilling deterrent to other potential whistleblowers committed to public integrity,” and over 300 top legal scholars have declared that Bradley’s treatment was a violation of the Eighth Amendment’s prohibition against cruel and unusual punishment, as well as a violation of the Fifth Amendment’s guarantee against punishment without trial. Among the signatories is professor Laurence Tribe, a Harvard professor who taught President Obama. Professor Tribe was, until recently, a senior advisor to the US Justice Department.
Partially in response to public outcry, on April 21, 2011, Bradley was moved from Quantico to Fort Leavenworth, KS, where his conditions greatly improved. The very day he was moved, President Obama was surprised at a breakfast fundraiser by a group of protesters. At the end of the fundraiser, a member of the Bradley Manning Support Network, Logan Price, questioned him about Bradley’s situation. The President stated that “He [Bradley Manning] broke the law.” This pretrial declaration of guilt that has caused concern among legal experts, who argue it is clearly a case of ‘undue command influence’. President Obama is the highest ranking military commander, and soldiers follow his orders and his direction. By declaring PFC Bradley Manning guilty, he set the tone and direction of the subordinate military prosecution. It is now difficult for soldiers to express support for PFC Bradley Manning, who like many soldiers who follow the lead of their commander-in-chief, assume PFC Bradley Manning is guilty. Finally, reinforcing the assumption of Manning’s guilt, no charges were filed against any of the soldiers who took it upon themselves to abuse Bradley while he was under their supervision.
Bradley Manning has a growing list of supporters who want all the charges against him dropped. Among the supporters is the famous whistle-blower, Daniel Ellsberg, who leaked the Pentagon Papers in 1971. Recognizing the valor required to tell the truth, Ellsberg calls PFC Bradley Manning a hero and a patriot. We agree. Drop all the charges, and free PFC Bradley Manning.
We hope that you will join us as well. See what you can do to support justice in this historic time.
Here are some recommended articles with more information:
Leak Sites that publish leaks and accept submission of leaks, inspired by the original WikiLeaks.org concept.
WikiLeaks – WikiLeaks website – love them or hate them – no new submissions for 2 years – new submission system still not launched as promised on 28/11/2011 or 01/12/2011
BritiLeaks false start – BritiLeaks website – original false start: launched with less than no anonymity or security protection at all – see below for current site .
BritiLeaks – BritiLeaks website – new secure website launch promised soon, already has strong TLS Digital Certificate and Tor Hidden Services – still to be launched “in a few days”, but hosting mirrors of other whistleblowing websites.
MurdochLeaks – The Murdoch Leaks Project website – “will accept tips or evidence of wrong doing relating to Rupert Murdoch’s affiliated institutions such as News International and News Corporation”
OpenWatch – OpenWatch.net encourages the public to use their mobile phone software to record encounters with the police and authority, then submit them for posting online.
LectureLeaks – LectureLeaks – Use recording mobile software to record and leak university lectures. Has content already, open source.
CorruptionWatch.org.za – Corruption Watch – South Africa – Trades Union organised, anti-corruption pledge signatures, mapping of corruption hotspots, but no security or anonymity measures for contributors or informants at all except for “Leave this field empty, if you want to stay anonymous.“
Established Leak Sites
Websites which have been publishing censored or leaked material before, or independently in parallel with WikiLeaks
Public Intelligence – Public Intelligence website established 2009 – now back online in Luxembourg after server move from the Netherlands caused by “complaints” to the hosting company. Good Encryption, now no longer using Quantserve web bug tracking
FolhaLeaks – FolhaLeaks – Folha de S.Paulo, São Paulo, Brasil – no encryption, web form is not distinct from the main newspaper website so it betrays “anonymous” visitor details to FaceBook and to various banner advertisers etc.
Environmental Protection Whistle blowing sites
Leak Sites and Organization that accept reporting about environmental issues
NZ SIS – New Zealand Security Intelligence Service Public Contribution Form – no longer uses a hidden PGP key, still tracks IP address etc. and the rest of the website still tracks visitors with Google Analytics
Websites which have a specific topic, audience and editorial position and as part of their reporting have frequently published high level unpublished documents
Hints and Tips for Whistleblowers – ht4w.co.uk website – Technical Hints and Tips for protecting the anonymity of sources for Whistleblowers, Investigative Journalists, Campaign Activists and Political Bloggers etc.
Global Integrity Report Open-source metrics, indicators, and techniques for assessing transparent and accountable government. Strong whistleblowing protection law considered as an effective anti-corruption framework.
Public Concern at Work – UK Public Concern at Work NGO and legal advice centre set up in 1993 to address public interest whistleblowing: a) confidential advice to whistleblowers b) policy & campaigning c) public education (throughout UK, and to law/policy makers and all employers)
Whistle Blowing Consulting Businesses
Organization that do business related to WhistleBlowing and leaking (Consulting, Services, Press Agency middle men etc).
Charity and Profit organization that provide to public agencies and private corporation hotline services for whistleblowing in order to outsource the internal reporting service.
Public Concern at Work – UK Public Concern at Work A leading authority on making public interest whistleblowing work. Provide training, consultancy, audit support and access to advice line for organisations wanting to ensure they provide their staff a real alternative to silence.
GlobaLeaks – GlobaLeaks website – Open Source Whistleblowing Framework software project, which spawned this LeakDirectory.org wiki
Honest Appalachia – Honest Appalachia website – uses Tor Hidden Service and PGP and publishes its own Open Source documents submission website software and configuration scripts to help other similar whistleblowing projects
Whistle Blowing in Corporations
A Directory of corporations that implemented corporate transparency by implementing whistleblowing through the organization:
internalmemos.com Part of the fuckedcompany coverage of the internet bubble collapse. All of the 2002-2007 memos not behind the paywall are available from the internet archivehighlights include:
blackfridaywikileaks.com – Blackfriday wikileaks America – WordPress blog with no entries since June 2011, full of Google Analytics, Quantserve etc. visitor tracking, no encryption etc.
Encryption / Anonymity infrastructure services/ software used by some Whistleblower Sites
Tor – Tor project – encrypted anonymity router cloud – Tor Hidden Services and anonymised web browsing / web form submission (N.B. caveats)
The Workshop has been glued together with GlobaLeaks one, you can download slides here
SocialHacking LeakDirectorySocial Hacking
We will give an overview of what whistle blowing is and how it can be applied a wide array of different situations. Hopefully by the end of the workshop you will understand that whistle blowing is a fundamental tool for a democratic and transparent society.
We will focus in particular on the Leakdirectory Project, a shared crowd based initiative to represent most of the world of whistleblowing with the goal to became a reference for all the whistleblowing initiatives.
The United States is threatening nations who oppose Monsanto’s genetically modified (GM) crops with military-style trade wars, according to information obtained and released by the organization WikiLeaks. Nations like France, which have moved to ban one of Monsanto’s GM corn varieties, were requested to be ‘penalized’ by the United States for opposing Monsanto and genetically modified foods. The information reveals just how deep Monsanto’s roots have penetrated key positions within the United States government, with the cables reporting that many U.S. diplomats work directly for Monsanto.
The WikiLeaks cable reveals that in late 2007, the United States ambassador to France and business partner to George W. Bush, Craig Stapleton, requested that the European Union along with particular nations that did not support GMO crops be penalized. Stapleton, who co-owned the Dallas/Fort Worth-based Texas Rangers baseball team with Bush in the 1990s, stated:
“Country team Paris recommends that we calibrate a target retaliation list that causes some pain across the EU since this is a collective responsibility, but that also focuses in part on the worst culprits. The list should be measured rather than vicious and must be sustainable over the long term, since we should not expect an early victory. Moving to retaliation will make clear that the current path has real costs to EU interests and could help strengthen European pro-biotech voices.”
The Leaked Political Agenda Behind Monsanto’s GMO Crops
The ambassador plainly calls for ‘target retaliation’ against nations who are against using Monsanto’s genetically modified corn, admittedly linked to organ damage and environmental devastation. Amazingly, this is not an isolated case. In similar newly released cables, United States diplomats are found to have pushed GMO crops as a strategic government and commercial imperative. Furthermore, the U.S. specifically targeted advisers to the pope, due to the fact that many Catholic bishops and figureheads have openly denounced GMO crops. In fact, the Vatican has openly declared Monsanto’s GMO crops as a ‘new form of slavery’.
“A Martino deputy told us recently that the cardinal had co-operated with embassy Vatican on biotech over the past two years in part to compensate for his vocal disapproval of the Iraq war and its aftermath – to keep relations with the USG [US government] smooth. According to our source, Martino no longer feels the need to take this approach,” says the cable.
Perhaps the most shocking piece of information exposed by the cables is the fact that these U.S. diplomats are actually working directly for biotech corporations like Monsanto. The cables also highlight the relationship between the U.S. and Spain in their conquest to persuade other nations to allow for the expansion of GMO crops. Not only did the Spanish government secretly correspond with the U.S. government on the subject, but the U.S. government actually knew beforehand how Spain would vote before the Spanish biotech commission reported their decision regarding GMO crops. The cable states:
“In response to recent urgent requests by [Spanish rural affairs ministry] state secretary Josep Puxeu and Monsanto, post requests renewed US government support of Spain’s science-based agricultural biotechnology position through high-level US government intervention.”
Monsanto has undoubtedly infiltrated the United States government in order to push their health-endangering agenda, and this has been known long before the release of these WikiLeaks cables. The U.S. is the only place where Monsanto’s synthetic hormone Posilac is still used in roughly 1/3 of all cows, with 27 nations banning the substance over legitimate health concerns. Despite Monsanto’s best attempts at incognito political corruption, nothing can stop the grassroots anti-Monsanto movement that is taking over cities and nations alike.
Anthony Gucciardi is an accomplished investigative journalist with a passion for natural health. Anthony’s articles have been featured on top alternative news websites such as Infowars, NaturalNews, Rense, and many others. Anthony is the co-founder of Natural Society, a website dedicated to sharing life-saving natural health techniques. Stay in touch with Natural Society via the following sites Facebook – Twitter – Web
Bradley Manning, the U.S. Army private accused of leaking classified U.S. information to WikiLeaks in 2010, has been nominated for a Nobel Peace Prize.
Manning was arrested in May 2010 after allegedly leaking more than 250,000 U.S. diplomatic cables, 400,000 U.S. Army reports about Iraq and another 90,000 about Afghanistan, as well as the material used in the “Collateral Murder” video produced by WikiLeaks. He was detained for nine months — first in solitary confinement at the Marine Corps Brig in Quantico, Va., and then at a medium-security military prison at Fort Leavenworth, Kan. — for nine months before formal charges were brought against him last week.
Manning faces 22 charges in sum, the most serious is “aiding the enemy,” a crime punishable by death. Army prosecutors have insisted, however, that they are seeking a life imprisonment and not a death penalty sentence, should Manning be found guilty. He has also been charged with disclosing classified information to a person not authorized to receive it, wrongfully causing intelligence to be published on the Internet knowing that it is accessible to the enemy and violating Army computer use rules.
The names of 191 individuals and 43 organizations were submitted to the Norweigan Nobel Committee for consideration. Every year, the five-member Committee sends out thousands of letters to qualified individuals — lawmakers, university professors and other figures involved in the public sphere — calling for nominations. The lists of nominees are kept secret for 50 years, but some voting individuals choose to announce their nominations publicly.
In addition to Manning, former Ukrainian Prime Minister Yulia Tymoshenko and Russian human rights activist Svetlana Gannushkina were nominated for the prize, the AP reports. The winner — or winners, should the prize be shared — will be announced in October.
LONDON–Today WikiLeaks began publishing The Global Intelligence Files – more than five million emails from the Texas-headquartered “global intelligence” company Stratfor. The emails date from between July 2004 and late December 2011. They reveal the inner workings of a company that fronts as an intelligence publisher, but provides confidential intelligence services to large corporations, such as Bhopal’s Dow Chemical Co., Lockheed Martin, Northrop Grumman, Raytheon and government agencies, including the US Department of Homeland Security, the US Marines and the US Defense Intelligence Agency. The emails show Stratfor’s web of informers, pay-off structure, payment-laundering techniques and psychological methods, for example:
“[Y]ou have to take control of him. Control means financial, sexual or psychological control… This is intended to start our conversation on your next phase” – CEO George Friedman to Stratfor analyst Reva Bhalla on 6 December 2011, on how to exploit an Israeli intelligence informant providing information on the medical condition of the President of Venezuala, Hugo Chavez.
The material contains privileged information about the US government’s attacks against Julian Assange and WikiLeaks and Stratfor’s own attempts to subvert WikiLeaks. There are more than 4,000 emails mentioning WikiLeaks or Julian Assange. The emails also expose the revolving door that operates in private intelligence companies in the United States. Government and diplomatic sources from around the world give Stratfor advance knowledge of global politics and events in exchange for money. The Global Intelligence Files exposes how Stratfor has recruited a global network of informants who are paid via Swiss banks accounts and pre-paid credit cards. Stratfor has a mix of covert and overt informants, which includes government employees, embassy staff and journalists around the world.
The material shows how a private intelligence agency works, and how they target individuals for their corporate and government clients. For example, Stratfor monitored and analysed the online activities of Bhopal activists, including the “Yes Men”, for the US chemical giant Dow Chemical. The activists seek redress for the 1984 Dow Chemical/Union Carbide gas disaster in Bhopal, India. The disaster led to thousands of deaths, injuries in more than half a million people, and lasting environmental damage.
Stratfor has realised that its routine use of secret cash bribes to get information from insiders is risky. In August 2011, Stratfor CEO George Friedman confidentially told his employees: “We are retaining a law firm to create a policy for Stratfor on the Foreign Corrupt Practices Act. I don’t plan to do the perp walk and I don’t want anyone here doing it either.”
Stratfor’s use of insiders for intelligence soon turned into a money-making scheme of questionable legality. The emails show that in 2009 then-Goldman Sachs Managing Director Shea Morenz and Stratfor CEO George Friedman hatched an idea to “utilise the intelligence” it was pulling in from its insider network to start up a captive strategic investment fund. CEO George Friedman explained in a confidential August 2011 document, marked DO NOT SHARE OR DISCUSS: “What StratCap will do is use our Stratfor’s intelligence and analysis to trade in a range of geopolitical instruments, particularly government bonds, currencies and the like”. The emails show that in 2011 Goldman Sach’s Morenz invested “substantially” more than $4million and joined Stratfor’s board of directors. Throughout 2011, a complex offshore share structure extending as far as South Africa was erected, designed to make StratCap appear to be legally independent. But, confidentially, Friedman told StratFor staff: “Do not think of StratCap as an outside organisation. It will be integral… It will be useful to you if, for the sake of convenience, you think of it as another aspect of Stratfor and Shea as another executive in Stratfor… we are already working on mock portfolios and trades”. StratCap is due to launch in 2012.
The Stratfor emails reveal a company that cultivates close ties with US government agencies and employs former US government staff. It is preparing the 3-year Forecast for the Commandant of the US Marine Corps, and it trains US marines and “other government intelligence agencies” in “becoming government Stratfors”. Stratfor’s Vice-President for Intelligence, Fred Burton, was formerly a special agent with the US State Department’s Diplomatic Security Service and was their Deputy Chief of the counterterrorism division. Despite the governmental ties, Stratfor and similar companies operate in complete secrecy with no political oversight or accountability. Stratfor claims that it operates “without ideology, agenda or national bias”, yet the emails reveal private intelligence staff who align themselves closely with US government policies and channel tips to the Mossad – including through an information mule in the Israeli newspaper Haaretz, Yossi Melman, who conspired with Guardian journalist David Leigh to secretly, and in violation of WikiLeaks’ contract with the Guardian, move WikiLeaks US diplomatic cables to Israel.
Ironically, considering the present circumstances, Stratfor was trying to get into what it called the leak-focused “gravy train” that sprung up after WikiLeaks’ Afghanistan disclosures:
“[Is it] possible for us to get some of that ‘leak-focused’ gravy train? This is an obvious fear sale, so that’s a good thing. And we have something to offer that the IT security companies don’t, mainly our focus on counter-intelligence and surveillance that Fred and Stick know better than anyone on the planet… Could we develop some ideas and procedures on the idea of ´leak-focused’ network security that focuses on preventing one’s own employees from leaking sensitive information… In fact, I’m not so sure this is an IT problem that requires an IT solution.”
Like WikiLeaks’ diplomatic cables, much of the significance of the emails will be revealed over the coming weeks, as our coalition and the public search through them and discover connections. Readers will find that whereas large numbers of Stratfor’s subscribers and clients work in the US military and intelligence agencies, Stratfor gave a complimentary membership to the controversial Pakistan general Hamid Gul, former head of Pakistan’s ISI intelligence service, who, according to US diplomatic cables, planned an IED attack on international forces in Afghanistan in 2006. Readers will discover Stratfor’s internal email classification system that codes correspondence according to categories such as ‘alpha’, ‘tactical’ and ‘secure’. The correspondence also contains code names for people of particular interest such as ‘Izzies’ (members of Hezbollah), or ‘Adogg’ (Mahmoud Ahmedinejad).
Stratfor did secret deals with dozens of media organisations and journalists – from Reuters to the Kiev Post. The list of Stratfor’s “Confederation Partners”, whom Stratfor internally referred to as its “Confed Fuck House” are included in the release. While it is acceptable for journalists to swap information or be paid by other media organisations, because Stratfor is a private intelligence organisation that services governments and private clients these relationships are corrupt or corrupting.
WikiLeaks has also obtained Stratfor’s list of informants and, in many cases, records of its payoffs, including $1,200 a month paid to the informant “Geronimo” , handled by Stratfor’s Former State Department agent Fred Burton.
WikiLeaks has built an investigative partnership with more than 25 media organisations and activists to inform the public about this huge body of documents. The organisations were provided access to a sophisticated investigative database developed by WikiLeaks and together with WikiLeaks are conducting journalistic evaluations of these emails. Important revelations discovered using this system will appear in the media in the coming weeks, together with the gradual release of the source documents.
Public partners in the investigation:
More than 25 media partners (others will be disclosed after their first publication):
Al Akhbar – Lebanon – http://english.al-akhbar.com
Al Masry Al Youm – Egypt – http://www.almasry-alyoum.com
Bivol – Bulgaria – http://bivol.bg
CIPER – Chile – http://ciperchile.cl
Dawn Media – Pakistan – http://www.dawn.com
L’Espresso – Italy – http://espresso.repubblica.it
La Repubblica – Italy – http://www.repubblica.it
La Jornada – Mexico – www.jornada.unam.mx/
La Nacion – Costa Rica – http://www.nacion.com
Malaysia Today – Malaysia – www.malaysia-today.net
McClatchy – United States – http://www.mcclatchy.com
Nawaat – Tunisia – http://nawaat.org
NDR/ARD – Germany – http://www.ard.de
Owni – France – http://owni.fr
Pagina 12 – Argentina – www.pagina12.com.ar
Plaza Publica – Guatemala – http://plazapublica.com.gt
Publico.es – Spain – www.publico.es
Rolling Stone – United States – http://www.rollingstone.com
Russia Reporter – Russia – http://rusrep.ru
Ta Nea – Greece –- http://www.tanea.gr
Taraf – Turkey – http://www.taraf.com.tr
The Hindu – India – www.thehindu.com
The Yes Men – Bhopal Activists – Global http://theyesmen.org
Nicky Hager for NZ Herald – New Zealand – http://www.nzherald.co.nz
To: “Whalen, Jeanne” <Jeanne.Whalen[at]wsj.com>
From: John Young <jya[at]pipeline.com>
Date: Sun, 22 Aug 2010 12:45 +0600
Subject: RE: from the WSJ
Jeanne,
Following up our telephone exchange on Friday:
1. You said the WSJ editor turned down the use of Rupert Murdoch’s
penthouse for an inteview because editorial and business are kept
separate and Murdoch is business. That is hoarily disingenuous for
no media keeps editorial and business separate, the two are
inseparable with business always in control.
2. I said there is no need for me to comment further on Wikileaks,
the story is now a churn of publicity stunts by Wikileaks, its
supporters and detractors.
3. You said there was interest in reporting on Cryptome in addition
to Wikileaks. I said that is another story, not related to Wikileaks.
To amplify 3, Cryptome shares with Wikileaks and many others
older and newer, the aim of reducing secrecy in government,
business, organizations, institutions and individuals.
Pervasive secrecy corrupts as an essential protector of those who
want control and manipulate the citzenry and subjects. Those who
advocate secrecy always justify it by claims of threats that require
secrecy to prevent or fight.
In truth, secrecy protects and empowers those who use it and
weakens those for whom it is invoked to protect.
Secrecy hides privilege, incompetence and deception of
those who depend on it and who would be disempowered
without it.
The very few legitimate uses of secrecy have served as the
seed for unjustified expanded and illegitimate uses.
A vast global enterprise of governments, institutions, organizations,
businesses and individuals dependent up the secrecy of abuse
of secrecy has evolved into an immensely valuable practice whose
cost to the public and benefits to its practitioners are concealed
by secrecy.
Secrecy has led to a very large undergournd criminal enterprise
dealing with stolen, forged, faked, and planted “secret” information
involving governments, businesses, NGOs, institutions and
individuals. Its value likely exceeds that of the drug trade, with
which it works in concert to hide assets, procedures and operators
that is keep the secrets in emulation of the secretkeepers.
Ex-secretkeepers are involved in this undergroung enterprise
as beneficiares, informants, facilitators of exchanges with
the agoveground secretkeepers and as spies for hire.
Secrecy is the single most threatening practice against democracy
and democratic procedures such that it is highly likely that there is
no democracy or democratic institutions unsullied by secrecy.
Secrecy poses the greatest threat to the United States because
it divides the poplulation into two groups, those with access to
secret information and those without. This asymmetrial access
to information vital to the United States as a democracy will
eventually turn it into an autocracy run by those with access
to secret informaton, protected by laws written to legitimate
this privileged access and to punish those who violate these
laws.
Those with access to secret information cannot honestly
partake in public discourse due to the requirement to lie
and dissumlate about what is secret information. They can
only speak to one another never in public. Similarly those
without access to secret information cannot fully
debate the issues which affect the nation, including
alleged threats promulagsted by secretkeepers who
are forbidden by law to disclose what they know.
Senator Patrick Moynihan, among others, has explored
the damaging consequences of excessive secrecy. Attempts
to debate these consequences have been suppressed
or distorted by secrecy practices and laws.
Efforts, governmental and private, to diminish secrecy
have had modest effects, and the amount of secret information
continues to grow virtually unchecked and concealed by
the very means questioned, secrecy itself.
These secrecy-reduction efforts are continually being attacked
by the secrets enterprise by secrecy-wielding oveseers, including
presidents, legislators and the courts.
While some of the privileged media challenge these practices,
most do not and thereby reinforce the unsavory.
It should not be surprising that this leads to an increase in
efforts to challenge secrecy practices by those excluded,
including such initiatives as, among many others around
the globe, Cryptome and Wikileaks.
Cryptome disagrees with the use of secrecy by Wikileaks
and its monetization of secret information which mimics
those it ostensibly opposes, say, Rupert Murdoch, among
untold others.
Yesterday Alexander Cockburn reminded us of the news Israel Shamir and Paul Bennett broke at Counterpunch in September. Julian Assange’s chief accuser in Sweden has a significant history of work with anti-Castro groups, at least one of which is US funded and openly supported by a former CIA agent convicted in the mass murder of seventy three Cubans on an airliner he was involved in blowing up.
Anna Ardin (the official complainant) is often described by the media as a “leftist”. She has ties to the US-financed anti-Castro and anti-communist groups. She published her anti-Castro diatribes (see here and here) in the Swedish-language publication Revista de Asignaturas Cubanas put out by Misceláneas de Cuba. From Oslo, Professor Michael Seltzer points out that this periodical is the product of a well-financed anti-Castro organization in Sweden. He further notes that the group is connected with Union Liberal Cubana led by Carlos Alberto Montaner whose CIA ties were exposed here.
Quelle surprise, no? Shamir and Bennett went on to write about Ardin’s history in Cuba with a US funded group openly supported by a real terrorist: Luis Posada Carriles.
In Cuba she interacted with the feminist anti-Castro group Las damas de blanco (the Ladies in White). This group receives US government funds and the convicted anti-communist terrorist Luis Posada Carriles is a friend and supporter. Wikipedia quotes Hebe de Bonafini, president of the Argentine Madres de Plaza de Mayo as saying that “the so-called Ladies in White defend the terrorism of the United States.”
Luis Clemente Faustino Posada Carriles (born February 15, 1928) (nicknamed Bambi by some Cuban exiles)[1] is a Cuban-born Venezuelan anti-communist extremist. A former Central Intelligence Agency agent,[2] Posada has been convicted in absentia of involvement in various terrorist attacks and plots in the Americas, including: involvement in the 1976 bombing of a Cuban airliner that killed seventy-three people;[3][4] admitted involvement in a string of bombings in 1997 targeting fashionable Cuban hotels and nightspots;[5][6][7] involvement in the Bay of Pigs invasion; [and] involvement in the Iran-Contra affair…
Luis Posada Carriles is so evil that even the Bush administration wanted him behind bars:
In 2005, Posada was held by U.S. authorities in Texas on the charge of illegal presence on national territory before the charges were dismissed on May 8, 2007. On September 28, 2005 a U.S. immigration judge ruled that Posada cannot be deported, finding that he faces the threat of torture in Venezuela.[11] His release on bail on April 19, 2007 had elicited angry reactions from the Cuban and Venezuelan governments.[12] The U.S. Justice Department had urged the court to keep him in jail because he was “an admitted mastermind of terrorist plots and attacks”, a flight risk and a danger to the community.[7]
Who is Julian Assange’s chief accuser in Sweden? She’s a gender equity officer at Uppsula University – who chose to associate with a US funded group openly supported by a convicted terrorist and mass murderer. She just happens to have her work published by a very well funded group connected with Union Liberal Cubana – whose leader, Carlos Alberto Montaner, in turn just happened to pop up on right wing Colombian TV a few hours after the right-wing coup in Honduras. Where he joined the leader of the failed coup in Ecuador to savage Correa, the target of the coup. Montnaner also just happened to vociferously support the violent coup in Honduras, and chose to show up to sing the praises of the Honduran junta. Jean-Guy Allard, a retired Canadian journalist who now writes for Cuba’s Gramma, captured the moment
A strange pair appeared on NTN 24, the right-wing Colombian television channel aligned to the Fox Broadcasting Company the U.S. A few hours after the coup attempt in Quito, Ecuador, CIA agent Carlos Alberto Montaner, a fugitive from Cuban justice for acts of terrorism, joined with one of the leaders of the failed Ecuadorian coup, ex-Lieutenant Colonel Lucio Gutiérrez, to attack President Rafael Correa…
On the margin of his media news shows, Montaner’s is known for his fanatic support of the most extreme elements of the Cuban-American mafia.
Last year, in the wake of the coup d’état against Honduran President Manuel Zelaya, June 28, he became an fervent supporter of the dictator Roberto Micheletti, along with U.S. Congresswoman Ileana Ros-Lehtinen, and another Cuban-American terrorist and CIA collaborator, Armando Valladares.
Montaner showed up repeatedly in Tegucigalpa to “defend human rights,” and at the same time to applaud the fascist Honduran regime when it unleashed its police on demonstrations by the National Resistance Front.
Apparently having consensual sex in Sweden without a condom is punishable by a term of imprisonment of a minimum of two years for rape. That is the basis for a reinstitution of rape charges against WikiLeaks figurehead Julian Assange that is destined to make Sweden and its justice system the laughing stock of the world and dramatically damage its reputation as a model of modernity.
Sweden’s Public Prosecutor’s Office was embarrassed in August this year when it leaked to the media that it was seeking to arrest Assange for rape, then on the same day withdrew the arrest warrant because in its own words there was “no evidence”. The damage to Assange’s reputation is incalculable. More than three quarters of internet references to his name refer to rape. Now, three months on and three prosecutors later, the Swedes seem to be clear on their basis to proceed. Consensual sex that started out with a condom ended up without one, ergo, the sex was not consensual.
I’ve spent much of my professional life as a psychiatrist helping women (and men) who are survivors of sexual violence. Rape is a hideous crime. Yet in Assange’s case his alleged victim – the gender equity officer at Uppsala University – chose to throw a party for her alleged assailant – after they’d had the sex that even Swedish prosecutors concede was consensual. Barrister Caitlin again:
In the case of Ardin it is clear that she has thrown a party in Assange’s honour at her flat after the “crime” and tweeted to her followers that she is with the “the world’s coolest smartest people, it’s amazing!”. Go on the internet and see for yourself. That Ardin has sought unsuccessfully to delete these exculpatory tweets from the public record should be a matter of grave concern. That she has published on the internet a guide on how to get revenge on cheating boyfriends ever graver. The exact content of Wilén’s mobile phone texts is not yet known but their bragging and exculpatory character has been confirmed by Swedish prosecutors. Neither Wilén’s nor Ardin’s texts complain of rape.
Small world, isn’t it? Julian Assange is the human face of Wikileaks – the organization that’s enabled whistle-blowers to reveal hideous war crimes and expose much of America’s foreign policy to the world.
He just happens to meet a Swedish woman who just happens to have been publishing her work in a well-funded anti-Castro group that just happens to have links with a group led by a man at least one journalist describes as an agent of the CIA: the violent secret arm of America’s foreign policy.
And she just happens to have been expelled from Cuba, which just happens to be the global symbol of successful defiance of American foreign policy.
And – despite her work in Sweden upholding the human right of gender equity – in Cuba she just happens to end up associating with a group openly supported by an admitted CIA agent who himself committed mass murder when he actively participated in the terrorist bombing of a jetliner carrying a Cuban sports team…an act that was of a piece with America’s secret foreign policy of violent attacks against Cuban state interests.
And now she just happens – after admittedly consensual sex – to have gone to Swedish authorities to report the sex ended without a condom…which just happens to be the pretext for Interpol to issue a “Red Notice” informing the world’s police forces of charges against Julian Assange.
Who just happens to be the man America’s political class – the people who run America’s foreign policy – have been trying to silence. And who happens to be the man some of them have been calling to have murdered.
With a lust for vengeance like that, one could be forgiven for concluding they’ve just happened to have taken a page from Anna’s revenge manual.
It has come to our attention that a NATO draft report has classified Anonymous a potential „threat to member states’ security”, and that you seek retaliation against us.
It is true that Anonymous has committed what you would call ‘cyber-attacks’ in protest against several military contractors, companies, lawmakers, and governments, and has continuously sought to fight against threats to our freedoms on the Internet. And since you consider state control of the Internet to be in the best interest of the various nations of your military alliance, you therefore consider us a potential threat to international security. (more…)