Vault 7: CIA Hacking Tools Revealed

Ed. Note: Me thinks it’s time for the residents of the US wake-up and unite to entirely dismantle the CIA and re-purpose some of their tech for positive purposes. Like monitoring our public servants, corporate structures and military industrial complex to ensure they’re SERVING the public good. Blessings, {~A~}

Press Release

Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named “Vault 7” by WikiLeaks, it is the largest ever publication of confidential documents on the agency.

The first full part of the series, “Year Zero”, comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

“Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.

Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency’s hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA’s hacking capacities.

By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.

In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

Julian Assange, WikiLeaks editor stated that “There is an extreme proliferation risk in the development of cyber ‘weapons’. Comparisons can be drawn between the uncontrolled proliferation of such ‘weapons’, which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of “Year Zero” goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective.”

Wikileaks has carefully reviewed the “Year Zero” disclosure and published substantive CIA documentation while avoiding the distribution of ‘armed’ cyberweapons until a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should analyzed, disarmed and published.

Wikileaks has also decided to redact and anonymise some identifying information in “Year Zero” for in depth analysis. These redactions include ten of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States. While we are aware of the imperfect results of any approach chosen, we remain committed to our publishing model and note that the quantity of published pages in “Vault 7” part one (“Year Zero”) already eclipses the total number of pages published over the first three years of the Edward Snowden NSA leaks.



CIA malware targets iPhone, Android, smart TVs

CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA’s DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).

The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.

The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell’s 1984, but “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

The attack against Samsung smart TVs was developed in cooperation with the United Kingdom’s MI5/BTSS. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

The CIA’s Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone.

Despite iPhone’s minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA’s Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA’s arsenal includes numerous local and remote “zero days” developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.

A similar unit targets Google’s Android which is used to run the majority of the world’s smart phones (~85%) including Samsung, HTC and Sony. 1.15 billion Android powered phones were sold last year. “Year Zero” shows that as of 2016 the CIA had 24 “weaponized” Android “zero days” which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors.

These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the “smart” phones that they run on and collecting audio and message traffic before encryption is applied.


CIA malware targets Windows, OSx, Linux, routers

The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized “zero days”, air gap jumping viruses such as “Hammer Drill” which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( “Brutal Kangaroo”) and to keep its malware infestations going.

Many of these infection efforts are pulled together by the CIA’s Automated Implant Branch (AIB), which has developed several attack systems for automated infestation and control of CIA malware, such as “Assassin” and “Medusa”.

Attacks against Internet infrastructure and webservers are developed by the CIA’s Network Devices Branch (NDB).

The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB’s “HIVE” and the related “Cutthroat” and “Swindle” tools, which are described in the examples section below.


CIA ‘hoarded’ vulnerabilities (“zero days”)

In the wake of Edward Snowden’s leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or “zero days” to Apple, Google, Microsoft, and other US-based manufacturers.

Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others.

The U.S. government’s commitment to the Vulnerabilities Equities Process came after significant lobbying by US technology companies, who risk losing their share of the global market over real and perceived hidden vulnerabilities. The government stated that it would disclose all pervasive vulnerabilities discovered after 2010 on an ongoing basis.

“Year Zero” documents show that the CIA breached the Obama administration’s commitments. Many of the vulnerabilities used in the CIA’s cyber arsenal are pervasive and some may already have been found by rival intelligence agencies or cyber criminals.

As an example, specific CIA malware revealed in “Year Zero” is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts. The CIA attacks this software by using undisclosed security vulnerabilities (“zero days”) possessed by the CIA but if the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability. As long as the CIA keeps these vulnerabilities concealed from Apple and Google (who make the phones) they will not be fixed, and the phones will remain hackable.

The same vulnerabilities exist for the population at large, including the U.S. Cabinet, Congress, top CEOs, system administrators, security officers and engineers. By hiding these security flaws from manufacturers like Apple and Google the CIA ensures that it can hack everyone &mdsh; at the expense of leaving everyone hackable.


‘Cyberwar’ programs are a serious proliferation risk

Cyber ‘weapons’ are not possible to keep under effective control.

While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber ‘weapons’, once developed, are very hard to retain.

Cyber ‘weapons’ are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.

Securing such ‘weapons’ is particularly difficult since the same people who develop and use them have the skills to exfiltrate copies without leaving traces — sometimes by using the very same ‘weapons’ against the organizations that contain them. There are substantial price incentives for government hackers and consultants to obtain copies since there is a global “vulnerability market” that will pay hundreds of thousands to millions of dollars for copies of such ‘weapons’. Similarly, contractors and companies who obtain such ‘weapons’ sometimes use them for their own purposes, obtaining advantage over their competitors in selling ‘hacking’ services.

Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booz Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.

A number of intelligence community members not yet publicly named have been arrested or subject to federal criminal investigations in separate incidents.

Most visibly, on February 8, 2017 a U.S. federal grand jury indicted Harold T. Martin III with 20 counts of mishandling classified information. The Department of Justice alleged that it seized some 50,000 gigabytes of information from Harold T. Martin III that he had obtained from classified programs at NSA and CIA, including the source code for numerous hacking tools.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.


U.S. Consulate in Frankfurt is a covert CIA hacker base

In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa.

CIA hackers operating out of the Frankfurt consulate ( “Center for Cyber Intelligence Europe” or CCIE) are given diplomatic (“black”) passports and State Department cover. The instructions for incoming CIA hackers make Germany’s counter-intelligence efforts appear inconsequential: “Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport”

Your Cover Story (for this trip)
Q: Why are you here?
A: Supporting technical consultations at the Consulate.

Two earlier WikiLeaks publications give further detail on CIA approaches to customs and secondary screening procedures.

Once in Frankfurt CIA hackers can travel without further border checks to the 25 European countries that are part of the Shengen open border area — including France, Italy and Switzerland.

A number of the CIA’s electronic attack methods are designed for physical proximity. These attack methods are able to penetrate high security networks that are disconnected from the internet, such as police record database. In these cases, a CIA officer, agent or allied intelligence officer acting under instructions, physically infiltrates the targeted workplace. The attacker is provided with a USB containing malware developed for the CIA for this purpose, which is inserted into the targeted computer. The attacker then infects and exfiltrates data to removable media. For example, the CIA attack system Fine Dining, provides 24 decoy applications for CIA spies to use. To witnesses, the spy appears to be running a program showing videos (e.g VLC), presenting slides (Prezi), playing a computer game (Breakout2, 2048) or even running a fake virus scanner (Kaspersky, McAfee, Sophos). But while the decoy application is on the screen, the underlaying system is automatically infected and ransacked.


How the CIA dramatically increased proliferation risks

In what is surely one of the most astounding intelligence own goals in living memory, the CIA structured its classification regime such that for the most market valuable part of “Vault 7” — the CIA’s weaponized malware (implants + zero days), Listening Posts (LP), and Command and Control (C2) systems — the agency has little legal recourse.

The CIA made these systems unclassified.

Why the CIA chose to make its cyberarsenal unclassified reveals how concepts developed for military use do not easily crossover to the ‘battlefield’ of cyber ‘war’.

To attack its targets, the CIA usually requires that its implants communicate with their control programs over the internet. If CIA implants, Command & Control and Listening Post software were classified, then CIA officers could be prosecuted or dismissed for violating rules that prohibit placing classified information onto the Internet. Consequently the CIA has secretly made most of its cyber spying/war code unclassified. The U.S. government is not able to assert copyright either, due to restrictions in the U.S. Constitution. This means that cyber ‘arms’ manufactures and computer hackers can freely “pirate” these ‘weapons’ if they are obtained. The CIA has primarily had to rely on obfuscation to protect its malware secrets.

Conventional weapons such as missiles may be fired at the enemy (i.e into an unsecured area). Proximity to or impact with the target detonates the ordnance including its classified parts. Hence military personnel do not violate classification rules by firing ordnance with classified parts. Ordnance will likely explode. If it does not, that is not the operator’s intent.

Over the last decade U.S. hacking operations have been increasingly dressed up in military jargon to tap into Department of Defense funding streams. For instance, attempted “malware injections” (commercial jargon) or “implant drops” (NSA jargon) are being called “fires” as if a weapon was being fired. However the analogy is questionable.

Unlike bullets, bombs or missiles, most CIA malware is designed to live for days or even years after it has reached its ‘target’. CIA malware does not “explode on impact” but rather permanently infests its target. In order to infect target’s device, copies of the malware must be placed on the target’s devices, giving physical possession of the malware to the target. To exfiltrate data back to the CIA or to await further instructions the malware must communicate with CIA Command & Control (C2) systems placed on internet connected servers. But such servers are typically not approved to hold classified information, so CIA command and control systems are also made unclassified.

A successful ‘attack’ on a target’s computer system is more like a series of complex stock maneuvers in a hostile take-over bid or the careful planting of rumors in order to gain control over an organization’s leadership rather than the firing of a weapons system. If there is a military analogy to be made, the infestation of a target is perhaps akin to the execution of a whole series of military maneuvers against the target’s territory including observation, infiltration, occupation and exploitation.


Evading forensics and anti-virus

A series of standards lay out CIA malware infestation patterns which are likely to assist forensic crime scene investigators as well as Apple, Microsoft, Google, Samsung, Nokia, Blackberry, Siemens and anti-virus companies attribute and defend against attacks.

“Tradecraft DO’s and DON’Ts” contains CIA rules on how its malware should be written to avoid fingerprints implicating the “CIA, US government, or its witting partner companies” in “forensic review”. Similar secret standards cover the use of encryption to hide CIA hacker and malware communication (pdf), describing targets & exfiltrated data (pdf) as well as executing payloads (pdf) and persisting (pdf) in the target’s machines over time.CIA hackers developed successful attacks against most well known anti-virus programs. These are documented in AV defeats, Personal Security Products, Detecting and defeating PSPs and PSP/Debugger/RE Avoidance. For example, Comodo was defeated by CIA malware placing itself in the Window’s “Recycle Bin”. While Comodo 6.x has a “Gaping Hole of DOOM”.

CIA hackers discussed what the NSA’s “Equation Group” hackers did wrong and how the CIA’s malware makers could avoid similar exposure.




The CIA’s Engineering Development Group (EDG) management system contains around 500 different projects (only some of which are documented by “Year Zero”) each with their own sub-projects, malware and hacker tools.

The majority of these projects relate to tools that are used for penetration, infestation (“implanting”), control, and exfiltration.

Another branch of development focuses on the development and operation of Listening Posts (LP) and Command and Control (C2) systems used to communicate with and control CIA implants; special projects are used to target specific hardware from routers to smart TVs.

Some example projects are described below, but see the table of contents for the full list of projects described by WikiLeaks’ “Year Zero”.



The CIA’s hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a “fingerprint” that can be used by forensic investigators to attribute multiple different attacks to the same entity.

This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.

The CIA’s Remote Devices Branch‘s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.

UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.


Fine Dining

Fine Dining comes with a standardized questionnaire i.e menu that CIA case officers fill out. The questionnaire is used by the agency’s OSB (Operational Support Branch) to transform the requests of case officers into technical requirements for hacking attacks (typically “exfiltrating” information from computer systems) for specific operations. The questionnaire allows the OSB to identify how to adapt existing tools for the operation, and communicate this to CIA malware configuration staff. The OSB functions as the interface between CIA operational staff and the relevant technical support staff.

Among the list of possible targets of the collection are ‘Asset’, ‘Liason Asset’, ‘System Administrator’, ‘Foreign Information Operations’, ‘Foreign Intelligence Agencies’ and ‘Foreign Government Entities’. Notably absent is any reference to extremists or transnational criminals. The ‘Case Officer’ is also asked to specify the environment of the target like the type of computer, operating system used, Internet connectivity and installed anti-virus utilities (PSPs) as well as a list of file types to be exfiltrated like Office documents, audio, video, images or custom file types. The ‘menu’ also asks for information if recurring access to the target is possible and how long unobserved access to the computer can be maintained. This information is used by the CIA’s ‘JQJIMPROVISE’ software (see below) to configure a set of CIA malware suited to the specific needs of an operation.



‘Improvise’ is a toolset for configuration, post-processing, payload setup and execution vector selection for survey/exfiltration tools supporting all major operating systems like Windows (Bartender), MacOS (JukeBox) and Linux (DanceFloor). Its configuration utilities like Margarita allows the NOC (Network Operation Center) to customize tools based on requirements from ‘Fine Dining’ questionairies.



HIVE is a multi-platform CIA malware suite and its associated control software. The project provides customizable implants for Windows, Solaris, MikroTik (used in internet routers) and Linux platforms and a Listening Post (LP)/Command and Control (C2) infrastructure to communicate with these implants.

The implants are configured to communicate via HTTPS with the webserver of a cover domain; each operation utilizing these implants has a separate cover domain and the infrastructure can handle any number of cover domains.

Each cover domain resolves to an IP address that is located at a commercial VPS (Virtual Private Server) provider. The public-facing server forwards all incoming traffic via a VPN to a ‘Blot’ server that handles actual connection requests from clients. It is setup for optional SSL client authentication: if a client sends a valid client certificate (only implants can do that), the connection is forwarded to the ‘Honeycomb’ toolserver that communicates with the implant; if a valid certificate is missing (which is the case if someone tries to open the cover domain website by accident), the traffic is forwarded to a cover server that delivers an unsuspicious looking website.

The Honeycomb toolserver receives exfiltrated information from the implant; an operator can also task the implant to execute jobs on the target computer, so the toolserver acts as a C2 (command and control) server for the implant.

Similar functionality (though limited to Windows) is provided by the RickBobby project.

See the classified user and developer guides for HIVE. 

Frequently Asked Questions


Why now?

WikiLeaks published as soon as its verification and analysis were ready.

In Febuary the Trump administration has issued an Executive Order calling for a “Cyberwar” review to be prepared within 30 days.

While the review increases the timeliness and relevance of the publication it did not play a role in setting the publication date.



Names, email addresses and external IP addresses have been redacted in the released pages (70,875 redactions in total) until further analysis is complete.

  1. Over-redaction: Some items may have been redacted that are not employees, contractors, targets or otherwise related to the agency, but are, for example, authors of documentation for otherwise public projects that are used by the agency.
  2. Identity vs. person: the redacted names are replaced by user IDs (numbers) to allow readers to assign multiple pages to a single author. Given the redaction process used a single person may be represented by more than one assigned identifier but no identifier refers to more than one real person.
  3. Archive attachments (zip, tar.gz, …) are replaced with a PDF listing all the file names in the archive. As the archive content is assessed it may be made available; until then the archive is redacted.
  4. Attachments with other binary content are replaced by a hex dump of the content to prevent accidental invocation of binaries that may have been infected with weaponized CIA malware. As the content is assessed it may be made available; until then the content is redacted.
  5. The tens of thousands of routable IP addresses references (including more than 22 thousand within the United States) that correspond to possible targets, CIA covert listening post servers, intermediary and test systems, are redacted for further exclusive investigation.
  6. Binary files of non-public origin are only available as dumps to prevent accidental invocation of CIA malware infected binaries.


Organizational Chart

The organizational chart corresponds to the material published by WikiLeaks so far.

Since the organizational structure of the CIA below the level of Directorates is not public, the placement of the EDG and its branches within the org chart of the agency is reconstructed from information contained in the documents released so far. It is intended to be used as a rough outline of the internal organization; please be aware that the reconstructed org chart is incomplete and that internal reorganizations occur frequently.


Wiki pages

“Year Zero” contains 7818 web pages with 943 attachments from the internal development groupware. The software used for this purpose is called Confluence, a proprietary software from Atlassian. Webpages in this system (like in Wikipedia) have a version history that can provide interesting insights on how a document evolved over time; the 7818 documents include these page histories for 1136 latest versions.

The order of named pages within each level is determined by date (oldest first). Page content is not present if it was originally dynamically created by the Confluence software (as indicated on the re-constructed page).


What time period is covered?

The years 2013 to 2016. The sort order of the pages within each level is determined by date (oldest first).

WikiLeaks has obtained the CIA’s creation/last modification date for each page but these do not yet appear for technical reasons. Usually the date can be discerned or approximated from the content and the page order. If it is critical to know the exact time/date contact WikiLeaks.


What is “Vault 7”

“Vault 7” is a substantial collection of material about CIA activities obtained by WikiLeaks.


When was each part of “Vault 7” obtained?

Part one was obtained recently and covers through 2016. Details on the other parts will be available at the time of publication.


Is each part of “Vault 7” from a different source?

Details on the other parts will be available at the time of publication.


What is the total size of “Vault 7”?

The series is the largest intelligence publication in history.


How did WikiLeaks obtain each part of “Vault 7”?

Sources trust WikiLeaks to not reveal information that might help identify them.


Isn’t WikiLeaks worried that the CIA will act against its staff to stop the series?

No. That would be certainly counter-productive.


Has WikiLeaks already ‘mined’ all the best stories?

No. WikiLeaks has intentionally not written up hundreds of impactful stories to encourage others to find them and so create expertise in the area for subsequent parts in the series. They’re there. Look. Those who demonstrate journalistic excellence may be considered for early access to future parts.


Won’t other journalists find all the best stories before me?

Unlikely. There are very considerably more stories than there are journalists or academics who are in a position to write them.


Evidence grows for secret space program disclosures & crimes against humanity trials

Written by Dr Michael Salla on June 28, 2015

Circumstantial Evidence and SSPs1

Over the last few months there have been incredible claims about multiple secret space programs, extraterrestrial intervention, and future massive document dumps that will lead to trials against those that have committed crimes against humanity. To date, no physical evidence or documents have been offered to substantiate these claims, yet there is a compelling body circumstantial evidence that does support them. This evidence makes it very possible that humanity will soon witness massive document dumps disclosing secret space programs along with the existence of extraterrestrial life, followed soon after by Nuremberg-like war crime trials.

On May 30, Corey Goode (aka GoodETxSG) claims that he had received the go ahead from both a Secret Space Program Alliance, and a Sphere Alliance of five extraterrestrial races, to publicly reveal the truth about the darker side of human trafficking and exploitation in secret space programs. Goode revealed in great detail these practices and the organizations responsible for them. These disturbing disclosures were followed soon after by a series of meetings from June 5-9 involving the main parties from different secret space programs who were discussing ways to minimize large scale armed hostilities while humanity is prepared for the truth about these programs existence and extraterrestrial life.

Goode says he attended these meetings as a delegate for the Sphere Being Alliance and was accompanied by a Lt Col Gonzales (pseudonym) who was the delegate for the Secret Space Program Alliance. At the third meeting involving a “Committee of 200” and other global elites that was held on June 9, only two days before the 2015 Bilderberg Group meeting, an extraordinary offer was made.  The Committee of 200 wanted to start a limited disclosure program in November 2015, and provide legal amnesty for 50 years for those responsible for crimes. While the offer was turned down, it reveals the great fear that the global elite have of being exposed and prosecuted for their roles in human trafficking and slave labor.

Subsequently, an offer was made by one of the secret space programs associated with the global elites called the Interplanetary Corporate Conglomerate to give an inspection tour of one of their Mars facilities. The offer was done in order to respond to accusations that slave labor was used at ICC facilities. After terms and conditions for the inspection tour were agreed upon, Goode and Gonzales traveled to Mars to conduct an inspection tour on June 20. Goode published his report of the tour two days later substantiating accusations that slave labor was indeed being used; and the facility was run by a megalomaniac commander who subverted all agreements and imprisoned dissenters.

Recent events provide circumstantial evidence supporting Goode’s claims that the global elite are very concerned about massive document releases revealing secret space programs, and crimes committed in these programs that lead to arrests and Nuremberg-like war crimes trials. It is worth pointing out that circumstantial evidence is admissible in courts of law where direct evidence is lacking.  Circumstantial evidence together with direct eyewitness testimony, as given by Corey Goode, is sufficient to convince juries of guilt or innocence in cases so it’s important to consider this type of evidence  in relation to Goode’s claims.

The first circumstantial evidence to consider is that on June 15, the U.S. House of Representatives took a major step in passing a bill that provides legal protection to space mining by U.S. based corporations that establish off-world operations.  The “Space Resource Exploration and Utilization Act” will protect corporations “from harmful interference” and “discourage government barriers” to their space operations. If eventually signed by President Obama, the owners and managers of space mining operations would be protected under U.S. Federal Law from international organizations such as the International Criminal Court investigating them for using slave labor and other crimes against humanity. Such accusations would have to be heard in U.S. district courts which are not a suitable venue for fully investigating or hearing cases of crimes against humanity. Judges and juries in U.S. district courts can be more easily influenced than judicial bodies such as the International Criminal Court.

The timing of this bill does raise the possibility that it is orchestrated by a global corporate elite concerned about impending criminal prosecution for past and current space mining operations. The Space Resource Exploration and Utilization Act’s submission is compelling circumstantial evidence in support in Goode’s claim that “crimes against humanity” trials are being secretly being prepared.


TPP – Wikileaks has released another bombshell ~ Thom Hartman, Mike Papantonio

Mike Papantonio, Ring of Fire Radio joins Thom Hartmann. Wikileaks has released another bombshell – this time publishing a portion of text from the secretly negotiated Trans Pacific Partnership. Now that the text is out in the open – will lawmakers in Washington finally realize how devastating the TPP is to the American economy?


Why Is an Investigative Journalist in Jail for Doing His Job?

Barrett Brown appears to be unfairly targeted for daring to investigate the highly secretive world of private intelligence and military contractors.

Journalist Barrett Brown spent his 300th day behind bars this week on a range of charges filed after he used information obtained by the hacker group Anonymous to report on the operations of private intelligence firms. Brown faces 17 charges ranging from threatening an FBI agent to credit card fraud for posting a link online to a document that contained stolen credit card data. But according to his supporters, Brown is being unfairly targeted for daring to investigate the highly secretive world of private intelligence and military contractors. Using information Anonymous took from the firm HBGary Federal, Brown helped discover a secret plan to tarnish the reputations of WikiLeaks and journalist Glenn Greenwald of The Guardian. Brown similarly analyzed and wrote about the millions of internal company emails from Stratfor Global Intelligence that were leaked in 2011. 

JUAN GONZÁLEZ: As NSA leaker Edward Snowden remains at a Moscow airport, Army whistleblower Bradley Manning is on trial, and WikiLeaks founder Julian Assange is holed up in the Ecuadorean embassy in London, today we look at the strange story of another man tied to the world of cyber-activism who faces over a hundred years in prison. His name is Barrett Brown. He’s an investigative reporter with ties to the hacking collective Anonymous. He has spent the past 300 days in jail and has been denied bail. He faces 17 charges, ranging from threatening anFBI agent to credit card fraud for posting a link online to a document that contained stolen credit card data. But according to his supporters, Brown is being unfairly targeted for daring to investigate the highly secretive world of private intelligence and military contractors.

AMY GOODMAN: Before Brown’s path crossed with the FBI, he frequently contributed to Vanity FairThe Huffington PostThe Guardian and other news outlets. In 2009, Brown created Project PM, which was, quote, “dedicated to investigating private government contractors working in the secretive fields of cybersecurity, intelligence and surveillance.” He was particularly interested in the documents leaked by WikiLeaks and Anonymous. In the documentary We Are Legion, Barrett Brown explains the importance of information obtained by hackers.

BARRETT BROWN: Some of the most important things that have been—have had the most far-reaching influence and have been the most important in terms of what’s been discovered, not just by Anonymous, but by the media in the aftermath, is the result of hacking. That information can’t be obtained by institutional journalistic process, or it can’t be obtained or won’t be obtained by a congressional committee or a federal oversight committee. For the most part, that information has to be, you know, obtained by hackers.

AMY GOODMAN: In 2011, the group Anonymous hacked into the computer system of the private security firm HBGary Federal and disclosed thousands of internal emails. Barrett Brown has not been accused of being involved in the hack, but he did read and analyze the documents, eventually crowdsourcing the effort through Project PM. One of the first things he discovered was a plan to tarnish the reputations of WikiLeaks and sympathetic journalist Glenn Greenwald of The Guardian. Brown similarly analyzed and wrote about the millions of internal company emails for Stratfor Global Intelligence that were leaked on Christmas Eve 2011. Shortly thereafter, the FBI acquired a warrant for Brown’s laptop and authority to seize any information from his communications—or, in journalism parlance, his sources. In September 2012, a troupe of armed agents surged into Brown’s apartment in Dallas, Texas, and handcuffed him face down on the floor. He has been in prison ever since.

JUAN GONZÁLEZ: Well, for more, we’re joined by Peter Ludlow, professor of philosophy at Northwestern University. He has written extensively on hacktivist actions against people—against private intelligence firms and the surveillance state. His recent article for The Nation is called “The Strange Case of Barrett Brown.”

Peter Ludlow, welcome to Democracy Now!

PETER LUDLOW: Hi. Thank you very much.

JUAN GONZÁLEZ: Talk to us about Barrett Brown, the importance of his case, given all the others that we’ve been dealing with on this show now for many years.

PETER LUDLOW: Well, yeah, it’s important for two reasons. First of all, it’s showing that, to some extent, all of us could be targets, because the principal reasons that they’re going after him with this sort of claim that he was involved in credit card fraud or something like that, I mean, that’s completely fallacious. I mean, in effect, what he did was take a link from a chat room and copied that link and pasted it into the chat room for Project PM. That is, he took a link that was broadcast widely on the Internet, and it was a link to the Stratfor hack information, and he just brought it to the attention of the editorial board of Project PM. And because there were, for whatever reason, unencrypted credit card numbers and validation codes among those five million other emails, the government is claiming that he was engaged in credit card fraud. They’re claiming that Project PM was a criminal enterprise. And so, basically, for our interest, why this is interesting to us is basically it makes this dangerous to even link to something or to share a link with someone.


PETER LUDLOW: Go ahead, yeah, please.

JUAN GONZÁLEZ: Well, one of the things that you raise is, in some of your writings on this, is the incestuous relationship between the Justice Department, the government and these private firms that are being now targeted by cyber-activists. And could you talk about that, as well?

PETER LUDLOW: Well, sure. A lot of these private intelligence companies are started by ex-CIA,NSA people. Some people come from those agencies and rotate back into the government. I mean, you even see, with the case of Snowden, he was actually a contractor for a private intelligence company, Booz Allen. And, I mean, people think about the NSAFBICIA, and they think of—those are the people that are doing the surveillance of you and doing this intelligence work, but really, if you look at how much the United States spends on intelligence, 70 percent of that is actually going to these private intelligence contractors. So, you know, if you add up CIANSAFBI, that’s just a tip of the iceberg. So there’s all this sort of spook stuff going on in the private realm. And, yeah, right, a lot of it is very incestuous. There’s a revolving door. And no one is investigating it or even talking about it, as far as I can tell.

AMY GOODMAN: Let’s go to Barrett Brown in his own words. In March 2012, Democracy Now!spoke with Barrett soon after his house was raided.

BARRETT BROWN: On March 5th, I received a tip that I was about to be raided by theFBI. I left my apartment here in Dallas, went to my mom’s residence here in the same city. Next morning, three FBI agents arrived at my mom’s place. I went out and talked to them. They said my apartment had just been raided. The door was damaged. They would take care of that. And that they also asked me if I had any laptops with me that I wanted to give them. I said no.

A few hours later, the FBI returned to my mom’s house with another warrant, this time for her house, and detained the both of us for three hours while they searched the residence. They found several laptops I had stashed somewhere in the house and left the search warrants and left another one in my apartment, which I got when I came back here a little after, the next day or so.

The warrants themselves refer to the information that they’re seeking as regarding Anonymous, of course, a few other things of that nature, and also two companies: HBGary and Endgame Systems. Both of these are intelligence contracting companies that Anonymous had a run-in with in February of 2011, during which a number of emails were taken from HBGary, in particular, which themselves revealed a number of conspiracies being perpetuated by those companies in conjunction with Justice Department and several other institutions, including Bank of America, against WikiLeaks and against several journalists.

The time since, I’ve spent a lot of time going over those emails, researching them, conducting other research, otherwise trying to expose a number of things that have been discovered by virtue of those emails from HBGary having been taken. I sincerely believe that my activities on that front contributed to me being raided the other day and will no doubt contribute to any further action that the FBI decides to take. I would just also note the Justice Department itself is very much intertwined with this issue, and has been for a while, and in no way can conduct a fair investigation against me, based on what I’ve revealed, what I’ve helped to sort of emphasize about them.

AMY GOODMAN: That was Barrett Brown in his own words just after the raid.


AMY GOODMAN: Peter Ludlow, talk about what he had released. Talk about what he got from HBGary and how this links to Glenn Greenwald.

PETER LUDLOW: Sure. Well, what they uncovered was—I mean, it’s actually a little bit subtle, right? Because it begins with the Bank of America being concerned that WikiLeaks had information on it. Bank of America goes to the United States Department of Justice. The Department of Justice leads them to Hunton & Williams, the big law fix-it firm in the D.C. area, who in turn hooks them up with a group of private intelligence contractors that went under the umbrella Team Themis. And Team Themis had a number of proposals and projects that were exposed in all of this. They included running kind of a psyops operation against the Chamber Watch, which is a group that sort of monitors the Chamber of Commerce, and it was an attempt to undermine it and Glenn Greenwald and other individuals. And, I mean, there were many, many plans that they had, many, many things, but some of the documents released showed that they were saying they were going to create fake documents, leak them to Greenwald, and then, when Greenwald eventually released them, they would expose it as a fraud and attempt to undermine him in that way. And they had a similar plan for Chamber Watch, as well.

JUAN GONZÁLEZ: And their concern with Greenwald was that he was giving—that his defense of WikiLeaks was giving legitimacy to WikiLeaks—

PETER LUDLOW: That was—yeah. That was the concern.

JUAN GONZÁLEZ: —it didn’t deserve.

PETER LUDLOW: That was the concern, yeah. And they actually said in there, “Well, he’s just a professional journalist, and he’ll fold under pressure immediately. I mean, apparently they were wrong about that. So, yeah.

JUAN GONZÁLEZ: There were also emails found where these private security firms were assessing the damage that Jeremy Scahill’s books had done to Blackwater?

PETER LUDLOW: Well, actually, those—I ran across that in the Stratfor leaks, and that was kind of interesting, because they were monitoring—they were monitoring this because they were concerned that Blackwater was going to get into the private intelligence business themselves. And they were commenting on Scahill. They go, “Well, yeah, Scahill, you know, I don’t care much for his politics, but he’s really got these guys figured out, yeah?” So that was a little compliment for Scahill, I think.

JUAN GONZÁLEZ: But the amazing thing in all of this is the degree to which these private security firms are engaging in attempts to influence what’s going on in the public debate on—


JUAN GONZÁLEZ: —on intelligence.

PETER LUDLOW: Oh, yeah, yeah. I mean, one of the most crazy things in the whole thing was when Coca-Cola approached Stratfor, and they were concerned about PETA, you know, People for the Ethical Treatment of Animals. And why, I’m not entirely sure, but one of the people in Stratfor said, “Well, the FBI has a classified file on PETA. I’ll see if I can get it for you.” Now, that little story sums up a lot of stuff that’s wrong about this. First of all, why are private—why is Coca-Cola going to a private intelligence company for this? Why is—why did the private intelligence company feel that they had immediate access to a classified file by the FBI? And why did the FBI have a classified file, to begin with? I mean—but, to me, the creepiest part of that very creepy little story is the fact that the guy at Stratfor felt that he had access to this classified file by the FBI. And the Barrett Brown case revealed something like this, as well. It’s almost like the FBI has become just another private security firm, that it’s become like a private cop for these companies, as it were. And, I mean, that’s part because of the revolving door. It’s part because they get pressed into service for companies that want inside information on activist organizations like PETA.

AMY GOODMAN: We’re going to take break—


AMY GOODMAN: —and then come back to this conversation. We’re talking to Peter Ludlow, professor of philosophy at Northwestern University, has written extensively on hacktivist actions against private intelligence firms. The piece he most recently wrote is for The Nation, and it’s called “The Strange Case of Barrett Brown.” When we come back, I want to ask you how it’s possible he faces a hundred years in prison.


AMY GOODMAN: It makes us think about Aaron Swartz.


AMY GOODMAN: He didn’t face anything like that, but he faced decades in prison.


AMY GOODMAN: He ultimately committed suicide—

PETER LUDLOW: Yeah, yeah.

AMY GOODMAN: —before prosecution. Stay with us.


AMY GOODMAN: Peter Ludlow is our guest, a professor of philosophy at Northwestern University, has been tracking the case of Barrett Brown and wrote a Nation piece about him, “The Strange Case of Barrett Brown.” So, the FBI raids his home, and he ultimately is arrested. He faces 100 years in prison?

PETER LUDLOW: Yeah, if you add up all the charges and if he serves them sequentially, it will be 105 years in prison. Yeah, that’s right.

JUAN GONZÁLEZ: And the decision for no bail?

PETER LUDLOW: That’s a mystery to me.

AMY GOODMAN: He’s been in jail now for 300 days.

PETER LUDLOW: Three hundred days, yeah, over 300 days, no bail. For a while they were—they had frozen his—the contributions to his legal fund, too.

AMY GOODMAN: Well, that sounds like WikiLeaks.


AMY GOODMAN: Meaning that’s what happened to Wiki—well, WikiLeaks, they had all these different corporations like PayPal refuse to allow money to go to them.

PETER LUDLOW: Yeah, right.

AMY GOODMAN: Let’s go to an interview Barrett Brown did with NBC’s Michael Isikoff serving as a spokesperson for Anonymous.

BARRETT BROWN: Our people break laws, just like all people break laws. When we break laws, we do so in the service of civil disobedience. We do so ethically. We do it against targets who have asked for it.

MICHAEL ISIKOFF: You go against targets that have asked for it.


MICHAEL ISIKOFF: What do you mean?

BARRETT BROWN: Targets who have engaged in a manner that is either unethical and contrary to the—sort of the values of this age, information freedom. Just, I mean—and sometimes just plain common sense, in the case of them going after journalists, going after WikiLeaks, in the way that they were planning to do so.

MICHAEL ISIKOFF: But you can attack websites.

BARRETT BROWN: Yes, we can attack websites. We can DDoS them. We can sometimes hack them. We can sometimes take over the websites themselves, put messages up, as we did today with Westboro and as we did with—with the company HBGary and other federal contractors during that attack.

MICHAEL ISIKOFF: You can—you can—

BARRETT BROWN: Take it over, debase it.

MICHAEL ISIKOFF: —take over the websites of government contractors.

BARRETT BROWN: And governments, of course. In Tunisia and in Libya, Algeria and Egypt and Iran, we either took down or replaced government websites. We replaced them with messages from us to the people of those nations, explaining what we’re doing and why and what we’ll provide if they choose to revolt.

MICHAEL ISIKOFF: Are you worried you’re going to get prosecuted?

BARRETT BROWN: I’m not worried about it, but I am going to get prosecuted at some point, yes.

MICHAEL ISIKOFF: Because you’re involved in hacking activity.

BARRETT BROWN: Because they could do whatever they want to anyone they want.

MICHAEL ISIKOFF: But you’re not worried?

BARRETT BROWN: No, because, again, like I said, I’m well protected right now.

MICHAEL ISIKOFF: What do you mean, well protected?

BARRETT BROWN: I’ve got a lot of lawyers. I’ve got a lot of higher-up people. I’ve got people to talk to who will—who support us. And if they come after me, they’re going to find that they’re not going to like everything that they see.

AMY GOODMAN: That’s Barrett Brown talking to NBC’s Michael Isikoff. Well, the fact is, Barrett Brown has been in prison now for 300 days, and he faces decades in prison. Can you explain—that’s when he was an Anonymous spokesperson—what Anonymous is? And then also talk about the groups he exposed, like Endgame and others, though he wasn’t the only one to do that.

PETER LUDLOW: Sure. I have to think he was a little bit optimistic there in his claims about how he was all lawyered up there. But he was a—he was related to Anonymous, which is—it’s not a group,per se. You know, you or I could claim to be members of Anonymous. It’s more like a flag that you fly if you choose to. And so, there was a loosely knit group of hacktivists. Some of them were intersecting. They carried out hacks against—as he says, against various private intelligence contractors and other kinds of targets. He’s quite right that during the Arab Spring and the Tunisian uprising and so forth, members of Anonymous did a lot of work in keeping protesters online and in minimizing the effectiveness of the governments in the Middle East in that time.

And then you asked about things like Endgame Systems, for example. Yeah, Endgame is a very interesting thing. I mean, Endgame is this kind of very secretive private intelligence company. And you even see in the HBGary hack, you see these messages where someone from Endgame says in an email, “We don’t ever want to see our name in a press release from you guys.” And what makes it particularly interesting is, if you read the search warrant that’s issued to Barrett when he’s busted, it says, “Well, we’re looking for stuff related to HBGary and Endgame Systems.” You know, like, why Endgame Systems?

And this is a corporation that’s involved in what are called “zero-day exploits.” Now, what’s a zero-day exploit? Basically, what that means is that there are certain security flaws in the software that we have and that we use, and sometimes the company doesn’t know about it. Sometimes it’s known about it for seven days, and they’ve had seven days to work on it. A zero-day exploit is one that the software company doesn’t know about. And Endgame Systems packages these things and sells them. So, for example, they have one where you get—it’s a subscription for like $2.5 million a year, and you get these exploits. So it’s things that a hacker would do, but because they’re a business and they’re making money for it, it’s—apparently it’s OK, right? And it seems that the Justice Department is kind of running interference for these guys. And there’s a—I mean, you don’t have to take my word for it. There’s a great article in Businessweek on this in which they talk about the guys from Endgame, you know, running—setting up slides and showing you targets in airports, telling you what the computers are running there, and what kind of the—what the vulnerabilities are and so forth.

JUAN GONZÁLEZ: And who runs Endgame? Where are they based?

PETER LUDLOW: They’re based in Atlanta, Georgia, I believe. Someone recently posted a video on YouTube in which he walked into the place and—just to see what was going on there. And the people—I think it’s an ex—it’s started by an ex-intelligence person and by a security guy at IBM.

AMY GOODMAN: And, very quickly, Project PM?

PETER LUDLOW: Project PM is basically Barrett’s—I mean, one of the genius things about Barrett was that he wanted to crowdsource all this information, because you get a hack of Stratfor and it’s five million emails, and how do you sort through all that? So he had a number of friends and acquaintances, including Michael Hastings, by the way, who were members of Project PM.

AMY GOODMAN: Michael Hastings, the reporter who just died in a fiery car crash.

PETER LUDLOW: The reporter who just died in the suspicious car accident, yeah, exactly right. And so, they would—he would basically crowdsource this. And so, the case where he copied that link, he was basically notifying the members of Project PM where they could find the information from the Stratfor hack.

AMY GOODMAN: So, what’s the schedule of—we just have 30 seconds … of what will happen to Barrett Brown right now? He’s in jail in Texas.

PETER LUDLOW: …He’s got a great legal team. Charles Swift is one of them, the guy from the judge advocate general’s thing that took that Gitmo case all the way to the Supreme Court.


PETER LUDLOW: Ahmed Ghappour, who’s at University of Texas Law School. There’s a group of individuals with who are raising money for him there, and they’re available if you have questions and so forth.

AMY GOODMAN: Well, we’ll certainly follow this case, Peter Ludlow, professor of philosophy at Northwestern University. He’s written extensively on hacktivist actions against private intelligence firms and the surveillance state. His most recent piece is in The Nation; it’s called “The Strange Case of Barrett Brown.” We will link to it at

The Real War on Reality

NY Times / The Stone June 14, 2013


If there is one thing we can take away from the news of recent weeks it is this: the modern American surveillance state is not really the stuff of paranoid fantasies; it has arrived.

The revelations about the National Security Agency’s PRISM data collection program have raised awareness — and understandably, concern and fears — among American and those abroad, about the reach and power of secret intelligence gatherers operating behind the facades of government and business.

Surveillance and deception are not just fodder for the next “Matrix” movie, but a real sort of epistemic warfare.

But those revelations, captivating as they are, have been partial —they primarily focus on one government agency and on the surveillance end of intelligence work, purportedly done in the interest of national security. What has received less attention is the fact that most intelligence work today is not carried out by government agencies but by private intelligence firms and that much of that work involves another common aspect of intelligence work: deception. That is, it is involved not just with the concealment of reality, but with the manufacture of it.

The realm of secrecy and deception among shadowy yet powerful forces may sound like the province of investigative reporters, thriller novelists and Hollywood moviemakers — and it is — but it is also a matter for philosophers. More accurately, understanding deception and and how it can be exposed has been a principle project of philosophy for the last 2500 years. And it is a place where the work of journalists, philosophers and other truth-seekers can meet.

In one of the most referenced allegories in the Western intellectual tradition, Plato describes a group of individuals shackled inside a cave with a fire behind them. They are able to see only shadows cast upon a wall by the people walking behind them. They mistake shadows for reality. To see things as they truly are, they need to be unshackled and make their way outside the cave. Reporting on the world as it truly is outside the cave is one of the foundational duties of philosophers.

In a more contemporary sense, we should also think of the efforts to operate in total secrecy and engage in the creation of false impressions and realities as a problem area in epistemology — the branch of philosophy concerned with the nature of knowledge. And philosophers interested in optimizing our knowledge should consider such surveillance and deception not just fodder for the next “Matrix” movie, but as real sort of epistemic warfare.

To get some perspective on the manipulative role that private intelligence agencies play in our society, it is worth examining information that has been revealed by some significant hacks in the past few years of previously secret data.

Important insight into the world these companies came from a 2010 hack by a group best known as LulzSec  (at the time the group was called Internet Feds), which targeted the private intelligence firm HBGary Federal.  That hack yielded 75,000 e-mails.  It revealed, for example, that Bank of America approached the Department of Justice over concerns about information that WikiLeaks had about it.  The Department of Justice in turn referred Bank of America to the lobbying firm Hunton and Willliams, which in turn connected the bank with a group of information security firms collectively known as Team Themis.

Team Themis (a group that included HBGary and the private intelligence and security firms Palantir Technologies, Berico Technologies and Endgame Systems) was effectively brought in to find a way to undermine the credibility of WikiLeaks and the journalist Glenn Greenwald (who recently broke the story of Edward Snowden’s leak of the N.S.A.’s Prism program),  because of Greenwald’s support for WikiLeaks. Specifically, the plan called for actions to “sabotage or discredit the opposing organization” including a plan to submit fake documents and then call out the error. As for Greenwald, it was argued that he would cave “if pushed” because he would “choose professional preservation over cause.” That evidently wasn’t the case.

Team Themis also developed a proposal for the Chamber of Commerce to undermine the credibility of one of its critics, a group called Chamber Watch. The proposal called for first creating a “false document, perhaps highlighting periodical financial information,” giving it to a progressive group opposing the Chamber, and then subsequently exposing the document as a fake to “prove that U.S. Chamber Watch cannot be trusted with information and/or tell the truth.”

(A photocopy of the proposal can be found here.)

In addition, the group proposed creating a “fake insider persona” to infiltrate Chamber Watch.  They would “create two fake insider personas, using one as leverage to discredit the other while confirming the legitimacy of the second.”

Psyops need not be conducted by nation states; they can be undertaken by anyone with the capabilities and the incentive to conduct them.

The hack also revealed evidence that Team Themis was developing a “persona management” system — a program, developed at the specific request of the United States Air Force, that allowed one user to control multiple online identities (“sock puppets”) for commenting in social media spaces, thus giving the appearance of grass roots support.  The contract was eventually awarded to another private intelligence firm.

This may sound like nothing so much as a “Matrix”-like fantasy, but it is distinctly real, and resembles in some ways the employment of “Psyops” (psychological operations), which as most students of recent American history know, have been part of the nation’s military strategy for decades. The military’s “Unconventional Warfare Training Manual” defines Psyops as “planned operations to convey selected information and indicators to foreign audiences to influence their emotions, motives, objective reasoning, and ultimately the behavior of foreign governments, organizations, groups, and individuals.” In other words, it is sometimes more effective to deceive a population into a false reality than it is to impose its will with force or conventional weapons.  Of course this could also apply to one’s own population if you chose to view it as an “enemy” whose “motives, reasoning, and behavior” needed to be controlled.

Psyops need not be conducted by nation states; they can be undertaken by anyone with the capabilities and the incentive to conduct them, and in the case of private intelligence contractors, there are both incentives (billions of dollars in contracts) and capabilities.

Several months after the hack of HBGary, a Chicago area activist and hacker named Jeremy Hammond successfully hacked into another private intelligence firm — Strategic Forcasting Inc., or Stratfor), and released approximately five million e-mails. This hack provided a remarkable insight into how the private security and intelligence companies view themselves vis a vis government security agencies like the C.I.A. In a 2004 e-mail to Stratfor employees, the firm’s founder and chairman George Friedman was downright dismissive of the C.I.A.’s capabilities relative to their own:  “Everyone in Langley [the C.I.A.] knows that we do things they have never been able to do with a small fraction of their resources. They have always asked how we did it. We can now show them and maybe they can learn.”

The Stratfor e-mails provided us just one more narrow glimpse into the world of the private security firms, but the view was frightening.  The leaked e-mails revealed surveillance activities to monitor protestors in Occupy Austin as well as Occupy’s relation to the environmental group Deep Green Resistance.  Staffers discussed how one of their own men went undercover (“U/C”) and inquired about an Occupy Austin General Assembly meeting to gain insight into how the group operates.

Read previous contributions to this series.

Stratfor was also involved in monitoring activists who were seeking reparations for victims of a chemical plant disaster in Bhopal, India, including a group called Bophal Medical Appeal. But the targets also included The Yes Men, a satirical group that had humiliated Dow Chemical with a fake news conference announcing reparations for the victims.  Stratfor regularly copied several Dow officers on the minutia of activities by the two members of the Yes Men.

One intriguing e-mail revealed that the Coca-Cola company was asking Stratfor for intelligence on PETA (People for the Ethical Treatment of Animals) with Stratfor vice president for Intelligence claiming that “The F.B.I. has a classified investigation on PETA operatives. I’ll see what I can uncover.” From this one could get the impression that the F.B.I. was in effect working as a private detective Stratfor and its corporate clients.

Stratfor also had a broad-ranging public relations campaign.  The e-mails revealed numerous media companies on its payroll. While one motivation for the partnerships was presumably to have sources of intelligence, Stratfor worked hard to have soap boxes from which to project its interests. In one 2007 e-mail, it seemed that Stratfor was close to securing a regular show on NPR: “[the producer] agreed that she wants to not just get George or Stratfor on one time on NPR but help us figure the right way to have a relationship between ‘Morning Edition’ and Stratfor.”

On May 28 Jeremy Hammond pled guilty to the Stratfor hack, noting that even if he could successfully defend himself against the charges he was facing, the Department of Justice promised him that he would face the same charges in eight different districts and he would be shipped to all of them in turn.  He would become a defendant for life.  He had no choice but to plea to a deal in which he may be sentenced to 10 years in prison.  But even as he made the plea he issued a statement, saying “I did this because I believe people have a right to know what governments and corporations are doing behind closed doors. I did what I believe is right.”  (In a video interview conducted by Glenn Greenwald with Edward Snowden in Hong Kong this week, Snowden expressed a similar ethical stance regarding his actions.)

Given the scope and content of what Hammond’s hacks exposed, his supporters agree that what he did was right. In their view, the private intelligence industry is effectively engaged in Psyops against American public., engaging in “planned operations to convey selected information to [us] to influence [our] emotions, motives, objective reasoning and, ultimately, [our] behavior”? Or as the philosopher might put it, they are engaged in epistemic warfare.

The Greek word deployed by Plato in “The Cave” — aletheia — is typically translated as truth, but is more aptly translated as “disclosure” or “uncovering” —   literally, “the state of not being hidden.”   Martin Heidegger, in an essay on the allegory of the cave, suggested that the process of uncovering was actually a precondition for having truth.  It would then follow that the goal of the truth-seeker is to help people in this disclosure — it is to defeat the illusory representations that prevent us from seeing the world the way it is.  There is no propositional truth to be had until this first task is complete.

This is the key to understanding why hackers like Jeremy Hammond are held in such high regard by their supporters.  They aren’t just fellow activists or fellow hackers — they are defending us from epistemic attack.  Their actions help lift the hood that is periodically pulled over our eyes to blind us from the truth.

Peter Ludlow

Peter Ludlow is a professor of philosophy at Northwestern University and is currently co-producing (with Vivien Weisman) a documentary on Hacktivist actions against private intelligence firms and the surveillance state.


American Hero: Bradley Manning demands dismissal of his case due to inhuman punishment

Lets be sure to include Bradley in our prayers and meditations over the next couple months, the key is to visualize the judge granting his freedom. Visualize him already out of prison and free, picture him in your minds eye living his life as a free man. Thank Spirit for a successful pretrial on his behalf as if it had already happened, that’s the least we can do for all he’s suffered.

Tue, 27 Nov 2012 21:32 CST
Army Pfc. Bradley Manning.

© Reuters / Jose Liis Magaua
Army Pfc. Bradley Manning.

Bradley Manning is expected to testify in a pretrial hearing that he has been punished illegally by being locked in solitary confinement. The whistleblower hopes that his inhumane punishment is grounds for having all charges against him dismissed.

Manning, who is accused of sending classified information to WikiLeaks, will testify in a pretrial hearing in Fort Meade, Maryland.

“Until now we’ve only heard from Bradley through his family and lawyers, so it’s going to be a real insight into his personality to hear him speak for himself for the first time, said Jeff Paterson of the Bradley Manning Support Network.

Manning’s lawyers will maintain that his treatment in a small cell at the Marine Corps brig in Quantico, Virginia was illegal and unnecessarily severe. If pretrial punishment is particularly flagrant, military judges have the right to dismiss all charges.

Manning, a 24-year-old Army private and intelligence analyst, was allegedly involved in the largest security breach in US history and was charged with 22 crimes, including violating the Espionage Act and aiding the enemy. He allegedly accessed 250,000 US diplomatic cables, 500,000 army reports, and videos of the 2007 Baghdad airstrike and the 2009 Granai airstrike, and sending them to the whistleblower website WikiLeaks for publication in 2010. He is the only suspect arrested for his involvement in the security leak.

But while awaiting trial in Quantico from July 2010 to April 2011, he was allegedly mistreated, sparking human rights concerns from Amnesty International, the United Nations and the British government. The UN referred to his treatment as cruel, inhuman and degrading. Leading law scholars and PJ Crowley, former spokesman at the US Department of State, have resigned from their positions in protest of Manning’s treatment.

Manning’s lawyers claim he was held in maximum security in a cell so small that it was the functional equivalent of solitary confinement. He spent 23 ½ hours confined to his 6-by-8-foot cell with no windows or natural light and was often forced to sleep naked. He was also denied a regular blanket and pillow.

Manning was also woken at 5 a.m. every morning and forced to stay awake until 10 p.m., making it difficult for him to pass the time in his closet-like cell. Prison guards checked on him every five minutes and refused to let him lie on his bed, lean against the cell wall or exercise.

Military officials have called the punishment suitable, claiming Manning posed a risk of injury to himself and others and was therefore required to remain locked up as a maximum-security detainee. But records show that psychiatrists made at least 16 official reports to military commanders that Manning was not a threat to himself or others and should therefore not have been subjected to such severe treatment.

While a dismissal of all charges due to pretrial punishment is very rare in a military court, Manning’s lawyers hope that these “egregious” and illegal conditions amount to severe enough punishment to justify dropping the case.

© Patrick Semansky / APArmy Pfc.
Bradley Manning, center, steps out of a security vehicle Nov. 28 as he is escorted into a courthouse in Fort Meade, Md., for a ‘pretrial hearing’.

According to lawyer David Coombs, these conditions are a flagrant violation of Pfc. Manning’s constitutional right to not be punished prior to trial.”

If the military judge refuses to drop the charge but still considers pretrial punishment as time served, then Manning could receive a lesser prison sentence, former Marine Corps attorney Dwight H. Sullivan told the Baltimore Sun. He is currently seeking a “10-to-1” credit, which means he would receive a credit of 10 days served for every actual day spent in pretrial confinement.

If Manning’s lawyers fail to sway the judges, the 24-year-old may face life imprisonment if he is convicted of aiding the enemy, the most serious of his 22 charges.Earlier Manning has also offered to plead guilty to reduced charges for a lesser sentence.

After being released from Quantico due to the prison closing down, Manning was moved to Fort Leavenworth, Kansas, where he was allowed to interact with other inmates and kept in less strict conditions. But his lawyers still hope that his nine-month stay and cruel treatment at Quantico will lead to Manning’s freedom.

The pretrial hearing is scheduled to last until Sunday and precedes the full court martial scheduled for Feb. 4, 2013.

Time for government to stand ground and protect Assange

Jennifer Robinson
March 1, 2012
WikiLeaks’s latest release of confidential emails obtained from the US private intelligence firm Stratfor indicate the US Department of Justice has issued a secret, sealed indictment against Julian Assange. While the Department of Justice has refused to confirm the existence of the Assange indictment – it refuses to comment upon any alleged sealed indictment – the Stratfor email is the best confirmation we have of the long-stated concerns about the risk of Assange’s extradition to the US to face criminal prosecution for his publishing activities with WikiLeaks.

The email was from Fred Burton, Stratfor’s vice-president for counterterrorism and corporate security, and former deputy chief of the Department of State’s counterterrorism division for the Diplomatic Security Service. On Australia Day last year, Burton revealed in internal Stratfor correspondence: ”Not for Pub – We have a sealed indictment on Assange. Pls protect.”

Following the announcement by the US Attorney-General, Eric Holder, of criminal investigation into Assange in December 2010, the US government has refused to give further comment on its plans to prosecute him. The grand jury is secret. Our appeals to military courts for access to the Bradley Manning proceedings were denied. The Australian government has consistently claimed to have no information from the US as to whether they will prosecute Assange and seek his extradition.

“Indicting Assange represents a dramatic assault on the First Amendment, journalists and the public right to know.”

The question we must now ask: if a Texas private intelligence firm knew of the sealed indictment for more than a year – why doesn’t our government? Did the government know? Was its denial of knowledge dishonest?

It is rather ironic, and an embarrassing indictment of the US-Australia alliance, if the Australian government learnt this information, as we have, through a WikiLeaks release. Indicting Assange represents a dramatic assault on the First Amendment, journalists and the public right to know. Assange, recently awarded the Walkley Award for most outstanding contribution to journalism, faces criminal prosecution – marking the first time a journalist has been prosecuted for allegedly receiving and publishing ”classified” documents.

The Australian government must rectify the damage to its international reputation by our failure so far to acknowledge – and protect – our most celebrated journalist and be mindful of the impact it will have on free speech in Australia and around the world. The Prime Minster, Julia Gillard, has bent to US pressure on WikiLeaks and wrongfully accused an Australian citizen of illegal conduct, and the former attorney-general Robert McClelland pondered cancelling Assange’s passport but Kevin Rudd, as foreign minister, told the pair to back off. He may be on the backbench now, but Rudd was right.

The correct legal analysis, provided by other lawyers in Parliament, Malcolm Turnbull and the shadow attorney-general George Brandis, SC, is that publication of classified material of foreign powers – even friendly ones – is not a crime in Australia; nor is it a crime in the US. That is also the legal advice of the Australian Federal Police, who concluded Assange had committed no crime here. Prominent academics in the US agree Assange is entitled to the protections of the First Amendment.

But any constitutional challenge for Assange will come years down the track. The Stratfor emails disclose a strategy: ”move him from country to country to face various charges for the next 25 years” and ”[bankrupt] the asshole first … ruin his life. Give him 7-12 years for conspiracy”.

What happens to Assange in the US in the meantime? We need only look to the treatment of WikiLeaks’s alleged source, Manning, who has been kept in degrading conditions, including solitary confinement, for more than 18 months pending trial. According to Burton, in another Stratfor email disclosed yesterday: ”Assange is going to make a nice bride in prison. Screw the terrorist. He’ll be eating cat food forever.”

The Australian government must learn from its mistakes in the David Hicks case and act now. Assange is an Australian citizen and we must protect him, and protect our country from international condemnation for our failure to act, knowing the treatment Assange will receive in the US.

National sovereignty and the protection of Australians abroad have so far been sacrificed to US interests in this case. A real friend of the US will, at times, criticise, as all friends must. Australia must ask serious questions of the US about its plans to prosecute Assange. Australia should exercise diplomatic protection and seek undertakings regarding his treatment. Assange deserves the protection any of us as Australian citizens deserve. What if it were your son or brother or friend? Would you feel satisfied with our government’s response?

In the case of Schapelle Corby, the former attorney-general Philip Ruddock sent senior lawyers to Indonesia on our government’s behalf to arrange her defence. They said, ”the fact is, she is an Australian national in trouble overseas, and the consequences are extremely severe, so there just wasn’t any hesitation”. Assange is surely as worthy of our protection as the ”Bali boy” who, having admitted drug possession, received a phone call from Ms Gillard and the highest level of consular assistance. Assange has not received anywhere near that support. Quite the opposite.

Whether or not the government knew before, it certainly knows now. The Prime Minister, the Attorney-General and the new foreign minister must take action. Nicola Roxon, the Attorney-General, campaigned hard in opposition to bring Hicks home, urging the Howard government ”to take urgent action to protect this Australian citizen they have so far neglected for such a long period of time”. She has so far remained silent. But if she can go into bat for Hicks, she can go into bat for Assange. The government must protect Assange, not just because of who he is, but because he is Australian. And, as the Stratfor emails confirm, an Australian is at risk.

Jennifer Robinson is a London-based Australian human rights lawyer who represents Julian Assange and WikiLeaks

source with plenty of comments:…229-1u3cn.html

Bradley Manning hearing ends with no clear sign of harm done to US –

Link to article:

Bradley Manning hearing ends with no clear sign of harm done to US –

Facebook is greatest spy vehicle ever created

Tue, 28 Jun 2011 17:12 CDT

© Unknown

Assange now backs Mathaba’s 3 years old claim that Facebook is the greatest spy system ever created

WikiLeaks founder and Australia citizen Julian Assange called Facebook the “greatest espionage tool in history”, in an exclusive interview to, confirming what Mathaba already reported about Facebook many years earlier, as well as Google and Yahoo among other close runner-ups.

Facebook automatically collects confidential data of the registered site users, and Mathaba and now Assange have alleged that this information is then transferred to the U.S. intelligence which provided seed funding for Zuckerberg’s Facebook.

Assange said that we are dealing with “a very detailed database about people, their habits, their social ties, addresses, places of residence, relatives, and all these data is located in the United States and available to U.S. intelligence.”

In answer to a question concerning the role of social networks Facebook and Twitter in the recent chaos in the Arab countries with the notable exception of Israel, leading to thousands of deaths, Assange, who is himself funded by the jewish international elitist financier George Soros, said that “Facebook in particular is the most disgusting of all espionage tools ever invented.”

He said that the users should be aware that in adding a contact on Facebook they are working for American intelligence, updating its database, free of charge without any effort nor cost on the part of the CIA. Further, it is easy for other intelligence agencies to either hack Facebook, or get this information from the Americans in exchange for some other services, he pointed out.

Assange confirmed Mathaba’s allegations which preceded the creation of WikiLeaks by several years, saying that “Facebook, Google and Yahoo, all large American companies, have built-in interfaces for the use by the American intelligence. Does this mean that Facebook is in the hands of the American intelligence? No, it is different. It means that the U.S. intelligence agencies have legal and political means to pressure them.”

Assange is currently under luxury house arrest at a millionaire supporter’s home in the English countryside, awaiting the review of his complaint regarding the London court decision on his extradition to Sweden, where he is accused of sexual crimes.

Continued here:

Latest Batch of Wikileaks Documents Show Massive ‘Mission Creep’ in Drug War


Even tho must everyone knows who Julian Assange is, most have never read documents released by Wikileaks or really have much idea what the hoopla is all about. Then mass media jumps in with calls to “take him out”, hang him for treason (not even a citizen of the US), call him a threat to national security and all kinds of nonsense. When this is really an issue about keeping the press free, free from journalists having to fear their lives or arrest for doing their job. The founding fathers realized the importance of a free press and wrote it into the constitution…here’s some information the latest batch released on the DEA, another agency out of control making a bad name for Americans where ever they operate.

Posted by KATHY KATTENBURG in Breaking News, International, Law, Places, Politics, Society, War.
Dec 27th, 2010 

The Drug Enforcement Administration has been transformed into a global intelligence organization with a reach that extends far beyond narcotics, and an eavesdropping operation so expansive it has to fend off foreign politicians who want to use it against their political enemies, according to secret diplomatic cables.

n far greater detail than previously seen, the cables, from the cache obtained by WikiLeaks and made available to some news organizations, offer glimpses of drug agents balancing diplomacy and law enforcement in places where it can be hard to tell the politicians from the traffickers, and where drug rings are themselves mini-states whose wealth and violence permit them to run roughshod over struggling governments.
Like many of the cables made public in recent weeks, those describing the  drug war do not offer large disclosures. Rather, it is the details that add up to a clearer picture of the corrupting influence of big traffickers, the tricky game of figuring out which foreign officials are actually controlled by drug lords, and the story of how an entrepreneurial agency operating in the shadows of the  F.B.I. has become something more than a drug agency. The D.E.A. now has 87 offices in 63 countries and close partnerships with governments that keep the  Central Intelligence Agency at arm’s length.

The Economic Times puts it more bluntly:

The US Drug Enforcement Administration , an agency tasked with the job of tracking drug traffickers around the world, has over the years transformed into a global intelligence organisation with its tentacles extending far beyond narcotics, according to secret American diplomatic cables .

The organisation has an eavesdropping operation so expansive it has to fend off foreign politicians who want to use it against their political enemies, the New York Times reported on Sunday, quoting a cache of cables published by WikiLeaks . The body’s vast network of informants also had on its roll David Headley, an accused in the Mumbai attacks case, who worked as a double agent for the DEA.

For example (my emphasis):

One August 2009 cable reported Panamanian President Ricardo Martinelli as having sent an urgent BlackBerry message to the US ambassador asking the DEA go after his political enemies.

“I need help with tapping phones,” the paper quoted the president as saying.

The request was denied, which sparked new tensions between the two countries.

Martinelli, who, according to the cables, “made no distinction between legitimate security targets and political enemies,” retaliated by proposing a law that would have ended the DEA’s work with specially vetted Panamanian police units.

Then he tried to subvert the drug agency?s control over the programme by assigning non-vetted officers to the counternarcotics unit, The Times said.

At the beginning of the year, the United States faced a similar situation in Paraguay.

Diplomatic dispatches sent from that South American country described the DEA fighting requests from that country?s government to help spy on an insurgent group, known as the Paraguayan People?s Army (EPP).

The leftist group suspected of having ties to the Revolutionary Armed Forces of Colombia (FARC) had conducted several high-profile kidnappings and was trying to finance its activities through collecting ransom.

According to The Times, when US diplomats refused to give Paraguay access to the drug agency?s wiretapping system, Interior Minister Rafael Filizzola threatened to shut it down, saying: “Counternarcotics are important, but won?t topple our government. The EPP could.”

So not only are these entanglements not helping to stop drug trafficking, they are actually compromising U.S. foreign policy.

But of course the American people have no right to know that a government agency tasked with drug law enforcement has, with no public disclosure or debate and, indeed, completely unbeknownst to the general public, become an international intelligence network — a second Central Intelligence Agency — which, as Conor Friedersdorf observes, may be helping to create “a black market that destabilizes dozens of nations and ravages countless lives” — possibly “provok[ing] a whole different kind of terrorist to come after us sooner or later.”

GMO Conspiracy – New Wikileaks Cable


(NaturalNews) Wikileaks continues to rock the political world by shedding light on conspiracies, corruption and cover-ups. The latest batch of diplomatic cables released by Wikileaks reveals what can only be characterized as a U.S.-led conspiracy to force GMOs onto European countries by making those countries pay a steep price if they resist.

The cable reveals the words of Craig Stapleton, the US ambassador to France, who was pushing the commercial interests of the biotech industry by attempting to force GMOs into France. In his own words (below), he expresses his frustration with the idea that France might pass environmental laws that would hamper the expansion of GMOs:

“Europe is moving backwards not forwards on this issue with France playing a leading role, along with Austria, Italy and even the [European] Commission… Moving to retaliation will make clear that the current path has real costs to EU interests and could help strengthen European pro-biotech voice.”

Got that so far? His own words: “Retaliation” as a way to “make [it] clear” that resisting GMOs will have a price.

Stapleton goes on to say something rather incredible:

“Country team Paris recommends that we calibrate a target retaliation list that causes some pain across the EU since this is a collective responsibility, but that also focuses in part on the worst culprits. The list should be measured rather than vicious and must be sustainable over the long term, since we should not expect an early victory…”

As you read these words again, remember that these are the words of the U.S. ambassador to France who is suggesting the US “calibrate a target retaliation list” in order to “cause some pain across the EU” that must be “sustainable over the long term.”

The global GMO conspiracy is no longer a theory
Need we say anything more? This cable proves, once and for all, that there is a global GMO conspiracy where government operatives work in secret to push Monsanto’s GMO agenda while punishing opponents of GMOs and adding them to a “target retaliation list.”

This cable also proves that NaturalNews has been right all along about the GMO conspiracy, and that GMO opponents such as Jeffrey Smith are battling what can only be called an evil conspiracy to control the world’s food supply. It also proves that when Alex Jones talks about the global conspiracy to control the world food supply, he’s not just ranting. He’s warning about the reality of the world in which we now live.


Michael Moore offers his servers to host Wikileaks docs, posts $20,000 bail

By John Byrne

Tuesday, December 14th, 2010 — 8:52 am

on’t host leaked diplomatic cables posted by the website WikiLeaks, Michael Moore will.

The liberal filmmaker and author announced in a web posting Tuesday that he had donated $20,000 to the cause of Julian Assange, WikiLeaks’ embattled chief who is being held in the United Kingdom on sexual offense charges and is seeking to be released on bail.

“I support Julian, whom I see as a pioneer of free speech, transparent government and the digital revolution in journalism. His commitment to exposing the follies of government and business offers the greater society a chance to protect itself from these follies,” Moore wrote in a web posting Tuesday.

“Some aren’t just follies. Some are crimes. What do we do with someone who informs the authorities — and in this case it is the free people in a democracy who are the “authorities” — that a crime has been committed?” he added. “Do we arrest HIM? Do we try to shut his mouth? Do we hound him, threaten him, track him down and hunt him as if HE is the criminal? He bravely informed the citizenry of what was being done in their name and with their tax monies. That is no crime. That is an act of patriotism.

Assange should be lauded and not maligned, the filmmaker argues.

“He should be thanked and honored, not abused and jailed,” he writes. “It dishonours this court to be used in this way, holding this man without bail. Julian has made the world, and my country in particular, a safer place. His actions with WikiLeaks have put on notice those who would take us to war based on lies that any future attempts to do so will be met by the fierce bright light provided by WikiLeaks and intended to expose those who commit their war crimes. His actions will make them think twice next time — and for that we all owe him a debt of gratitude.”

Moore points to incidents in recent US history where he feels WikiLeaks could have made a significant difference. For example, he mentions an August 2001 briefing document provided to President George W. Bush whose heading read, “Bin Ladin Determined To Strike in US.”

WikiLeaks deserves our thanks for shining a huge spotlight on all this. But some in the corporate-owned press have dismissed the importance of WikiLeaks (“they’ve released little that’s new!”) or have painted them as simple anarchists (“WikiLeaks just releases everything without any editorial control!”). WikiLeaks exists, in part, because the mainstream media has failed to live up to its responsibility. The corporate owners have decimated newsrooms, making it impossible for good journalists to do their job. There’s no time or money anymore for investigative journalism. Simply put, investors don’t want those stories exposed. They like their secrets kept … as secrets.

I ask you to imagine how much different our world would be if WikiLeaks had existed 10 years ago. Take a look at this photo. That’s Mr. Bush about to be handed a “secret” document on August 6th, 2001. Its heading read: “Bin Ladin Determined To Strike in US.” And on those pages it said the FBI had discovered “patterns of suspicious activity in this country consistent with preparations for hijackings.” Mr. Bush decided to ignore it and went fishing for the next four weeks.

But if that document had been leaked, how would you or I have reacted? What would Congress or the FAA have done? Was there not a greater chance that someone, somewhere would have done something if all of us knew about bin Laden’s impending attack using hijacked planes?

But back then only a few people had access to that document. Because the secret was kept, a flight school instructor in San Diego who noticed that two Saudi students took no interest in takeoffs or landings, did nothing. Had he read about the bin Laden threat in the paper, might he have called the FBI? (Please read this essay by former FBI Agent Coleen Rowley, Time’s 2002 co-Person of the Year, about her belief that had WikiLeaks been around in 2001, 9/11 might have been prevented.)

Or what if the public in 2003 had been able to read “secret” memos from Dick Cheney as he pressured the CIA to give him the “facts” he wanted in order to build his false case for war? If a WikiLeaks had revealed at that time that there were, in fact, no weapons of mass destruction, do you think that the war would have been launched — or rather, wouldn’t there have been calls for Cheney’s arrest?

The magazine Foreign Policy, writing on their blog, mocked Moore’s contribution to the WikiLeaks cause.

“Oh, goody,” wrote the magazine’s blogger Blake Hounshell. “Perhaps upset that his last film, Capitalism, was a dud and he hasn’t been in the news for a while, filmmaker Michael Moore is now offering to post bail for WikiLeaks frontman Julian Assange, who is currently languishing in a British prison while the Brits work out his extradition to Sweden, where he’s wanted for questioning.”

The following statement was entered by Moore into the London court on Tuesday, in connection with his decision to help post Assange’s bail.

If We Lose our Internet Freedoms Because of Wikileaks, You Should At Least Know Why

By Scott Creighton
Global Research, December 11, 2010

Just a little more background on Julian Assange and Wikileaks…

Wikileaks was started up in Dec. of 2006. Oddly enough, as a supposed “leak” site, a dissident site, it was given a great deal of immediate mainstream attention from the likes of the Washington Post, TIME magazine, and even Cass Sunstein the now Obama administration official who wrote a paper on how to “cognitively infiltrate” dissident groups in order to steer them in a direction that is useful to the powers that be.

The TIME magazine article is curious because it seems that right off the bat they were telling us how to interpret Wikileaks in such a way that sounded strangely familiar to George W. Bush back just after 9/11…


“By March, more than one million leaked documents from governments and corporations in Asia, the Middle East, sub-Saharan Africa and the former Soviet Bloc will be available online in a bold new collective experiment in whistle-blowing. That is, of course, as long as you don’t accept any of the conspiracy theories brewing that could be a front for the CIA or some other intelligence agency.” TIME Jan. 2007 (emphasis added)

Now remember and read closely… this article was written PRIOR to Wikileaks’ first big “leak”, which according to the article was to  occur sometime in March of 2007.

So why would TIME magazine be writing about them in the first place if they hadn’t done anything yet? Also, let’s not pass up on that delicious irony: this is TIME magazine singing the praises of a supposed “leak” site which will supposedly expose all kinds of “conspiracy theories” while at the same time telling their readers NOT to believe in those silly “conspiracy theories” circulating about Wikileaks. Just so long as you believe the “right” conspiracy theories, you’ll be alright I guess.   This of course perfectly matches Jullian Assange’s own statements about 9/11.

TIME goes on to explain that the Wikileaks version will be the “correct” version (even though they had yet to publish anything at that point… pretty far out on that credibility limb for TIME if you ask me…)

“Instead of a couple of academic specialists, Wikileaks will provide a forum for the entire global community to examine any document relentlessly for credibility, plausibility, veracity and falsifiability,” its organizers write on the site’s FAQ page. “They will be able to interpret documents and explain their relevance to the public. If a document is leaked from the Chinese government, the entire Chinese dissident community can freely scrutinize and discuss it…”  TIME Jan. 2007

You have to remember, Wikileaks first started targeting China obviously and as we all know from history, typically dissident movements within targeted nations are often funded and run by covert CIA operations. Since Wikileaks started off with a host of Chinese dissidents, it would be logical to assume that at least some of them have links back to the agency. But it gets better.

Few of you might know that just prior to the unveiling of Wikileaks, the intelligence world had an unveiling of their own… a “social media” based resource called “Intellipedia”.  Some of you might find this interesting…

“With its own versions of a certain search engine and a certain online encyclopedia, the intelligence community is evolving its use of tools now widespread in the commercial sector, generating both success and controversy.

The new tools include a federated search engine called Oogle and Intellipedia, a controversial intelligence data-sharing tool based on Wiki social software technology.”  GCN Sept. 2006

So we see that in Sept. of 2006 there is a concerted effort in the intelligence community to embark on several new “pedia” type programs one which serves as a data-base and another which works like a Google search engine. Why wouldn’t there be a third?

John Young of Cryptome (a well-known and established whistle-blower site) was working with Julian Assange in December 2006 while they were getting all of this off the ground so to speak. eventually he came to a conclusion about Wikileaks and Assange. The following is from one of the last email communications with Assange that John Young sent him which he had released to the public once he came to his conclusions.

“All the messages received were published. My objections had been building, shown in later messages, after initial support. The finally fed-up turnaround occurred with the publication today of the $5 million dollar by July fund-raising goal — see messages at the tail-end. I called that — along with a delay in offering a public discussion and critique forum and failure to provide a credible batch of leaked documents for public scrutiny — a surefire indication of a scam. This is the exact technique used by snake oilers, pols and spies. Requests to Cryptome to keep stuff quiet are regular fare and they always get published. Next up, the names and affiliations of the perps if they don’t reveal themselves in an open forum.” John Young, Dec. 2006

Go here to read the entire email exchange, from start to finish, including the emails sent to Daniel Ellsberg (apparently he has been emotionally attached to this project from before day-one).

It would appear that John Young had problems with the peer review part of the Wikileaks process… Notice how that is first and foremost what TIME magazine praises about Wikileaks? Sounds to me like someone is trying to fix the narrative.

So it would appear that TIME and the Washington Post had to come out with supportive articles about Wikileaks because someone was “leaking” information and questions about them and their little project looked doomed to fail before it even got off the ground. Perhaps they got a little help writing all that propaganda from one of Julian Assange’s first partners in the project… a PR guy affiliated with ABC and News Corp’s Rupert Murdoch.

“Phillip Andrew Hedley Adams, AO (born 12 July 1939) is an Australian broadcaster, film producer, writer, social commentator, satirist and left-wing pundit. He currently hosts a radio program, Late Night Live, four nights a week on the ABC, and he also writes a weekly column for the News Limited-owned newspaper, The Australian. Adams is (or was) on the Advisory Board of Wikileaks.

Adams began his advertising career with Foote Cone & Belding and later with Brian Monahan and Lyle Dayman became a partner in the agency Monahan Dayman Adams. They took that company to a successful public listing and Adams became a millionaire in the process. He developed such successful campaigns as “Life – Be In It”[4], “Slip, Slop, Slap[5], “Break down the Barriers”, “Guess whose mum has a Whirlpool” and “watch the big men fly for a Herbert Adams Pie”,”

“News Limited is an Australian newspaper publisher. Until the formation of News Corporation in 1979, it was the principal holding for the business interests of Rupert Murdoch. Since then, News Limited has been wholly owned by News Corporation.”  Wiki

Now that’s just another of the curious associations that Wikileaks seems to hold. You tack PR guys with News cork affiliations onto Chinese dissidents who have been probably funded by the CIA in times past… mesh that up with John Young’s 2006 conclusions, and you come away with a different view of Wikileaks altogether… especially when you look at the sum total of the work they have “leaked” over the years. Of course there may still be some of you who prefer to take TIME magazine’s telling suggestion to dismiss the “outrageous conspiracy theories” and for those of you who are still in that category, I offer… Cass Sunstein.

Cass Sunstein also wrote about Wikileaks in Feb of 2007 prior to their release of the first set of Chinese “leaks”. But Sunstein also wrote about infiltrating dissident groups later in 2008. Sunstein currently heads the White House Office of Information and Regulatory Affairs for Barack Obama.

“Sunstein co-authored a 2008 paper with Adrian Vermeule, titled “Conspiracy Theories,” in which they wrote, “The existence of both domestic and foreign conspiracy theories, we suggest, is no trivial matter, posing real risks to the government’s antiterrorism policies, whatever the latter may be.” They go on to propose that, “the best response consists in cognitive infiltration of extremist groups“,[22] where they suggest, among other tactics, “Government agents (and their allies) might enter chat rooms, online social networks, or even real-space groups and attempt to undermine percolating conspiracy theories by raising doubts about their factual premises, causal logic or implications for political action.”

Sunstein and Vermeule also analyze the practice of secret government payments to outside commentators, who are then held out as independent experts; they suggest that “government can supply these independent experts with information and perhaps prod them into action from behind the scenes,” further warning that “too close a connection will be self-defeating if it is exposed.”[22] Sunstein and Vermeule argue that the practice of enlisting non-government officials, “might ensure that credible independent experts offer the rebuttal, rather than government officials themselves. There is a tradeoff between credibility and control, however. The price of credibility is that government cannot be seen to control the independent experts.”” Wiki

This internal discourse on the purpose and the practice of infiltrating dissident groups in order to undermine existing “conspiracy theories” was written in 2008, but don’t suppose that it hadn’t been done before. Just look up the Black Panthers. Take a look at the line “government can supply these independent experts with information” and you start to get the idea behind Wikileaks. Again, consider the type of “leaks” that have been coming out about Iran and North Korea and you get the picture.

“The Central Intelligence Agency disclosed the existence of its top-secret Intellipedia project, based on Wikipedia software (and now containing more than 28,000 pages), in late October. The agency hopes to use dispersed information to reduce the risk of intelligence failures. NASA officials have adopted a wiki site to program NASA software, allowing many participants to make improvements.”, founded by dissidents in China and other nations, plans to post secret government documents and to protect them from censorship with coded software.”

“But the track record of the new collaborations suggests that they have immense potential. In just a few years, Wikipedia has become the most influential encyclopedia in the world, consulted by judges as well as those who cannot afford to buy books. If the past is prologue, we’re seeing the tip of a very large iceberg.”  Washington Post

Far from being a ringing endorsement of Wikileaks, Sunstein’s article seems to express what we can probably assume was the motivating factor behind the creation of such a program, and that is that they knew it had “immense potential”.

It’s unfortunate what is going to happen. We all know it. We all see it. At some point that 256 character encryption code is going to be released and all of those wanna-be hackers will busily work to decode the 1.6 gig file they downloaded from all those bit torrent sites. Of course the files are unredacted, as has already been made clear by Mr. Assange himself, and the end result will obviously be that some U.S. agent in Pakistan or Somalia or even Yemen will be disclosed and killed. At that point, the Obama administration will have no choice but to shut down thousands of websites (they just ran a BETA test for that last month shutting down 70 all at once) for “national security” reasons. Once that happens, they will of course have to pass a net neutrality bill that allows for licensing requirements for hosting websites which will mean only government approved sites will be allowed and they will be constantly monitored, for the public good of course. And thus, all those troubling “conspiracy theory” sites will be gone and Cass Sunstein can sleep better at night.

I only put this information up because I want people like John Pilger and Glenn Greenwald to know the exact role they are playing in all of this.

But just so we all know, this is the background of the mythology called Wikileaks. If we lose our internet freedoms over this fight, I certainly want us all to have a little better understanding of why.

UPDATE: John Young was just asked by AJ what he thought was the overall point of the Wikileaks program…

AJ: Is this a big theatre with Assange or are they burning him?

Young: Its a theatre operation. Partly lulling, partly testing systems. Testing public reaction “are we going to get traction out of cyber threats or not.” will this work or not, because as you know they haven’t caused any harm that is why they haven’t been charged… and then there will be some lives lost or something will happen… and at some point when this cyber war becomes a real war, we will see because the laws will be ready.  Interview John Young

Scott Creighton’s blogsite is American Everyman at willyloan

© Copyright 2005-2007

Web site engine by Polygraphx Multimedia © Copyright 2005-2007