Posts

Security Firms Pitching Bank of America on WikiLeaks Response Proposed Targeting Glenn Greenwald

On Saturday, private security firm HBGary Federal bragged to the FT that it had discovered who key members of the hacking group Anonymous are. In response, Anonymous hacked HB Gary Federal and got 44,000 of their emails and made them publicly available.

You believe that you can sell the information you’ve found to the FBI? False. Now, why is this one false? We’ve seen your internal documents, all of them, and do you know what we did? We laughed. Most of the information you’ve “extracted” is publicly available via our IRC networks. The personal details of Anonymous “members” you think you’ve acquired are, quite simply, nonsense.

So why can’t you sell this information to the FBI like you intended? Because we’re going to give it to them for free. Your gloriously fallacious work can be a wonder for all to scour, as will all of your private emails (more than 44,000 beauties for the public to enjoy). Now as you’re probably aware, Anonymous is quite serious when it comes to things like this, and usually we can elaborate gratuitously on our reasoning behind operations, but we will give you a simple explanation, because you seem like primitive people:

You have blindly charged into the Anonymous hive, a hive from which you’ve tried to steal honey. Did you think the bees would not defend it? Well here we are. You’ve angered the hive, and now you are being stung.

As TechHerald reports, among those documents was a presentation, “The Wikileaks Threat,” put together by three data intelligence firms for Bank of America in December. As part of it, they put together what they claimed was a list of important contributors to WikiLeaks. They suggested that Glenn Greenwald’s support was key to WikiLeaks’ ongoing survival.

The proposal starts with an overview of WikiLeaks, including some history and employee statistics. From there it moves into a profile of Julian Assange and an organizational chart. The chart lists several people, including volunteers and actual staff.

One of those listed as a volunteer, Salon.com columnist, Glenn Greenwald, was singled out by the proposal. Greenwald, previously a constitutional law and civil rights litigator in New York, has been a vocal supporter of Bradley Manning, who is alleged to have given diplomatic cables and other government information to WikiLeaks. He has yet to be charged in the matter.

Greenwald became a household name in December when he reported on the “inhumane conditions” of Bradley Manning’s confinement at the Marine brig in Quantico, Virginia. Since that report, Greenwald has reported on WikiLeaks and Manning several times.

“Glenn was critical in the Amazon to OVH transition,” the proposal says, referencing the hosting switch WikiLeaks was forced to make after political pressure caused Amazon to drop their domain.

As TechHerald notes, an earlier version of the slide said support from people like Glenn needed to be “attacked.”

Now aside from the predictable, but nevertheless rather shocking detail, that these security firms believed the best way to take WikiLeaks out was to push Glenn to stop supporting them, what the fuck are they thinking by claiming that Glenn weighs “professional preservation” against “cause”? Could they be more wrong, painting Glenn as a squeamish careerist whose loud support for WikiLeaks (which dates back far longer than these security firms seem to understand) is secondary to “professional preservation”? Do they know Glenn is a journalist? Do they know he left the stuffy world of law? Have they thought about why he might have done that? Are they familiar at all with who Glenn is? Do they really believe Glenn became a household name–to the extent that he did–just in December?

I hope Bank of America did buy the work of these firms. Aside from the knowledge that the money would be–to the extent that we keep bailing out Bank of America–taxpayer money, I’d be thrilled to think of BoA pissing away its money like that. The plan these firms are pushing is absolutely ignorant rubbish. They apparently know almost nothing about what they’re pitching, and have no ability to do very basic research.

Which is precisely the approach I’d love to see BoA use to combat whatever WikiLeaks has coming its way.

What State Wanted Withheld from WikiLeaks Publication

There are now four versions of the cooperation between WikiLeaks and its journalistic “partners:” Vanity Fair, NYT, Guardian, and Spiegel. A comparison of them is more instructive than reading any in isolation.

For example, compare how the NYT and Spiegel describe the three things the State Department asked journalistic partners not to publish during the lead-up to publication of the diplomatic cables. The NYT says State asked them not to publish individual sources, “sensitive American programs,” and candid comments about foreign leaders.

The administration’s concerns generally fell into three categories. First was the importance of protecting individuals who had spoken candidly to American diplomats in oppressive countries. We almost always agreed on those and were grateful to the government for pointing out some we overlooked.

“We were all aware of dire stakes for some of the people named in the cables if we failed to obscure their identities,” Shane wrote to me later, recalling the nature of the meetings. Like many of us, Shane has worked in countries where dissent can mean prison or worse. “That sometimes meant not just removing the name but also references to institutions that might give a clue to an identity and sometimes even the dates of conversations, which might be compared with surveillance tapes of an American Embassy to reveal who was visiting the diplomats that day.”

The second category included sensitive American programs, usually related to intelligence. We agreed to withhold some of this information, like a cable describing an intelligence-sharing program that took years to arrange and might be lost if exposed. In other cases, we went away convinced that publication would cause some embarrassment but no real harm.

The third category consisted of cables that disclosed candid comments by and about foreign officials, including heads of state. The State Department feared publication would strain relations with those countries. We were mostly unconvinced.

Spiegel describes those three things slightly differently. It says State asked them to withhold government sources, cables with security implications, and “cables relating to counterterrorism.”

At first, less than a week before the upcoming publication of the leaked documents, Clinton’s diplomats wanted three things from the participating media organizations. First, they wanted the names of US government sources to be protected if leaks posed a danger to life and limb. This was a policy that all five media organizations involved already pursued. Second, they asked the journalists to exercise restraint when it came to cables with security implications. Third, they asked them to be aware that cables relating to counterterrorism are extremely sensitive.

Now the discrepancy may mean nothing. Both agree State had three categories of information they wanted withheld. Both agree State asked the newspapers to withhold both the names of sources and details on intelligence programs. But since the NYT notes the journalistic partners didn’t take the third category–candid comments–very seriously, perhaps Spiegel just misremembered what that third category was, or just remembered a particular focus on counterterrorism. Presumably, after all, the counterterrorism programs would be included in category two.

But whatever the cause of the discrepancy, I am intrigued that Spiegel emphasizes counterterrorism programs rather than candid comments about foreign officials, not least because the Spiegel article describes working with US Ambassador to Germany Philip Murphy directly. Consider the two most sensitive revelations pertaining to Germany and counterterrorism. First, there was the news of Philip Murphy personally bad-mouthing the Free Democratic Party’s opposition to US vacuuming up European data, particularly as it relates to the SWIFT database. Then there are negotiations about whether Germany would prosecute Americans involved in the rendition of Khalid El-Masri. As I showed, it appears that Condi was telling German Foreign Minister Frank-Walter Steinmeier one thing about a subpoena for those Americans, followed quickly by the American Deputy Chief of Mission “correcting” the US position on it.

That is, on both major disclosures about US counterterrorism cooperation with the Germans, the US has reason to be embarrassed about its two-faced dealing with German officials.

In other words, there may be no discrepancy. It is possible that the third category of information State wanted suppressed has to do not with the substance of our counterterrorism program (after all, both the details of SWIFT and of our rendition program have been widely publicized), but with the degree to which our private diplomacy belies all the public claims we make about counterterrorism.

The NYT’s “Heads Up” Meeting with the FBI on Wikileaks

The NYT has a very long profile on their interactions with Wikileaks, about which I will have more to say.

But I wanted to point to this meeting, which Bill Keller describes as the NYT’s effort to give the government a “heads up” on the diplomatic cables.

Because of the range of the material and the very nature of diplomacy, the embassy cables were bound to be more explosive than the War Logs. Dean Baquet, our Washington bureau chief, gave the White House an early warning on Nov. 19. The following Tuesday, two days before Thanksgiving, Baquet and two colleagues were invited to a windowless room at the State Department, where they encountered an unsmiling crowd. Representatives from the White House, the State Department, the Office of the Director of National Intelligence, the C.I.A., the Defense Intelligence Agency, the F.B.I. and the Pentagon gathered around a conference table. Others, who never identified themselves, lined the walls. A solitary note-taker tapped away on a computer. [my emphasis]

It’s bad enough that–as Keller also reports–the NYT has no secure communications.

But is it also the habit of the NYT to meet with the government–including the FBI–on upcoming stories? For all the NYT’s insistence, with Judy Miller, that they would not be an accomplice to a government investigation, what the hell were they doing meeting with the FBI before they published a story?

Did Manning Zerofill His Computers? Or Did the Military?

Wired has a post on MSNBC’s report that “there is apparently no evidence he passed the files directly to [Julian] Assange, or had any direct contact with the controversial WikiLeaks figure.” In it, Kim Zetter looks to the chat logs to try to explain why there is no such evidence.

If it’s true that investigators have found no evidence linking Manning and Assange, it may be because Manning allegedly erased it from his system. He discussed doing so in his chats with Lamo. Manning noted in the chats that any incriminating evidence of his activities had been “zerofilled”, or erased, from his computers:

But that’s not precisely what the passage she quotes says. Note, because I’ve used a different selection of chat log than Zetter, I have bolded the part she included in her selection (though she includes in her post).

(02:13:51 AM) Lamo: Why does your job afford you access?

(02:13:59 AM) Lamo: except for the UN.

(02:14:03 AM) Manning: because i have a workstation

(02:14:15 AM) Lamo: and World Bank.

(02:14:17 AM) Manning: *had*

(02:14:36 AM) Lamo: So you have these stored now?

(02:14:54 AM) Manning: i had two computers… one connected to SIPRNET the other to JWICS…

(02:15:07 AM) Manning: no, they’re government laptops

(02:15:18 AM) Manning: they’ve been zerofilled

(02:15:22 AM) Manning: because of the pullout

(02:15:57 AM) Manning: evidence was destroyed… by the system itself

(02:16:10 AM) Lamo: So how would you deploy the cables? If at all.

(02:16:26 AM) Manning: oh no… cables are reports

(02:16:34 AM) Lamo: ah

(02:16:38 AM) Manning: State Department Cable = a Memorandum

(02:16:48 AM) Lamo: embassy cables?

(02:16:54 AM) Manning: yes

(02:17:00 AM) Manning: 260,000 in all

(02:17:10 AM) Manning: i mentioned this previously

(02:17:14 AM) Lamo: yes

(02:17:31 AM) Lamo: stored locally, or retreiveable?

(02:17:35 AM) Manning: brb latrine =P

(02:17:43 AM) Manning: i dont have a copy anymore

(02:17:59 AM) Lamo: *nod*

(02:18:09 AM) Manning: they were stored on a centralized server…

(02:18:34 AM) Lamo: what’s your endgame plan, then?

(02:18:36 AM) Manning: it was vulnerable as fuck

As Zetter correctly notes, in this passage Manning suggests files had been zerofilled. But in this passage, he doesn’t say he did it.

Now, in a separate section, Manning says he zerofilled the original of the Rejkjavik 13 cable.

(1:48:50 PM) Lamo: give me some bona fides … yanno? any specifics.

(1:49:40 PM) Manning: this one was a test: Classified cable from US Embassy Reykjavik on Icesave dated 13 Jan 2010

(1:50:30 PM) Manning: the result of that one was that the icelandic ambassador to the US was recalled, and fired

(1:51:02 PM) Manning: thats just one cable…

(1:51:14 PM) Lamo: Anything unreleased?

(1:51:25 PM) Manning: i’d have to ask assange

(1:51:53 PM) Manning: i zerofilled the original

(1:51:54 PM) Lamo: why do you answer to him?

(1:52:29 PM) Manning: i dont… i just want the material out there… i dont want to be a part of it [my emphasis]

Contextually, this might suggest that both mentions of zerofilling refer to the same–all 250,000 cables–since they both come in response to Lamo’s probing questions about the cables. Indeed, Manning’s reference to zerofilling himself, in the context of the Rejkjavik cable, may explain why he no longer has access to any cables he could give Lamo to prove his bona fides. But even if both references both mean to include all the cables, it would remain ambiguous whether Manning zerofilled his computer or someone else did.

Read more

Government Admits Brig Commander Improperly Put Bradley Manning on Suicide Watch

Quantico entrance. (photo: crowdive on Flickr)

The government has admitted to MSNBC that the Brig Commander at Quantico improperly put Bradley Manning on suicide watch last week.

The officials told NBC News, however, that a U.S. Marine commander did violate procedure when he placed Manning on “suicide watch” last week.

Military officials said Brig Commander James Averhart did not have the authority to place Manning on suicide watch for two days last week, and that only medical personnel are allowed to make that call.

The official said that after Manning had allegedly failed to follow orders from his Marine guards. Averhart declared Manning a “suicide risk.” Manning was then placed on suicide watch, which meant he was confined to his cell, stripped of most of his clothing and deprived of his reading glasses — anything that Manning could use to harm himself. At the urging of U.S. Army lawyers, Averhart lifted the suicide watch.

So Manning allegedly fails to follow an order and the Brig Commander decides he loses his glasses and is stripped of his clothing?

Remember, Manning has not been convicted of anything yet.

The rest of the article describes that the government has been unable to link Manning to Julian Assange. Maybe that’s why they took his glasses away.

Update: This certainly puts the events from Quantico yesterday in a different light. According to MSNBC, government lawyers realized last week Manning had been improperly treated. By preventing David House from visiting Manning yesterday, they made sure that he wouldn’t have confirmation of that from Manning directly. But since Jane and David’s comments said they’d be back next week, DOD realized they’d need to ‘fess up themselves.

American Democracy, Tunisia, and Wikileaks

Update: BBC and al-Jazeera report that Ben Ali has left the country and security forces have arrested family members at the airport.

The simultaneous (and related) unfolding of the uprising in Tunisia and the latest Wikileaks events reveals a great deal about our own country’s support for democracy.

If you aren’t already, I recommend you follow @abuaardvark (aka Mark Lynch) so long as this crisis in Tunisia lasts. Not only is Lynch following the up-to-the-minute events closely on Twitter–such as the news that dictator Zine el Abidine Ben Ali just sacked his government and will hold elections six months from now. But he also has chronicled the strange silence about this popular uprising in the US, particularly among the NeoCons who used democracy promotion as their excuse to launch an illegal war in Iraq.

Barely a month goes by without a Washington Post editorial bemoaning Egypt’s authoritarian retrenchment and criticizing the Obama administration’s alleged failure to promote Arab democracy. But now Tunisia has erupted as the story of the year for Arab reformers. The spiraling protests and the regime’s heavy-handed, but thus far ineffective, repression have captured the imagination of Arab publics, governments, and political analysts. Despite Tunis’s efforts to censor media coverage, images and video have made it out onto social media and up to Al Jazeera and other satellite TV. The “Tunisia scenario” is now the term of art for activist hopes and government fears of political instability and mass protests from Jordan to Egypt to the Gulf.

[snip]

Perhaps they’ve had nothing to say simply because there has been little coverage of Tunisia in the Western media, and the United States has few interests or leverage in Tunis, making it a marginal issue for U.S. political debate. Tunisia is not generally on the front burner in American thinking about the Middle East. It’s far away from Israel, Iraq, and the Gulf, and plays little role in the headline strategic issues facing the U.S. in the region. Despite being one of the most repressive and authoritarian regimes in the region, Tunisia has generally been seen as a model of economic development and secularism. Its promotion of women’s rights and crushing of Islamist opposition has taken priority in the West over its near-complete censorship of the media and blanket domination of political society. Indeed, the United States has cared so little about Tunisia’s absolute rejection of democracy and world-class censorship that it chose it for the regional office of MEPI, the Bush administration’s signature democracy promotion initiative.

This is understandable, but hardly satisfying. I can understand the hesitation of U.S. officials to take a strong position on the side of either the protesters or the regime at this point, given the strategic complexities and the implications of taking any rhetorical stance. To my ears, at least, the U.S. message has been muddled, with some officials seeming to take the side of the protesters and warning against too-harsh repression and others seeming to avoid taking a stance. For what it’s worth, I told a State Department official in a public forum yesterday that the absence of major U.S. interests in Tunisia and the real prospect of change there make it a good place for the Obama administration to take a principled stand in favor of public freedoms and against repression.

Click through for his update–a response to a WaPo column regarding such populist uprising as a threat.

With Lynch’s comments in mind, consider two different versions of the role of Wikileaks in this uprising.

Elizabeth Dickinson has a piece that–perhaps too strongly–calls Wikileaks “a trigger and a tool for political outcry” in Tunisia.

Tunisia’s government doesn’t exactly get a flattering portrayal in the leaked State Department cables. The country’s ruling family is described as “The Family” — a mafia-esque elite who have their hands in every cookie jar in the entire economy. “President Ben Ali is aging, his regime is sclerotic and there is no clear successor,” a June 2009 cable reads. And to this kleptocracy there is no recourse; one June 2008 cable claims: “persistent rumors of corruption, coupled with rising inflation and continued unemployment, have helped to fuel frustration with the GOT [government of Tunisia] and have contributed to recent protests in southwestern Tunisia. With those at the top believed to be the worst offenders, and likely to remain in power, there are no checks in the system.”

Of course, Tunisians didn’t need anyone to tell them this. But the details noted in the cables — for example, the fact that the first lady may have made massive profits off a private school — stirred things up. Matters got worse, not better (as surely the government hoped), when WikiLeaks was blocked by the authorities and started seeking out dissidents and activists on social networking sites.

As PayPal and Amazon learned last year, WikiLeaks’ supporters don’t take kindly to being denied access to the Internet. And the hacking network Anonymous launched an operation, OpTunisia, against government sites “as long as the Tunisian government keep acting the way they do,” an Anonymous member told the Financial Times.

Compare that the very weird logic State Department Spokesperson Philip Crowley uses in his speech to a class on media and politics the other day.

No one is a greater advocate for a vibrant independent and responsible press, committed to the promotion of freedom of expression and development of a true global civil society, than the United States. Every day, we express concern about the plight of journalists (or bloggers) around the world who are intimidated, jailed or even killed by governments that are afraid of their people, and afraid of the empowerment that comes with the free flow of information within a civil society.

Most recently, we did so in the context of Tunisia, which has hacked social media accounts while claiming to protect their citizens from the incitement of violence. But in doing so, we feel the government is unduly restricting the ability of its people to peacefully assemble and express their views in order to influence government policies. These are universal principles that we continue to support.  And we practice what we preach. Just look at our own country and cable television. We don’t silence dissidents. We make them television news analysts.

Some in the human rights community in this country, and around the world, are questioning our commitment to freedom of expression, freedom of the press and Internet freedom in the aftermath of WikiLeaks.  I am constrained in what I can say, both because individual cables remain classified, and the leak is under investigation by the Department of Justice. But let me briefly put this in context and then I will open things up for questions.  WikiLeaks is about the unauthorized disclosure of classified information. It is not an exercise in Internet freedom. It is about the legitimate investigation of a crime. It is about the need to continue to protect sensitive information while enabling the free flow of public information. [my emphasis]

He sort of wanders back and forth between a discussion of press freedom and an insistence that persecution of Wikileaks is not a violation of that principle through the rest of his speech, at one point drawing a bizarre analogy between Coke’s secret formula and Google’s search algorithms and the US’ diplomatic secrets, as if our diplomatic secrets are the essence of our identity.

Maybe that was his point.

I find Crowley’s statement in the quoted passage interesting for several reasons. Read more

WikiLeaks Media Files: Are They Definitely Fox?

As a number of people are reporting, Julian Assange told John Pilger Wednesday that WikiLeaks has files on some media companies. Thanks to a PDF link made available by The Nation (see 12:05 update), here’s the exact quote from the New Statesman article in question.

If something happens to me or to WikiLeaks, ‘insurance’ files will be released. They speak more of the same truth to power, including the media. There are 504 US embassy cables on one broadcasting organization and there are cables on Murdoch and News Corp.”

I wanted to look at the exact quote, because coverage of this claim has been conflated into “insurance files = 504 cables = Murdoch, News Corp, and Fox.” That is, the assumption is that some of the insurance files pertain to a subset of 504 cables that pertain to a broadcasting organization that given the mention of Murdoch and News Corp, must be Fox.

That’s not necessarily the case: after all, Assange appears to have talked about insurance files, some of which pertain to the media, and then discussed 504 cables on one broadcasting entity, and then mentioned Murdoch and News Corp. It is possible that there are 504 cables on a broadcast outlet — something like ABC, which has a habit of laundering intelligence leaks, or NBC, owned by a defense contractor. These cables might reveal something like the Rent-A-General’s program, first exposed by NYT. And there are files on Murdoch and News Corp. generally (which could include any of his properties worldwide).

Mind you, in its coverage of the issue, the Guardian (which as it points out, has access to all the cables) doesn’t exactly correct such a misimpression, if it is one.

WikiLeaks: Julian Assange claims to have Rupert Murdoch ‘insurance files’

Founder claims WikiLeaks has more than 500 US diplomatic cables on one broadcasting organisation

Julian Assange, the founder of WikiLeaks, claimed today he was in possession of “insurance” files on Rupert Murdoch and his global media company, News Corporation.

Assange also claimed that WikiLeaks holds more than 500 confidential US diplomatic cables on one broadcasting organisation.

Speaking to journalist John Pilger for an interview to be published tomorrow in the latest edition of the New Statesman, Assange said: “There are 504 US embassy cables on one broadcasting organisation and there are cables on Murdoch and News Corp.”

Assange refers to these specific cables as “insurance files” that will be released “if something happens to me or to WikiLeaks”.

The Guardian has published stories based on more than 700 of the cables and has access to all 250,000.

Which I find all the more interesting, in that it suggests the media involved — including the Guardian, NYT, and Norway’s Aftenposten (which obtained its own complete set of the cables) — all have seen what Assange considers the insurance files relating to Murdoch, if not Fox.

So what would be shocking enough about Fox and or Murdoch to consider it part of an “insurance” file?

Why Did Bradley Manning Allegedly Leak WikiLeaks Two Things before He Verified Assange’s Identity?

To return to the work I was doing yesterday, there’s something odd about the timeline of Bradley Manning’s alleged leaks to WikiLeaks: he appears to give WikiLeaks at least two things–the Rejkjavik 13 cable and the Collateral Murder video–before he verified Julian Assange’s identity.

In the chat logs, Manning explains he first started working with WikiLeaks after they released the 9/11 pager messages.

(12:46:17 PM) Adrian: how long have you helped WikiLeaks?

(12:49:09 PM) bradass87: since they released the 9/11 “pager messages”

(12:49:38 PM) bradass87: i immediately recognized that they were from an NSA database, and i felt comfortable enough to come forward

(12:50:20 PM) bradass87: so… right after thanksgiving timeframe of 2009

That would date it November 24 or 25. Interestingly, the government says Manning’s alleged activities began somewhat earlier, November 19. That may suggest they have reason to believe he may have first accessed materials he was not authorized to access on November 19.

There’s a curious break in the chat logs (where Lamo makes his first efforts to get Manning to talk about operation security, while Manning loses it), after which Manning seems to correct Lamo’s suggestion that he’s a WL volunteer. But that does lead Manning to discuss communicating directly with Assange.

(2:04:29 PM) Manning: im a source, not quite a volunteer

(2:05:38 PM) Manning: i mean, im a high profile source… and i’ve developed a relationship with assange… but i dont know much more than what he tells me, which is very little

(2:05:58 PM) Manning: it took me four months to confirm that the person i was communicating was in fact assange

(2:10:01 PM) Lamo: how’d you do that?

(2:12:45 PM) Manning: I gathered more info when i questioned him whenever he was being tailed in Sweden by State Department officials… i was trying to figure out who was following him… and why… and he was telling me stories of other times he’s been followed… and they matched up with the ones he’s said publicly

(2:14:28 PM) Lamo: did that bear out? the surveillance?

(2:14:46 PM) Manning: based on the description he gave me, I assessed it was the Northern Europe Diplomatic Security Team… trying to figure out how he got the Reykjavik cable…

(2:15:57 PM) Manning: they also caught wind that he had a video… of the Gharani airstrike in afghanistan, which he has, but hasn’t decrypted yet… the production team was actually working on the Baghdad strike though, which was never really encrypted

As I suggested yesterday, that would mean that Manning had not verified Assange’s identity until roughly March 24. That would coincide exactly with the Wikileak Twitter account’s discussion of US and Icelandic surveillance. Of potential note, on March 23, WL said, “We know our possession of the decrypted airstrike video is now being discussed at the highest levels of US command,” which might be information Manning had access to. While not definitive, all of that suggests the public discussion was one way Manning verified “that the person i was communicating was in fact assange.”

But there were at least two things Manning had already allegedly leaked to WikiLeaks: the Collateral Murder video and the Rejkjavik 13 cable. A possible third which I will not deal with here is the intelligence report naming WikiLeaks as a threat to the military, which was released March 18, 2010, but which is not definitely attributable even hypothetically to Manning.

Collateral Murder Timing

WL first reported getting what appear to be the Collateral Murder and Gharani videos on January 8, 2010.

Have encrypted videos of US bomb strikes on civilians http://bit.ly/wlafghan2 we need super computer time http://ljsf.org/

On February 20, it claimed to have cracked the encryption code of what appears to be the Collateral Murder video.

Finally cracked the encryption to US military video in which journalists, among others, are shot. Thanks to all who donated $/CPUs.

For his part, Manning describes just stumbling upon the Collateral Murder video, did some research into what it was, then stewed on it for a month and a half before forwarding to WL.

(03:07:53 PM) Manning: i watched that video cold, for instance

(03:10:32 PM) Manning: at first glance… it was just a bunch of guys getting shot up by a helicopter… no big deal… about two dozen more where that came from right… but something struck me as odd with the van thing… and also the fact it was being stored in a JAG officer’s directory… so i looked into it… eventually tracked down the date, and then the exact GPS co-ord… and i was like… ok, so thats what happened… cool… then i went to the regular internet… and it was still on my mind… so i typed into goog… the date, and the location… and then i see this http://www.nytimes.com/2007/07/13/world/middleeast/13iraq.html

(03:11:07 PM) Manning: i kept that in my mind for weeks… probably a month and a half… before i forwarded it to [WikiLeaks]

He dates uploading the video sometime in February.

(02:47:07 PM) Manning: the CM video came from a server in our domain! and not a single person noticed

(02:47:21 PM) Lamo: CM?

(02:48:17 PM) Manning: Apache Weapons Team video of 12 JUL 07 airstrike on Reuters Journos… some sketchy but fairly normal street-folk… and civilians

(02:48:52 PM) Lamo: How long between the leak and the publication?

(02:49:18 PM) Manning: some time in february

(02:49:25 PM) Manning: it was uploaded

(02:50:04 PM) Lamo: uploaded where? how would i transmit something if i had similarly damning data

(02:51:49 PM) Manning: uhm… preferably openssl the file with aes-256… then use sftp at prearranged drop ip addresses

(02:52:08 PM) Manning: keeping the key separate… and uploading via a different means

(02:52:31 PM) Lamo: so i myself would be SOL w/o a way to prearrange

(02:54:33 PM) Manning: not necessarily… the HTTPS submission should suffice legally… though i’d use tor on top of it…

Now, those are seemingly contradictory sets of dates: WL boasts it has Gharani, at least, in January, though the February reference to decrypting it seems to mean Collateral Murder was included in the January announcement. But note that if Manning had first accessed the Collateral Murder video on November 19, a month and a half might put it close to the New Year.

In any case, however, both WL and Manning seem to agree the video was in hand by February, a month before (assuming Manning’s description of the verification process is accurate) Manning verified Assange’s identity. Read more

What the Government Might Be After with Its Twitter Subpoena

After a member of Iceland’s Parliament and former Wikileaks volunteer, Birgitta Jónsdóttir, revealed on Twitter yesterday that Twitter has been subpoenaed for details on her Twitter account, Glenn got a copy of the subpoena. The subpoena was first submitted to Twitter on December 14, and asked for account information for six people as well as any account associated with Wikileaks, going back to November 1, 2009. Of particular note, they ask for:

records of user activity for any connections made to or from the Account, including the date, time, length, and method of connections, data transfer volume, user name, and source and destination Internet Protocol address(es).

non-content information associated with the contents of any communication or file stored by or for the account(s), such as the source and destination email addresses and IP addresses.

By getting the IP addresses, they might be able to tie a location to the Wikileaks activity (though I would imagine some of the subpoenaed people shield that kind of information).

Here’s what they might be after.

There’s a passage in the chat logs in which Manning describes how he confirmed he was communicating directly with Julian Assange. This passage comes on May 22, allegedly before Adrian Lamo was cooperating with investigators (but there are reasons to question that).

(2:05:58 PM) Manning: it took me four months to confirm that the person i was communicating was in fact assange

(2:10:01 PM) Lamo: how’d you do that?

(2:12:45 PM) Manning: I gathered more info when i questioned him whenever he was being tailed in Sweden by State Department officials… i was trying to figure out who was following him… and why… and he was telling me stories of other times he’s been followed… and they matched up with the ones he’s said publicly

(2:14:28 PM) Lamo: did that bear out? the surveillance?

(2:14:46 PM) Manning: based on the description he gave me, I assessed it was the Northern Europe Diplomatic Security Team… trying to figure out how he got the Reykjavik cable…

While Manning doesn’t say that these conversations took place on Twitter (I’ll come back to this), we know that Wikileaks, at least, was revealing details of the government’s surveillance of it on Twitter. A series of Tweets from late March describe heavy State Department surveillance. Several of the tweets reference the production of the Collateral Murder video. Now mind you, this was a month or more after Manning would have leaked the video itself. But this tweet makes me wonder whether Manning didn’t continue monitoring surveillance and response.

We know our possession of the decrypted airstrike video is now being discussed at the highest levels of US command.

In other words, this may be evidence on Twitter of the Wikileaks team learning information that Manning might have provided them.

As Glenn points out, three of the people covered by the subpoena were involved in the production of the video.

the three named producers of the “Collateral Murder” video — depicting and commenting on the U.S. Apache helicopter attack on journalists and civilians in Baghdad — were Assange, Jónsdóttir, and Gonggrijp (whose name is misspelled in the DOJ’s documents).  Since Gonggrijp has had no connection to WikiLeaks for several months and Jónsdóttir’s association has diminished substantially over time, it seems clear that they were selected due to their involvement in the release of that film.

One of the things the government may be trying to do is to pinpoint what IP was involved in the tweets revealing the surveillance, to try to tie any conversation about that surveillance to conversations with Manning, and in turn tie those conversations to their theory that the Wikileaks team conspired to leak this information.

Manning says he tracked this kind of surveillance to confirm that he was contacting Assange directly. The government may be trying to retrace his tracks in confirming Assange’s identity, too.

[This post was updated after it was first posted.]

Assange Alerts His Hostages

Remember how I suggested that Obama was establishing a practice of only making deals with people–whether they be Republicans or Democrats–who take hostages?

Well, Julian Assange just made it clear who his hostages are:

Top officials in several Arab countries have close links with the CIA, and many officials keep visiting US embassies in their respective countries voluntarily to establish links with this key US intelligence agency, says Julian Assange, founder of the whistle-blowing website, WikiLeaks.“These officials are spies for the US in their countries,” Assange told Al Jazeera Arabic channel in an interview yesterday.

The interviewer, Ahmed Mansour, said at the start of the interview which was a continuation of last week’s interface, that Assange had even shown him the files that contained the names of some top Arab officials with alleged links with the CIA.

[snip]

“If I am killed or detained for a long time, there are 2,000 websites ready to publish the remaining files. We have protected these websites through very safe passwords,” said Assange.

Assange’s message–on Al Jazeera, in a message directed to “the Arab Street”? If he is disappeared or killed or put away, the names of America’s stooges in the Middle East will be released on some outlet like Al Jazeera.

Given that some of those people are probably our crack oil dealers from Saudi Arabia, I can imagine how such a message might be persuasive–and might be made to be persuasive to the US government.

Mind you, we already know that the US has a long history of close ties between its clients–even with people like Saddam Hussein–and the CIA. We already knew this.

Much like we already knew this:

Some Arab countries even have torture houses where Washington regularly sends ‘suspects’ for ‘interrogation and torture’, he said.

But I would imagine Jordanians and Egyptians (in the case of our torturers) would be very interested in reading how their country tortured other Arabs at the behest of the US.