Jack Blum’s Client Goes to Wikileaks

A man about to go on trial in Switzerland for breaking that country’s secrecy laws has promised to give details of 2,000 individuals and corporations who are hiding their money in offshore accounts to Wikileaks tomorrow.

The offshore bank account details of 2,000 “high net worth individuals” and corporations – detailing massive potential tax evasion – will be handed over to the WikiLeaks organisation in London tomorrow by the most important and boldest whistleblower in Swiss banking history, Rudolf Elmer, two days before he goes on trial in his native Switzerland.

British and American individuals and companies are among the offshore clients whose details will be contained on CDs presented to WikiLeaks at the Frontline Club in London. Those involved include, Elmer tells the Observer, “approximately 40 politicians”.

Elmer, who after his press conference will return to Switzerland from exile in Mauritius to face trial, is a former chief operating officer in the Cayman Islands and employee of the powerful Julius Baer bank, which accuses him of stealing the information.

That’s interesting enough. But I’m equally interested because of who Elmer’s lawyer is: Jack Blum. Blum explains why Elmer has resorted to leaking this to Wikileaks.

“My understanding is that my client’s attempts to get the banks to act over various complaints he made came to nothing internally,” says Elmer’s lawyer, Jack Blum, one of America’s leading experts in tracking offshore money. “Neither would the Swiss courts act on his complaints. That’s why he went to WikiLeaks.”

Calling Blum, “one of America’s leading experts in tracking offshore money” doesn’t convey the degree to which Blum’s investigations–perhaps most famously of BCCI–exposed the ties of the very powerful to corrupt money. After Blum’s Senate investigation of BCCI got too close to the Democratic fixer Clark Clifford, he was fired; he had to bring his work to NY’s DA and the press to reveal what he had found.

In a book review for HuffPo last year, Blum described how important it is to map the networks that run our world, yet noted that doing so has gotten more difficult since he first started investigating such things.

When I came to Washington 45 years ago to work as an investigator for the Senate Antitrust Subcommittee, a senior investigator with years of experience told me that the beginning of any good investigation was a clear understanding of the players. “Everyone you will look at has a history,” he explained. “They will have mentors and sponsors. They will have networks of political and business connections. They will play many roles. If you understand those, everything else will fall into place.”

Read more

American Democracy, Tunisia, and Wikileaks

Update: BBC and al-Jazeera report that Ben Ali has left the country and security forces have arrested family members at the airport.

The simultaneous (and related) unfolding of the uprising in Tunisia and the latest Wikileaks events reveals a great deal about our own country’s support for democracy.

If you aren’t already, I recommend you follow @abuaardvark (aka Mark Lynch) so long as this crisis in Tunisia lasts. Not only is Lynch following the up-to-the-minute events closely on Twitter–such as the news that dictator Zine el Abidine Ben Ali just sacked his government and will hold elections six months from now. But he also has chronicled the strange silence about this popular uprising in the US, particularly among the NeoCons who used democracy promotion as their excuse to launch an illegal war in Iraq.

Barely a month goes by without a Washington Post editorial bemoaning Egypt’s authoritarian retrenchment and criticizing the Obama administration’s alleged failure to promote Arab democracy. But now Tunisia has erupted as the story of the year for Arab reformers. The spiraling protests and the regime’s heavy-handed, but thus far ineffective, repression have captured the imagination of Arab publics, governments, and political analysts. Despite Tunis’s efforts to censor media coverage, images and video have made it out onto social media and up to Al Jazeera and other satellite TV. The “Tunisia scenario” is now the term of art for activist hopes and government fears of political instability and mass protests from Jordan to Egypt to the Gulf.

[snip]

Perhaps they’ve had nothing to say simply because there has been little coverage of Tunisia in the Western media, and the United States has few interests or leverage in Tunis, making it a marginal issue for U.S. political debate. Tunisia is not generally on the front burner in American thinking about the Middle East. It’s far away from Israel, Iraq, and the Gulf, and plays little role in the headline strategic issues facing the U.S. in the region. Despite being one of the most repressive and authoritarian regimes in the region, Tunisia has generally been seen as a model of economic development and secularism. Its promotion of women’s rights and crushing of Islamist opposition has taken priority in the West over its near-complete censorship of the media and blanket domination of political society. Indeed, the United States has cared so little about Tunisia’s absolute rejection of democracy and world-class censorship that it chose it for the regional office of MEPI, the Bush administration’s signature democracy promotion initiative.

This is understandable, but hardly satisfying. I can understand the hesitation of U.S. officials to take a strong position on the side of either the protesters or the regime at this point, given the strategic complexities and the implications of taking any rhetorical stance. To my ears, at least, the U.S. message has been muddled, with some officials seeming to take the side of the protesters and warning against too-harsh repression and others seeming to avoid taking a stance. For what it’s worth, I told a State Department official in a public forum yesterday that the absence of major U.S. interests in Tunisia and the real prospect of change there make it a good place for the Obama administration to take a principled stand in favor of public freedoms and against repression.

Click through for his update–a response to a WaPo column regarding such populist uprising as a threat.

With Lynch’s comments in mind, consider two different versions of the role of Wikileaks in this uprising.

Elizabeth Dickinson has a piece that–perhaps too strongly–calls Wikileaks “a trigger and a tool for political outcry” in Tunisia.

Tunisia’s government doesn’t exactly get a flattering portrayal in the leaked State Department cables. The country’s ruling family is described as “The Family” — a mafia-esque elite who have their hands in every cookie jar in the entire economy. “President Ben Ali is aging, his regime is sclerotic and there is no clear successor,” a June 2009 cable reads. And to this kleptocracy there is no recourse; one June 2008 cable claims: “persistent rumors of corruption, coupled with rising inflation and continued unemployment, have helped to fuel frustration with the GOT [government of Tunisia] and have contributed to recent protests in southwestern Tunisia. With those at the top believed to be the worst offenders, and likely to remain in power, there are no checks in the system.”

Of course, Tunisians didn’t need anyone to tell them this. But the details noted in the cables — for example, the fact that the first lady may have made massive profits off a private school — stirred things up. Matters got worse, not better (as surely the government hoped), when WikiLeaks was blocked by the authorities and started seeking out dissidents and activists on social networking sites.

As PayPal and Amazon learned last year, WikiLeaks’ supporters don’t take kindly to being denied access to the Internet. And the hacking network Anonymous launched an operation, OpTunisia, against government sites “as long as the Tunisian government keep acting the way they do,” an Anonymous member told the Financial Times.

Compare that the very weird logic State Department Spokesperson Philip Crowley uses in his speech to a class on media and politics the other day.

No one is a greater advocate for a vibrant independent and responsible press, committed to the promotion of freedom of expression and development of a true global civil society, than the United States. Every day, we express concern about the plight of journalists (or bloggers) around the world who are intimidated, jailed or even killed by governments that are afraid of their people, and afraid of the empowerment that comes with the free flow of information within a civil society.

Most recently, we did so in the context of Tunisia, which has hacked social media accounts while claiming to protect their citizens from the incitement of violence. But in doing so, we feel the government is unduly restricting the ability of its people to peacefully assemble and express their views in order to influence government policies. These are universal principles that we continue to support.  And we practice what we preach. Just look at our own country and cable television. We don’t silence dissidents. We make them television news analysts.

Some in the human rights community in this country, and around the world, are questioning our commitment to freedom of expression, freedom of the press and Internet freedom in the aftermath of WikiLeaks.  I am constrained in what I can say, both because individual cables remain classified, and the leak is under investigation by the Department of Justice. But let me briefly put this in context and then I will open things up for questions.  WikiLeaks is about the unauthorized disclosure of classified information. It is not an exercise in Internet freedom. It is about the legitimate investigation of a crime. It is about the need to continue to protect sensitive information while enabling the free flow of public information. [my emphasis]

He sort of wanders back and forth between a discussion of press freedom and an insistence that persecution of Wikileaks is not a violation of that principle through the rest of his speech, at one point drawing a bizarre analogy between Coke’s secret formula and Google’s search algorithms and the US’ diplomatic secrets, as if our diplomatic secrets are the essence of our identity.

Maybe that was his point.

I find Crowley’s statement in the quoted passage interesting for several reasons. Read more

WikiLeaks Media Files: Are They Definitely Fox?

As a number of people are reporting, Julian Assange told John Pilger Wednesday that WikiLeaks has files on some media companies. Thanks to a PDF link made available by The Nation (see 12:05 update), here’s the exact quote from the New Statesman article in question.

If something happens to me or to WikiLeaks, ‘insurance’ files will be released. They speak more of the same truth to power, including the media. There are 504 US embassy cables on one broadcasting organization and there are cables on Murdoch and News Corp.”

I wanted to look at the exact quote, because coverage of this claim has been conflated into “insurance files = 504 cables = Murdoch, News Corp, and Fox.” That is, the assumption is that some of the insurance files pertain to a subset of 504 cables that pertain to a broadcasting organization that given the mention of Murdoch and News Corp, must be Fox.

That’s not necessarily the case: after all, Assange appears to have talked about insurance files, some of which pertain to the media, and then discussed 504 cables on one broadcasting entity, and then mentioned Murdoch and News Corp. It is possible that there are 504 cables on a broadcast outlet — something like ABC, which has a habit of laundering intelligence leaks, or NBC, owned by a defense contractor. These cables might reveal something like the Rent-A-General’s program, first exposed by NYT. And there are files on Murdoch and News Corp. generally (which could include any of his properties worldwide).

Mind you, in its coverage of the issue, the Guardian (which as it points out, has access to all the cables) doesn’t exactly correct such a misimpression, if it is one.

WikiLeaks: Julian Assange claims to have Rupert Murdoch ‘insurance files’

Founder claims WikiLeaks has more than 500 US diplomatic cables on one broadcasting organisation

Julian Assange, the founder of WikiLeaks, claimed today he was in possession of “insurance” files on Rupert Murdoch and his global media company, News Corporation.

Assange also claimed that WikiLeaks holds more than 500 confidential US diplomatic cables on one broadcasting organisation.

Speaking to journalist John Pilger for an interview to be published tomorrow in the latest edition of the New Statesman, Assange said: “There are 504 US embassy cables on one broadcasting organisation and there are cables on Murdoch and News Corp.”

Assange refers to these specific cables as “insurance files” that will be released “if something happens to me or to WikiLeaks”.

The Guardian has published stories based on more than 700 of the cables and has access to all 250,000.

Which I find all the more interesting, in that it suggests the media involved — including the Guardian, NYT, and Norway’s Aftenposten (which obtained its own complete set of the cables) — all have seen what Assange considers the insurance files relating to Murdoch, if not Fox.

So what would be shocking enough about Fox and or Murdoch to consider it part of an “insurance” file?

Wikileaks Redactions: It’s Not Just the Chinese that Bribe for Oil

Given the past history of how newspapers have redacted (or not) Wikileaks dumps, I was very interested in an article that reveals what the Guardian (or one of its media partners) redacted in a cable on Kazakh corruption. The Guardian summarizes the cable this way:

Top Kazakh energy official reveals the four principal gate-keepers around President Nursultan Nazarbayev, including Timur Kulibayev, the favoured billionaire presidential son-in-law.

But read more closely, it serves to record Ambassador Richard Hoagland’s judgment that KazMunaiGaz First Vice President Maksat Idenov is currently (on January 25, 2010) successfully ensuring that two big hyrdocarbon projects will be developed according to “international standards”–which seems to imply something about the level of bribery involved, but it’s not entirely clear whether that implies less bribery or none at all. The big question, in any case, is whether President Nazarbayev’s son-in-law, Kulibayev, will demand bribes associated with the projects.

But as Israel Shamir reveals in an article for Counterpunch (here’s a Fast Company article with more background on Shamir) there are three details that have been redacted in the Guardian version, all of which make the role of bribery more obvious and point to much closer British, Italian, and US ties to that kind of bribery.

In the first instance, the Guardian version of the cable redacts an explicit reference–attributed to Idenov but not a direct quote from him–to the role of bribery in Kazakhstan and in capitalism more generally. (The bolded text is what is redacted in the Guardian version.)

According to Idenov, in Kazakhstan, market economy means capitalism, which means big money, which means large bribes for the best connected.

But it’s not that analogy which seems to tie the US and Britain more closely to the culture of bribery in Kazakhstan. With two other redactions, the Guardian version of the cable hides the ties between British Gas Country Director for Kazakhstan, Mark Rawlings, and a US citizen recently acquitted of bribery because he had offered the bribes at the behest of the CIA.

When the Ambassador arrived, Idenov was barking into his cell phone, “Mark, Mark, stop the excuses! Mark, listen to me! Mark, shut up right now and do as I say! Bring the letter to my office at 10:00 pm, and we will go together to take it to (Minister of Energy and Mineral Resources, MEMR) Mynbayev at his house.” On ending the call, Idenov explained he was talking to British Gas (BG) Country Director for Kazakhstan Mark Rawlings who had missed the deadline to deliver a letter about arbitration on the Karachaganak super-giant oil-field project (reftel). Still clearly steamed, Idenov alleged, “He’s still playing games with Mercator’s James Giffin,” the notorious AmCit fixer indicted for large-scale bribery on oil deals in the 1990s, whose case drags on in the Southern District Court of New York. “I tell him, ‘Mark, stop being an idiot! Stop tempting fate! Stop communicating with an indicted criminal!'” Idenov asked, “Do you know how much he (Rawlings) makes? $72,000 a month! A month!! Plus benefits! Plus bonuses! Lives in Switzerland but supposedly works in London. Comes here once a month to check in. Nice life, huh?”

As Shamir explains in his article, Giffen was ultimately hailed as a patriot by the judge who dismissed most of the Foreign Corrupt Practices Act charges against him in November 2010 (that is, ten months after this cable was written, and around the same time the US signed a new airspace deal with Kazakhstan). Main Justice provides background of how State Department considerations–they didn’t want prosecutors to mention that President Nazarbayev was the recipient of the bribes Giffen was alleged to have arranged–and CIA stonewalling–they refused to provide the details of what Giffen claimed was his role in their “intelligence collecting” operations–led to the dismissal of most of the charges.

Read more

Why Did Bradley Manning Allegedly Leak WikiLeaks Two Things before He Verified Assange’s Identity?

To return to the work I was doing yesterday, there’s something odd about the timeline of Bradley Manning’s alleged leaks to WikiLeaks: he appears to give WikiLeaks at least two things–the Rejkjavik 13 cable and the Collateral Murder video–before he verified Julian Assange’s identity.

In the chat logs, Manning explains he first started working with WikiLeaks after they released the 9/11 pager messages.

(12:46:17 PM) Adrian: how long have you helped WikiLeaks?

(12:49:09 PM) bradass87: since they released the 9/11 “pager messages”

(12:49:38 PM) bradass87: i immediately recognized that they were from an NSA database, and i felt comfortable enough to come forward

(12:50:20 PM) bradass87: so… right after thanksgiving timeframe of 2009

That would date it November 24 or 25. Interestingly, the government says Manning’s alleged activities began somewhat earlier, November 19. That may suggest they have reason to believe he may have first accessed materials he was not authorized to access on November 19.

There’s a curious break in the chat logs (where Lamo makes his first efforts to get Manning to talk about operation security, while Manning loses it), after which Manning seems to correct Lamo’s suggestion that he’s a WL volunteer. But that does lead Manning to discuss communicating directly with Assange.

(2:04:29 PM) Manning: im a source, not quite a volunteer

(2:05:38 PM) Manning: i mean, im a high profile source… and i’ve developed a relationship with assange… but i dont know much more than what he tells me, which is very little

(2:05:58 PM) Manning: it took me four months to confirm that the person i was communicating was in fact assange

(2:10:01 PM) Lamo: how’d you do that?

(2:12:45 PM) Manning: I gathered more info when i questioned him whenever he was being tailed in Sweden by State Department officials… i was trying to figure out who was following him… and why… and he was telling me stories of other times he’s been followed… and they matched up with the ones he’s said publicly

(2:14:28 PM) Lamo: did that bear out? the surveillance?

(2:14:46 PM) Manning: based on the description he gave me, I assessed it was the Northern Europe Diplomatic Security Team… trying to figure out how he got the Reykjavik cable…

(2:15:57 PM) Manning: they also caught wind that he had a video… of the Gharani airstrike in afghanistan, which he has, but hasn’t decrypted yet… the production team was actually working on the Baghdad strike though, which was never really encrypted

As I suggested yesterday, that would mean that Manning had not verified Assange’s identity until roughly March 24. That would coincide exactly with the Wikileak Twitter account’s discussion of US and Icelandic surveillance. Of potential note, on March 23, WL said, “We know our possession of the decrypted airstrike video is now being discussed at the highest levels of US command,” which might be information Manning had access to. While not definitive, all of that suggests the public discussion was one way Manning verified “that the person i was communicating was in fact assange.”

But there were at least two things Manning had already allegedly leaked to WikiLeaks: the Collateral Murder video and the Rejkjavik 13 cable. A possible third which I will not deal with here is the intelligence report naming WikiLeaks as a threat to the military, which was released March 18, 2010, but which is not definitely attributable even hypothetically to Manning.

Collateral Murder Timing

WL first reported getting what appear to be the Collateral Murder and Gharani videos on January 8, 2010.

Have encrypted videos of US bomb strikes on civilians http://bit.ly/wlafghan2 we need super computer time http://ljsf.org/

On February 20, it claimed to have cracked the encryption code of what appears to be the Collateral Murder video.

Finally cracked the encryption to US military video in which journalists, among others, are shot. Thanks to all who donated $/CPUs.

For his part, Manning describes just stumbling upon the Collateral Murder video, did some research into what it was, then stewed on it for a month and a half before forwarding to WL.

(03:07:53 PM) Manning: i watched that video cold, for instance

(03:10:32 PM) Manning: at first glance… it was just a bunch of guys getting shot up by a helicopter… no big deal… about two dozen more where that came from right… but something struck me as odd with the van thing… and also the fact it was being stored in a JAG officer’s directory… so i looked into it… eventually tracked down the date, and then the exact GPS co-ord… and i was like… ok, so thats what happened… cool… then i went to the regular internet… and it was still on my mind… so i typed into goog… the date, and the location… and then i see this http://www.nytimes.com/2007/07/13/world/middleeast/13iraq.html

(03:11:07 PM) Manning: i kept that in my mind for weeks… probably a month and a half… before i forwarded it to [WikiLeaks]

He dates uploading the video sometime in February.

(02:47:07 PM) Manning: the CM video came from a server in our domain! and not a single person noticed

(02:47:21 PM) Lamo: CM?

(02:48:17 PM) Manning: Apache Weapons Team video of 12 JUL 07 airstrike on Reuters Journos… some sketchy but fairly normal street-folk… and civilians

(02:48:52 PM) Lamo: How long between the leak and the publication?

(02:49:18 PM) Manning: some time in february

(02:49:25 PM) Manning: it was uploaded

(02:50:04 PM) Lamo: uploaded where? how would i transmit something if i had similarly damning data

(02:51:49 PM) Manning: uhm… preferably openssl the file with aes-256… then use sftp at prearranged drop ip addresses

(02:52:08 PM) Manning: keeping the key separate… and uploading via a different means

(02:52:31 PM) Lamo: so i myself would be SOL w/o a way to prearrange

(02:54:33 PM) Manning: not necessarily… the HTTPS submission should suffice legally… though i’d use tor on top of it…

Now, those are seemingly contradictory sets of dates: WL boasts it has Gharani, at least, in January, though the February reference to decrypting it seems to mean Collateral Murder was included in the January announcement. But note that if Manning had first accessed the Collateral Murder video on November 19, a month and a half might put it close to the New Year.

In any case, however, both WL and Manning seem to agree the video was in hand by February, a month before (assuming Manning’s description of the verification process is accurate) Manning verified Assange’s identity. Read more

State Department Secrecy: What a Bunch of Crap!

Since the issue of State Department secrecy — breached by the WikiLeaks cable dump — has been a topic of discussion, I thought it worthwhile to point to this National Security Archive post describing a particular FOIA appeal.

Eleven years ago, in those halcyon pre-9/11 days, Frank Pallone sponsored a resolution declaring Pakistan a state sponsor of terror reading, in part,

Expressing the sense of the House of Representatives that Pakistan should be designated as a state sponsor of terrorism.

Whereas reliable reports from Western media sources have cited Pakistan as a base and training ground for terrorist groups, and the Pakistani Government’s demonstrated reluctance to halt the use of its soil for terrorist organizations;

Whereas media reports have implicated Pakistan’s Inter Services Intelligence (ISI) directly in terrorist activities, as well as the international drug trade;

[snip]

Whereas Pakistan is one of three countries to recognize the Taliban in Afghanistan;

Whereas the Taliban, which has been declared a foreign terrorist organization by the U.S. Department of State, has provided refuge and assistance to Osama Bin Laden;

Whereas the U.S. Department of State has declared Osama Bin Laden and associates as a foreign terrorist organization;

Whereas Pakistan has hindered U.S. and international efforts to apprehend Osama Bin Laden;

Whereas Pakistan was placed on the U.S. Department of State’s `watch list’ of suspected state sponsors of international terrorism in 1993;

When NSA first got the document in response to a FOIA, there was a square marking on the upper right corner redacted under the deliberative exception. The NSA appealed and won and — voila! It turns out some State Department flunky who reviewed the proposed legislation 11 years ago had declared, “What a bunch of crap!”

I can see why our government wouldn’t want us to know that, when presented with a resolution condemning Pakistan for actions that made it easier for Osama bin Laden and a bunch of other terrorists we have since gone to war against to operate, some bureaucrat responded by declaring “what a bunch of crap!” How terrible it would be after all, if the citizens paying that bureaucrat’s salary got to see what bad judgment he or she had!

But can the State Department understand how, faced with an effort to hide the State Department’s own bad judgment, we citizens might not trust its judgment on secrecy, much less policy?

Is the Government Alleging Bradley Manning Loaded Encryption Software onto DOD Computers?

I’ve been revisiting the timeline revealed in Bradley Manning’s charging document. Here’s a short version of what that shows:

November 1, 2009: Earliest date for which government subpoenas Wikileaks related twitter accounts

November 19, 2009: Earliest possibly date for all charges except accessing the Rejkjavik 13 cable (which was dated January 13)

November 24, 2009: Per chat logs, Manning said he first started working with WL after release of 9/11 pager messages, which was first announced on November 24, 2009

January 13, 2010: Earliest possible date for accessing the Rejkjavik 13 cable (the date is obviously taken from the date of the cable)

January 21, 2010: Manning leaves for US

February 11, 2010: Manning returns to Baghdad from US

February 19, 2010: Latest possible date for obtaining and communicating the Rejkjavik 13

March 24, 2010: In chat, Manning suggests it took him four months to verify Assange was who he said he was

April 3, 2010: Latest possible date for “wrongfully adding unauthorized software to a Secret Internet Protocol Router network computer”

April 5, 2010: Latest possible date for having unauthorized possession of photos related to the national defense, knowingly exceeding his authorized access on SIPRnet, willfully transmitting it, and intentionally exceeding his authorized access, all in relation to the Collateral Murder video

May 24, 2010: Latest possible date for knowingly exceeding his authorized access to obtain “more than 50 classified United States Department of State cables” and willfully transmitting them

May 27, 2010: Latest possible date for “introducing” classified information onto his personal computer and obtaining “more then 150,000 diplomatic cables;” this date is two days before, according to the charging sheet, Manning’s pre-trial confinement began and presumably ties to the date when they first assessed what they had on Manning’s seized computer

June 17, 2010: Iceland passes Modern Media Initiative

Now, I’m going to have say to more about this (and will add to this timeline), but I wanted to start with this question: what software did Manning allegedly add to a computer on the SIPRNet on April 3, 2010?

Back when the charging document originally came out, I don’t think I made much sense of specification 4 of charge 1, which reads:

SPECIFICATION 4: In that Private First Class Bradley E. Manning, U.S. Army, did, between on or about 19 November 2009 and on or about 3 April 2010, at or near Contingency Operating Station Hammer, Iraq, violate a lawful general regulation, to wit: Paragraph 4-5(a)(3), Army Regulation 25-2, dated 24 October 2007, by wrongfully adding unauthorized software to a Secret Internet Protocol Router network computer.

I noted it this time because it made no sense to me that the government had listed April 5 as last possible day when Manning allegedly leaked the Collateral Murder video, given that Wikileaks publicly claimed–and Manning did too, sort of–that the video had been passed on in February. So why this April date?

But recall how, since that time, Adrian Lamo has repeatedly claimed to know a person or people in Boston who helped Manning by giving him encryption software to help him send classified data in small enough bits to avoid detection.

Adrian Lamo, the California computer hacker who turned in Pte Manning to military authorities in May, claimed in a telephone interview he had firsthand knowledge that someone helped the soldier set up encryption software to send classified information to Wikileaks.

Mr Lamo, who is cooperating with investigators, wouldn’t name the person but said the man was among a group of people in the Boston area who work with Wikileaks. He said the man told him “he actually helped Private Manning set up the encryption software he used”.

Mr Lamo said the software enabled Pte Manning to send classified data in small bits so that it would seem innocuous.

“It wouldn’t look too much different from your average guy doing his banking on line,” Mr Lamo said.

If someone allegedly gave Manning encryption software that would help download documents to pass onto Wikileaks, then presumably Manning deployed that in Iraq. And if someone from Wikileaks allegedly gave Manning software that subsequently got loaded onto DOD computers in Iraq, then it might explain their current theory of prosecution for conspiracy to leak this information.

The article (as well as a few others like it) on hackers who may have helped Manning came out on August 2, 2010, just days after Jacob Appelbaum had been stopped at the border and his computers–which he refused to decrypt–confiscated.

Appelbaum, of course, is one of the people whose Twitter account was subpoenaed last December. Only, unlike two of the other people listed on the document request (the two who are not US persons), Appelbaum was not named by name. He was named only by his Twitter handle, “ioerror.” Appelbaum was also apparently not–as Birgitta Jónsdóttir was–told by Twitter that DOJ wanted his twitter information. Both of those details have made me wonder whether there is another, still-sealed, warrant pertaining to Appelbaum, which the government would require for some uses since he is a US person.

After the subpoena was revealed, Appelbaum tweeted,

Motivation: …”I must not fear. Fear is the mind-killer. Fear is the little-death that brings total obliteration. I will face my fear.”…

He is now on his way back to the US from Iceland; the ACLU plans to meet him at his flight (perhaps to make it harder to detain him as they did in July).

So what does the government think Manning loaded onto his computer, and how do they know the timing of it?

What the Government Might Be After with Its Twitter Subpoena

After a member of Iceland’s Parliament and former Wikileaks volunteer, Birgitta Jónsdóttir, revealed on Twitter yesterday that Twitter has been subpoenaed for details on her Twitter account, Glenn got a copy of the subpoena. The subpoena was first submitted to Twitter on December 14, and asked for account information for six people as well as any account associated with Wikileaks, going back to November 1, 2009. Of particular note, they ask for:

records of user activity for any connections made to or from the Account, including the date, time, length, and method of connections, data transfer volume, user name, and source and destination Internet Protocol address(es).

non-content information associated with the contents of any communication or file stored by or for the account(s), such as the source and destination email addresses and IP addresses.

By getting the IP addresses, they might be able to tie a location to the Wikileaks activity (though I would imagine some of the subpoenaed people shield that kind of information).

Here’s what they might be after.

There’s a passage in the chat logs in which Manning describes how he confirmed he was communicating directly with Julian Assange. This passage comes on May 22, allegedly before Adrian Lamo was cooperating with investigators (but there are reasons to question that).

(2:05:58 PM) Manning: it took me four months to confirm that the person i was communicating was in fact assange

(2:10:01 PM) Lamo: how’d you do that?

(2:12:45 PM) Manning: I gathered more info when i questioned him whenever he was being tailed in Sweden by State Department officials… i was trying to figure out who was following him… and why… and he was telling me stories of other times he’s been followed… and they matched up with the ones he’s said publicly

(2:14:28 PM) Lamo: did that bear out? the surveillance?

(2:14:46 PM) Manning: based on the description he gave me, I assessed it was the Northern Europe Diplomatic Security Team… trying to figure out how he got the Reykjavik cable…

While Manning doesn’t say that these conversations took place on Twitter (I’ll come back to this), we know that Wikileaks, at least, was revealing details of the government’s surveillance of it on Twitter. A series of Tweets from late March describe heavy State Department surveillance. Several of the tweets reference the production of the Collateral Murder video. Now mind you, this was a month or more after Manning would have leaked the video itself. But this tweet makes me wonder whether Manning didn’t continue monitoring surveillance and response.

We know our possession of the decrypted airstrike video is now being discussed at the highest levels of US command.

In other words, this may be evidence on Twitter of the Wikileaks team learning information that Manning might have provided them.

As Glenn points out, three of the people covered by the subpoena were involved in the production of the video.

the three named producers of the “Collateral Murder” video — depicting and commenting on the U.S. Apache helicopter attack on journalists and civilians in Baghdad — were Assange, Jónsdóttir, and Gonggrijp (whose name is misspelled in the DOJ’s documents).  Since Gonggrijp has had no connection to WikiLeaks for several months and Jónsdóttir’s association has diminished substantially over time, it seems clear that they were selected due to their involvement in the release of that film.

One of the things the government may be trying to do is to pinpoint what IP was involved in the tweets revealing the surveillance, to try to tie any conversation about that surveillance to conversations with Manning, and in turn tie those conversations to their theory that the Wikileaks team conspired to leak this information.

Manning says he tracked this kind of surveillance to confirm that he was contacting Assange directly. The government may be trying to retrace his tracks in confirming Assange’s identity, too.

[This post was updated after it was first posted.]

OMB’s New Security Memo Suggests WikiLeaks Is Media

A number of outlets are reporting on the OMB memo requiring agencies to review their security procedures in response to WikiLeaks.

Now, this memo is explicitly a response to WikiLeaks. It’s a follow-up on a memo sent in November that names WikiLeaks.

On November 28, 2010, departments and agencies that handle classified national security information were directed to establish assessment teams to review their implementation of safeguarding procedures. (Office of Management and Budget, Memorandum M-11-06, “WikiLeaks – Mishandling of Classified Information,” November 28, 2010.)

And one of the questions it directs agencies to ask names WikiLeaks (and, in a sign of the government’s nimbleness, OpenLeaks) specifically.

Do you capture evidence of pre-employment and/or post-employment activities or participation in on-line media data mining sites like WikiLeaks or Open Leaks?

But the delay–almost six months between Bradley Manning’s arrest and the November memo, and another month until this memo, sort of reminds me of the roughly eight month delay between the time Umar Farouk Abdulmutallab tried to set his underwear on fire and the the time a bunch of grannies started getting groped at TSA security checkpoints.

Why the delay?

And from a document usability standpoint, this list of questions designed to help agencies identify weaknesses is a piece of shit. Trust me. No matter how good a bureaucrat is, asking them to use nine pages of nested bullets to improve a process is not going to work. This is simply not a credible process improvement effort.

I also wonder why it took WikiLeaks to initiate this effort. Just as an example, Los Alamos National Labs has been losing both storage media, computers, and BlackBerries going back a decade. You’d think the vulnerability of one of our nuclear labs would alert the government to our overall vulnerability to the loss of data via computer medium. Yet losing data to–presumably–our enemies did not trigger this kind of no-nonsense vulnerability assessment, WikiLeaks did.

The Russians and the Chinese are probably bummed that WikiLeaks will make it a teeny bit harder for them to spy on us.

All that said, Steven Aftergood makes one curious observation about the memo: this unusable list of nested bullets suggests that agencies should monitor employees’ contacts with the media.

Among other troubling questions, agencies are asked:  “Are all employees required to report their contacts with the media?”  This question seems out of place since there is no existing government-wide security requirement to report “contacts with the media.”  Rather, this is a security policy that is unique to some intelligence agencies, and is not to be found in any other military or civilian agencies. Its presence here seems to reflect the new “evolutionary pressure” on the government to adopt the stricter security policies of intelligence.

“I am not aware of any such requirement” to report on media contacts, a senior government security official told Secrecy News.  But he noted that the DNI was designated as Security Executive Agent for personnel security matters in the 2008 executive order 13467.  As a result, “I suspect that an IC requirement crept in” to the OMB memo.

I agree with Aftergood: it is troubling that an intelligence community requirement now seems to be applied to the federal workforce as a whole.

But isn’t this, at the same time, rather telling?

If a memo instituting new security reviews, explicitly written in response to WikiLeaks, institutes a policy of reviewing contacts with the media, doesn’t that suggest they consider WikiLeaks to be media?

DOD, State, and Obama’s “Pretend” Desire to Close Gitmo

Robert Chesney had an interesting observation about the inter-agency group Dafna Linzer reports is working on some kind of statement with regards to Congress’ restrictions on Obama’s ability to move detainees from Gitmo to the US: the apparent non-participation of DOD in the group.

Second, and perhaps relatedly, note that the story also describes the interagency meetings concerning a possible signing statement, meetings that apparently involved a “small circle of policymakers and lawyers from the White House, the Justice Department and State Department” who “spent the closing hours of 2010 considering drafts for a statement.”  What is interesting about that is the apparent absence of the Defense Department.  Of course, not being involved in drafting would not necessarily mean that DOD has no or little voice in the matter, but it certainly would not suggest DOD has much of a role either.  One might respond that this is really a question for DOJ and the White House Counsel’s office of course, but in that case why is State there?  State has clear equities, of course, so I think it makes perfect sense to include it.  But DOD’s equities seem at least as substantial (yes, the IC has equities here as well, but the DOD omission is what strikes me as remarkable – if there really is an omission).

While I don’t know this to be a case, I’d suggest that we might pair that observation with one I made yesterday: that one of Linzer’s sources used the word “pretend” when discussing Obama’s purported plans to close Gitmo.

If the bill were signed without challenge, the remaining prosecutorial option left for the administration would be to charge detainees in military commissions at Guantanamo, with those convicted serving time at the facility. So far, the administration has been unwilling to bring new charges in that setting.

“The bill,” said one administration official, “undermines the principles outlined in the president’s archives speech and there is no way to pretend you are closing Guantanamo if that law goes through unchallenged.” [my emphasis]

As Adam Serwer noted some weeks ago, if the Obama Administration really objected to Congress restricting its prosecutorial power in this matter, it would have rolled out the Republican Bob Gates to talk about how important closing Gitmo is to winning the war on terror.

I don’t know whether the administration blessed this deal, but they certainly haven’t brought out the big guns–a few words from Defense Secretary Robert Gates would probably go a long way towards dissuading the Senate from going through with this.

(Though Serwer goes on to suggest that another way Obama could indicate the seriousness of his opposition to the restriction would be to issue a signing statement–now we know who to blame for this idea!)

If your desire to close Gitmo is now just pretend, make-believe, then why involve DOD at all? Indeed, a “pretend” desire to close Gitmo would well explain why you involve State, but not DOD.

As I have noted, one of the revelations in the Wikileaks cables is the way in which Spain advised us how to help it combat torture investigations in that country: by proving that some kind of legal process was ongoing in the US.

Zaragoza has also told us that if a proceeding regarding this matter were underway in the U.S., that would effectively bar proceedings in Spain. We intend to further explore this option with him informally (asking about format, timing, how much information he would need, etc.) while making it clear that the USG has not made a decision to follow this course of action.

And the diplomats involved–writing to Secretary of State Clinton–make it clear they will find out from Spain what such a proceeding must look like to serve the purpose of staving off a Spanish investigation.

After which, DOJ seeems to have embarked on a “pretend” investigation into torture that–they insist–is ongoing.

Who do you think the audience for any “pretend” effort to close Gitmo would currently be? Certainly not the bulk of the American people, who have been thoroughly suckered by GOP fearmongering on Gitmo. Nor, probably, would the primary audience be al Qaeda and its potential recruits, which would probably be far more impressed at this point if the US decided to halt drone strikes than if it closed Gitmo.

Indeed, it seems clear that the only reason Obama would feel obliged to pretend to want to close Gitmo anymore (because God knows he seems thoroughly unconcerned by civil libertarians squawking about his campaign promises) is the international community.

And so a statement about Obama opposition to Congress tying his hands on Gitmo wouldn’t matter to DOD, because nothing at Gitmo is actually going to change (aside from his face-saving EO on indefinite detention). But it would matter to the State Department, because they would be the ones who might have had discussions about what a “pretend” effort to close Gitmo would have to look like to please our allies and make them willing to continue to partner with us on counter-terrorism.

Which might explain why no one at the White House will claim Obama actually wants to use a hypothetical signing statement. Because merely issuing one–but not actually relying on it–would serve its intended purpose: to allow the Administration and our allies to pretend that the US wants to close Gitmo.

Update: YouTube added per PeasantParty.