Posts

Links, 4/22/12

I was never able to keep up with my goal of doing daily link posts last year. That said, there’s so much out today that I want to at least note that I can’t keep up with my own posting unless I dump all these here.

Steven Aftergood notes that your elected representatives are clarmoring for more leak prosecutions.

The EU just caved to US demands for EU passenger data. With Israel dictating no fly lists to Europe and Julian Assange’s lawyer being placed an an “inhibited” list with no explanation, this probably will lead to the US unilaterally dictating who can fly where in this world.

The Guardian asked pastor Terry Jones whether he bears any responsibility for the deaths he may cause if he insists on conducting another Quran burning. The Guardian doesn’t appear to have asked DOD, which is trying to convince Jones not to conduct the burning, why it doesn’t first take responsibility for ending the anti-Muslim abuses and the Quran burning committed by some troops.

In addition to the cooperation with Libya in exposing refugees in the UK, the documents liberated in Libya last year also describe how MI6 collaborated with Moammar Qaddafi to set up a radical mosque in some Western European country to use as bait for Islamic extremists.

Obama just issued an Executive Order basically saying that Syria and Iran should not be able to use tech to crack down on the opposition in the same we the US does.

Apparently we don’t have enough spies so now DOD is rolling out a new (actually, newly renamed) Clandestine Service.

Micah Zenko addresses the stupidity behind refusing to acknowledged our Third War–the drone one–publicly.

As Jack Goldsmith notes in Charlie Savage’s piece describing Obama’s increasing reliance on executive orders to do the work of business, “This is what Presidents do.” Congress has, with its capitulation to big money and greed, basically turned itself into a rump institution doing no more than channeling money into DC’s main industry. I think Obama, with his congressional majority in 2008, might have been able to begin to reverse that if he had actually used his majority rather than pissing it away in a bid for bipartisan crap rather than effective legislation. But he didn’t.

Evgeny Morozov explains why Anonymous’ structure and disparate goals has led to increased surveillance rather than less. I think his analysis suffers from the classic chicken-and-egg fallacy, and fails to account for the degree to which these choices are probably being dictated by FBI-directed double agents. But it worthwhile analysis.

File this news–that half of Iran’s super-tanker capacity is sitting anchored in the gulf with no place to go–in the “whatever could go wrong?” file. If we’re lucky it will involve nothing more than pirates and not fully-laden tankers sunk and draining into the gulf.

Jose Padilla’s mom has appealed her suit against Donald Rumsfeld for torture to SCOTUS. This case is the best set of facts–but the least empathetic plaintiff–of several suits trying to hold the government accountable for torturing American citizens.

RickyLeaks

In a post at the Document Exploitation blog, Douglas Cox reminds us of how Crazy Pete Hoekstra and Rick Santorum pressured the government to make all of Saddam’s documents–including a plan for a nuke–available on the InterToobz.

The drive towards this unprecedented doc dump arose in earnest in late 2005 and early 2006 when the continuing public debate over the justifications for the 2003 Iraq invasion turned towards the possibility of untapped evidence in the captured documents from Iraq.  Could they contain, for instance, “smoking gun” evidence of links between Saddam and al-Qaeda?  Stephen F. Hayes at the Weekly Standard, for example, had an impressive series of pieces during this period on his attempts to obtain access to some of the captured Iraqi documents both via the Pentagon press office and via repeated FOIA requests. He also covered growing calls in Congress for the release of the material.  See in particular his “Where Are the Pentagon Papers?” in November 2005, “Down the Memory Hole: The Pentagon sits on the documents of the Saddam Hussein regime” in December, and both “Saddam’s Terror Training Camps: What the documents captured from the former Iraqi regime reveal — and why they should all be made public” and “Read All About It: Prewar Iraqi documents are of more than academic interest” from January 2006.

In March 2006, both then-Rep. Pete Hoekstra and then-Sen. Rick Santorum took action by introducing nearly identical bills in the House and Senate that required the “Director of National Intelligence to release documents captured in Afghanistan or Iraq during Operation Desert Storm, Operation Enduring Freedom, or Operation Iraqi Freedom.”

This led Gawker to make the obvious analogy to WikiLeaks.

Catholic scold Rick Santorum thinks Julian Assange is a “terrorist”—and ought to be prosecuted as such—for his role in releasing thousands of pages of classified documents on the internet. He ought to know: In 2006, Sen. Rick Santorum literally forced the U.S. government to dump thousands of pages of classified records concerning Iraq onto the web, including detailed plans for building a nuclear weapon, so that right-wing bloggers could search them for evidence of Saddam Hussein’s phantom WMD.

[snip]

No less an authority than former Bush chief of staff Andrew Card said at the time that the release was stupid, and that Director of National Intelligence John Negroponte had opposed Santorum’s push for release: “John Negroponte warned us that we don’t know what’s in these documents, so these are being put out at some risk, and that was a warning that he put out right when they first released the documents.”

ODNI of course took the documents down, but not before they were grabbed by anyone and everyone who may have been interested in designing a nuclear weapon.

A spokesman for Santorum did not respond to a request for comment.

Maybe now that he has effectively called himself a terrorist Santorum will start campaigning against Obama’s use of drones to target American citizens?

(Max Sawicky gets full credit for the post title.)

So It Was the FBI Threatening to Take Down the Internet, Then?

As soon as the news came out today that Sabu, the head of LulzSec, offered an FBI computer to facilitate the publication of Stratfor (no doubt set up a LulzSec-assisted indictment of Julian Assange in the future)…

Hector Xavier Monsegur, an unemployed 28-year-old Puerto Rican living in New York, was unmasked as “Sabu”, the leader of the LulzSec hacking group that has been behind a wave of cyber raids against American corporations including Rupert Murdoch’s News Corporation, the intelligence consultancy Stratfor, British and American law enforcement bodies, and the Irish political party Fine Gael.

[snip]

In a US court document, the FBI’s informant – there described as CW – “acting under the direction of the FBI” helped facilitate the publication of what was thought to be an embarrassing leak of conference call between the FBI and the UK’s Serious and Organised Crime Agency in February.

Officers from both sides of the Atlantic were heard discussing the progress of various hacking investigations in the call.

A second document shows that Monsegur – styled this time as CW-1 – provided an FBI-owned computer to facilitate the release of 5m emails taken from US security consultancy Stratfor and which are now being published by WikiLeaks. That suggests the FBI may have had an inside track on discussions between Julian Assange of WikiLeaks, and Anonymous, another hacking group, about the leaking of thousands of confidential emails and documents.

…I though back to the threat Anonymous made to TAKE DOWN THE ENTIRE INTERNET!!! Which of course made more sense understood as a ploy to help fear monger than an actual threat from actual terrorists.

Was it the FBI making such threats?

Which makes this conversation Sabu had just two weeks before he was indicted all the more interesting.

<SABU> You just said there was a claim that I may be a terrorist. You “researched” it and wrote the article

<SABU> There re claims I am with the CIA pushing to get tighter / stricter cyber-laws passed

<SABU> its literally the same shit, two different extremes.

[snip]

<SABU> The people are aware that our governments in the UK and the US have involved themselves in black operations in the past. it makes a lot of sense if lets say a rogue group of hackers suddenly began attaking national interests — spawning a massive overhaul of internet security, theoretically.

Read more

Bill Keller: True = False, But Better False Than Left or Right

As you read Bill Keller’s latest exercise in public masturbation, keep in mind how the NYT long refused to correct its credulous and ultimately, factually false, reporting on James O’Keefe III’s ACORN videos (Update: here’s BradBlog’s coverage of their belated admission they were wrong).

Now consider how Keller equates O’Keefe’s serial fabrications with Julian Assange’s leaks–leaks the NYT has heavily relied upon in its own reporting.

Has anyone actually seen James O’Keefe and Julian Assange together? Are we quite sure that the right-wing prankster who brought down the leadership of National Public Radio and the anarchic leaker aren’t split personalities of the same guy — sent by fate to mess with the heads of mainstream journalists?

Sure, one shoots from the left, the other from the right. One deals in genuine (albeit purloined) secrets; the other in “Candid Camera” stunts, most recently posing as a potential donor and entrapping a foolish NPR executive into disclosing his scorn for Republicans and the Tea Party.

Aside from equating video fabrications with documents the accuracy of which the NYT has confirmed itself, Bill Keller repeats the NYT’s earlier habit of repeating O’Keefe’s lies unquestioningly. [Update, 3/28 AM: The NYT has corrected part of Keller’s description of what really happened with O’Keefe’s latest; let’s see how long it takes them to correct Keller’s portrayal of Schiller’s intent.]

Here’s a better description of what O’Keefe’s fabrications exposed NPR Executive Ron Schiller to have said and done, from the digital forensic consultant NPR employed to review the full video.

Take the political remarks. Ron Schiller speaks of growing up as a Republican and admiring the party’s fiscal conservatism. He says Republican politicians and evangelicals are becoming “fanatically” involved in people’s lives.

But in the shorter tape, Schiller is also presented as saying the GOP has been “hijacked” by Tea Partyers and xenophobes.

In the longer tape, it’s evident Schiller is not giving his own views but instead quoting two influential Republicans — one an ambassador, another a senior Republican donor. Schiller notably does not take issue with their conclusions — but they are not his own.

I assume the Keller and the NYT will ignore this analysis, as they did the analysis ACORN had done, and cling to their unquestioning acceptance of O’Keefe’s propaganda about what Schiller said and did.

Now, Keller spends the remainder of his exercise in public masturbation arguing that unlike these two, the NYT has standards, and values “being right” (oh, except for the little Iraq fiasco) and impartial.

Except that in his first two paragraphs, Keller makes it clear that he doesn’t much care about being right–or has forgotten how to do even the most basic work that requires. He’s just going to spout what he wants to as long as it makes him feel important.

So I guess the better question is, has anyone actually seen James O’Keefe III and Bill Keller in the same place at the same time?

We Have Met the Enemy and He Is Us

The stated intent of the Wikileaks.org Web site is to expose unethical practices, illegal behavior, and wrongdoing within corrupt corporations and oppressive regimes …

[snip]

The developers believe that the disclosure of sensitive or classified information involving a foreign government or corporation will eventually result in the increased accountability of a democratic, oppressive, or corrupt the [sic] government to its citizens.

Army Counterintelligence Report on WikiLeaks, allegedly leaked by Bradley Manning between February 15 and March 15, 2010

I quipped in my last post that the new charges filed against Bradley Manning teach us that we are the enemy–or at least are considered to be the enemy by the federal government. I was referring to the charge that Manning “knowingly gave intelligence to the enemy.” After all, we’re the ones Manning allegedly gave this information to.

Via Glenzilla, Kevin Jon Heller provides more detail about what this charge entails. He summarizes his understanding of how the military might be intending to prove their case against Manning this way:

[1] Manning is guilty of “giving intelligence to the enemy,” because he gave intelligence to WikiLeaks that he knew would be made available on the internet, and an enemy of the United States did, in fact, access that information.

[2] Manning is guilty of “commun[i]cating with the enemy” because he gave information to WikiLeaks intending that an enemy of the United States would receive it.  (The “intent required” view.)

[3] Manning is guilty of “communicating with the enemy” because he gave information to WikiLeaks knowing that it would be published on the internet, where any enemy could access it. (The intent not required view.)

Heller dislikes examples 1 and 3 because they threaten Manning with life imprisonment for something that newspapers do, but he doubts the government is relying on example 2 because, he argues, it would require making the argument that Manning intended al-Qaeda to get the information. Yet, as Glenn points out, we don’t have to guess at Manning’s intent (at least if we believe the chat logs are authentic); Manning described his own goal for leaking information this way:

Manning: well, it was forwarded to [WikiLeaks] – and god knows what happens now – hopefully worldwide discussion, debates, and reforms – if not, than [sic] we’re doomed – as a species – i will officially give up on the society we have if nothing happens – the reaction to the video gave me immense hope; CNN’s iReport was overwhelmed; Twitter exploded – people who saw, knew there was something wrong . . . Washington Post sat on the video… David Finkel acquired a copy while embedded out here. . . . – i want people to see the truth . . . regardless of who they are . . . because without information, you cannot make informed decisions as a public. [emphasis Glenn’s]

Glenn suggests another possible way the government might be thinking of “enemy” here–one Heller dismisses.

In light of the implicit allegation that Manning transmitted this material to WikiLeaks, it is quite possible that WikiLeaks is the “enemy” referenced by Article 104, i.e., that the U.S. military now openly decrees (as opposed to secretly declaring) that the whistle-blowing group is an “enemy” of the U.S.

I’d like to look at that possibility more directly, because I think it is one the government might actually have the proof for.

As I noted earlier, Charge II, Specification 15 alleges that Manning:

between on or about 15 February 2010 and on or about 15 March 2010, having unauthorized possession of information relating to the national defense, to wit: a classified record produced by a United States Army intelligence organization, dated 18 March 2008, with reason to believe such information could be used to the injury of the United States or to the advantage of any foreign nation, willfully communicate, deliver, transmit … the said information, to a person not entitled to receive it …

This is one of the new charges from yesterday.

We know from the date and the description that this charge refers to the counterintelligence report the NGIC did on WikiLeaks. WikiLeaks published that report on March 15, 2010.

That’s significant because, in addition to treating WikiLeaks as a counterintelligence threat, the report reviews several leaks of DOD information previously released by WikiLeaks, then describes the threat presented by it this way.

(S//NF) It must be presumed that Wikileaks.org has or will receive sensitive or classified DoD documents in the future. This information will be published and analyzed over time by a variety of personnel and organizations with the goal of influencing US policy. In addition, it must also be presumed that foreign adversaries will review and assess any DoD sensitive or classified information posted to the Wikileaks.org Web site. Web sites similar to Wikileaks.org will continue to proliferate and will continue to represent a potential force protection, counterintelligence, OPSEC, and INFOSEC threat to the US Army for the foreseeable future. Sensitive or classified information posted to Wikileaks.org could potentially reveal the capabilities and vulnerabilities of US forces, whether stationed in CONUS or deployed overseas.

(S//NF) The proliferation of access to Internet, computer, and information technology technical skills, software, tools, and databases will allow the rapid development, merging, integration, and manipulation of diverse documents, spreadsheets, multiple databases, and other publicly available or leaked information. Possible enhancements could increase the risk to US forces and could potentially provide potential attackers with sufficient information to plan conventional or terrorist attacks in locations such as Iraq or Afghanistan.

In other words, the government is newly charging Manning with leaking a document that clearly identifies WikiLeaks as a threat to US forces. Read more

Bradley Manning’s New Charges: “Bringing Discredit upon the Armed Forces”

Aside from learning that we–the recipients of a bunch of information Bradley Manning is alleged to have leaked–are the enemy, what did we learn from the new charges the government filed against Bradley Manning yesterday? Most of the charges say the information Manning allegedly leaked were of a nature that they would bring discredit upon the armed forces. Heh.

Here’s a summary of the charges, with my comments (note, these are all allegations–I won’t repeat that remind with each charge, but please keep it in mind):

Charge I; Article 104: Between November 1, 2009 and May 27, 2010, giving intelligence to the enemy, through indirect means.

Note, here’s how that article defines “enemy:”

“Enemy” includes (not only) organized opposing forces in time of war, (but also any other hostile body that our forces may be opposing) (such as a rebellious mob or a band of renegades) (and includes civilians as well as members of military organizations). (“Enemy” is not restricted to the enemy government or its armed forces. All the citizens of one belligerent are enemies of the government and the citizens of the other.)

As I’ll discuss in a follow-up, I think they may be refusing to say who they consider the enemy in one more effort to tie Manning to Julian Assange. But since they don’t specify who the enemy is, we can just assume it is us.

Charge II, Article 134, Specification 1: “Wrongfully and wantonly” causing intelligence to be published in the internet.

This one, it seems to me, might be broad enough to trouble the newspapers that have published the cables.

Charge II, Specification 2: Between February 15 and April 5, 2010, transmitting the Collateral Murder video to someone not entitled to receive it.

The date on this is interesting: WikiLeaks was already boasting of having a video on January 8, and they announced decrypting it (which was a ruse–it was not encrypted) on February 20, which correlates with the timing Manning described in the chat logs. I wonder if the government hasn’t been able to pinpoint when this was transmitted?

Charge II, Specification 3: Between March 22 and 26, 2010, transmitting more than one classified memo to someone not entitled to receive it.

On March 23, the WL twitter feed announced, “We know our possession of the decrypted airstrike video is now being discussed at the highest levels of US command.” This was the time period when it appears Manning, according to the chat logs, was tracking the surveillance of Assange. I suspect this reference pertains to this information.

Charge II, Specification 4: Between December 31, 2009 and January 5, 2010, getting the “Combined Information Data Network Exchange Iraq database” of more than 380,000 records.

This suggests the government believed Manning had this by the first few days of 2010.

Read more

Time to Reevaluate the Importance of Bradley Manning’s Alleged Leak?

Back when WikiLeaks leaked the Collateral Murder video, I was agnostic about the value of the leak. Surely, exposing the cover-up of the killing of the Reuters journalists was important. But I thought the response focused too much on the soldiers who had been trained to respond the way they had, and too little on the architects of the policies that put them in that dehumanizing position.

I personally didn’t delve much into the Afghan cable dump, so I never really assessed its value. And with the sole exception of the Iran hiker cable–which the NYT left dangerously unredacted to make one of its pet points–I found the Iraq cables to be redacted beyond the point of usefulness.

And so it was that in the early days after the State cable release when Joe Lieberman was intervening to try to prevent publication of WikiLeaks, Joe Biden was calling Julian Assange a high tech terrorist, and Sarah Palin was advocating hunting down WikiLeaks like al Qaeda, I was somewhat agnostic on the value of the massive leaks WikiLeaks released. When Floyd Abrams was trying to distinguish “good” leaker Daniel Ellsberg from “bad” alleged leaker Bradley Manning, I knew there had been revelations important to my issues, but I wasn’t sure how Manning’s alleged leak would measure up across time.

That seems like a long, long time ago.

And while we don’t yet know how the State Department cable leaks will weather history, the importance of the leak now seems beyond question. Consider the way the NYT–the Administration’s mole in the press corps–continues to rely on the cable leaks even while it disdains Julian Assange as a bag lady. Indeed, on some stories the NYT is getting scooped on by their former reporters, they use cables as a crutch to catch up.

The NYT is not alone; it seems news outlets around the world have grown accustomed–and downright happy–that these sources are all out there to help them do their jobs.

And consider the range of stories we’ve seen. We’ve seen American pressure on allies to put counterterrorism policies–both data collection and torture–ahead of democracy. We’ve seen how our troops in Iraq knowingly turned over Iraqis to be tortured. We’ve seen our allies in the Middle East promising to cause democratic elections not to take place. And while I definitely don’t think WikiLeaks “caused” the Middle Eastern uprising, they did make it hard for Western elites to defend their former client dictators once the uprisings started.

Over time, I think one of the most damning lessons from the State cables will be evidence of the tolerance for bribery and looting that rots our foreign policy. Thus far, we’ve seen details of our allies’ oil bribery, our disinterest in doing anything about Hosni Mubarak’s or Muammar Qadaffi’s or the Saudis’ looting, We’ve also seen how our government apparently threw its investigation of rich tax cheats to get Switzerland to take three of our Gitmo detainees. Our government complains about the corruption of other countries. But as WikiLeaks makes clear, those complaints are mostly just for public show.

Our government may hate all these disclosures. But they are disclosures we, as citizens, need to demand our government deliver on its promise of democracy.

After all this time, it seems, El Pais editor Javier Moreno seems to have had the right read on these leaks.

A democracy comprises diverse elements: institutions and rules; free and fair elections; independent judges and a free press, among others. At the bottom of all this there are legal procedures. When these are flouted, all the rest is put at risk.

We have come to accept the difference between the government that we elect every five years, and the military, bureaucratic, and diplomatic apparatus that it is sustained by, but that all too often it fails to control. The WikiLeaks cables have confirmed this beyond any doubt.

Ellsberg’s leak of the Pentagon Papers proved our government systematically lied about the war in Vietnam. The WikiLeaks dumps have proved that our government systematically lies about democracy.

George W Bush Won’t Share Stage with Someone Who Has Harmed US Interests

Mark Knoller tweets:

A spokesman says former Pres George W Bush cancelled a speaking appearance tomorrow to avoid sharing stage with Wikileaks’ Julian Assange.

Bush/43 was invited to address the YPO Global Leadership Summit in Denver tomorrow, but cancelled when he learned Assange was too.

A spksmn says Bush/43 won’t share a stage “with a man who has willfully & repeatedly done great harm to the interests of the United States.”

Jeebus.

The Iraq War, by itself, has done far graver harm to the interests of the United States than all of the cables Julian Assange has leaked. And that’s before you consider allowing banksters to ruin our economy. And a whole slew of other things W did, like torture, that willfully hurt US interests.

It’s a wonder W can even share a stage with himself, if that’s his criteria.

The Government’s Amended Twitter Order

After successfully petitioning the court to unseal them, EFF has posted the motion to vacate, motion to unseal court records, and motion to unseal motions it filed in the government’s effort to get Twitter information on several people in its investigation of WikiLeaks. The first motion to unseal has a detail I didn’t know before: Twitter appears to have objected to the government’s first request as being too burdensome to provide, so it trimmed its request.

As reflected in the published order, the government originally requested a bunch of Twitter data relating to Wikileaks, Julian Assange, Bradley Manning, Jacob Appelbaum, Birgitta Jónsdóttir, Rop Gonggrijp, and Jacob Appelbaum, covering the period from November 1, 2009 though the request.

But then–presumably after December 14–the government agreed to narrow the request (the four “people” in this passage are Wikileaks, Appelbaum, Jónsdóttir, and Gonggrijp):

As a result of negotiations between Twitter and the government, to reduce the burden on Twitter and to recognize that Twitter does not have certain of the requested information, Movants understand that the government is presently restricting the time period of its request to November 15, 2009-June 1, 2010, and that the scope of the information sought has been limited to contact information for the four account holders, the addresses used each time Movants logged into their accounts, and information regarding DMs between the four Twitter accounts named in the Order.

The time limitation is not all that surprising: the government alleges that Manning’s illegal activities began on November 19. And they arrested him on May 29.

It’s the other limitations I find interesting: the government is content to get information on the whereabouts (IP Address) of each of the four each time they used Twitter during the period when Manning is alleged to have been leaking to Wikileaks. And, the government is asking to know the timing of each DM the four sent amongst themselves in that period.

Now, presumably the other social media companies the government requested similar information from have since turned it over. In other words, the government may well be happy to limit their request based on what it has already learned from companies less willing to protect their customers’ privacy than Twitter.

Nevertheless, at least from Twitter, they seem to be tracking just this small groups activities in intense form.

The Disinformation Campaign Bank of America Considered

Wikileaks has posted the presentation three security companies–Palantir, HBGary Federal, and Berico Technologies–made to Bank of America, proposing to help it respond to Wikileaks.

In addition to the degree to which the proposal emphasizes the national security ties and military background of the employees of the company (particularly Berico), the presentation fleshes out what the companies proposed. Under potential proactive tactics, it lists:

  • Feed the fuel between the feuding groups. Disinformation. Create messages around actions to sabotage or discredit the opposing organization. Submit fake documents and then call out the error.
  • Create concern over the security of the infrastructure. Create exposure stories. If the process is believed to not be secure they are done.
  • Cyber attacks against the infrastructure to get data on document submitters. This would kill the project. Since the servers are now in Sweden and France putting a team together to get access is more straightforward.
  • Media campaign to push the radical and reckless nature of wikileaks activities. Sustained pressure. Does nothing for the fanatics, but creates concern and doubt amongst moderates.
  • Search for leaks. Use social media to profile and identify risky behavior of employees.

Of particularly interest, they describe HBGary Federal’s abilities to conduct INFOOPS, including “influence operations” and “social media exploitation.”

In other words, in addition to proposing to conduct cyber attacks on Wikileaks’ European-based infrastructure (complete with a picture of WL’s bomb shelter-housed servers), the proposal appears to recommend that these companies be paid to troll social media, like Twitter, to not only “identify risky behavior of employees” but also, presumably, “push the radical and reckless nature of wikileaks activities.” You know–the kind of trolling we often see targeted at Glenn (and in recent days targeted against David House, who was also listed in this presentation).

In addition, the presentation proposes to create a concern over the security of the infrastructure. Interestingly, when additional newspapers in Europe got copies of the State cables (including Aftenposten), some people speculated that the files had come from a hack of Wikileaks servers. (Note how the slide above notes the disgruntled WL volunteers.)

That doesn’t mean we’re seeing this campaign in process. After all, Glenn has a ton of enemies on Twitter. And if the intent behind leaking additional copies of the cables was to suggest WL’s infrastructure had been hacked, that perception has largely dissipated as more and more newspapers get copies.

One final note: according to Tech Herald, the law firm pitching these firms, Hunton and Williams, was itself recommended to BoA by DOJ. As the presentation makes clear, these are significant government contractors. (Remember, we’re getting these documents because Anonymous hacked HBGary Federal, which was offering what it had collected to DOJ.) To what extent is what we’re seeing just an extension of what our own government is trying to combat Wikileaks?