Updated November 2016
With Julian Assange's future prospects looking highly fragile, it is important to better understand how the intelligence community in the United States has long had a plan in place to rid the world of WikiLeaks and its embarrassing leaks. A late 2016 release from Wikileaks that received relatively little coverage in the mainstream media looked at a selection of more than 60,000 emails, sourced from private intelligence/technology security company HBGary, now a subsidiary of ManTech International. Here is what Wikileaks has to say about the release in their own words:
With Julian Assange's future prospects looking highly fragile, it is important to better understand how the intelligence community in the United States has long had a plan in place to rid the world of WikiLeaks and its embarrassing leaks. A late 2016 release from Wikileaks that received relatively little coverage in the mainstream media looked at a selection of more than 60,000 emails, sourced from private intelligence/technology security company HBGary, now a subsidiary of ManTech International. Here is what Wikileaks has to say about the release in their own words:
"Today, Tuesday
29 November 2016, WikiLeaks publishes in searchable format more than 60
thousand emails from private intelligence firm HBGary. The
publication today marks the early release of US political prisoner Barrett
Brown, who was detained in 2012 and sentenced to 63
months in prison in connection with his journalism on Stratfor and HBGary. Coinciding with
Mr Brown's release from prison WikiLeaks is publishing a searchable index of
the HBGary emails. WikiLeaks published the Stratfor emails in 2012.
The HBGary emails are from four email accounts
of key people from HBGary and HBGary Federal. HBGary was founded in 2003 by
Greg Hoglund to provide cyber security-related services to corporate clients. A
separate entity, HBGary Federal, was managed by Aaron Barr to do similar work
for government agencies and so had staff with security clearances and worked
with companies such as Booz Allen Hamilton (one of the contractors Edward
Snowden worked for).
In February 2011 Aaron Barr did an interview
with the UK’s Finanical Times that stated he had been investigating the
internet activist group Anonymous and claimed to have uncovered the real
identities of some of what he described as the leaders of the organisation. In
retaliation Anonymous penetrated Barr’s organisation and took emails from the
accounts of four key people from HBGary and HBGary Federal: Aaron Barr and Greg
Hoglund, but also Ted Vera (then Chief Operating Officer at HBGary Federal) and
Phil Wallisch, a former Principal Technical Consultant.
These emails and revelations from them started
to be published on the internet, predominantly through the work of Barrett
Brown and a crowd-sourced investigative journalism project he ran: Project PM. As a result,
later that month Barr was forced to step down, HBGary Federal closed and
HBGary, Inc. was sold to ManTech International. This would have been little
consolation to Mr Brown, who a month later on 6 March 2012 had both his and his
mother’s houses raided by the FBI, seeking “Records relating to HBGary,
Infragard, Endgame Systems, Anonymous, LulzSec, IRC chats, Twitter,
wiki.echelon2.org, and pastebin.com.” Agents seized his laptops.
Barrett Brown’s work through Project PM was
one of the first collaborative investigations into the US corporate
surveillance industry. Looking into corporate firms that work hand-in-hand with
the government to surveil on citizens, Mr Brown was one of the first to shed
light on this unaccountable industry.
The HBGary revelations that came out through
the work of Barret Brown and others showed that HBGary and related companies
were involved in plans to spread disinformation and to attack watchdog
organisations, including WikiLeaks and US Chamber Watch. For example, the emails
revealed a plan to form a group called Team Themis with
a number of companies from the industry to "ruin" WikiLeaks by
submitting false documents in the hope they would be published, as well as
discrediting WikiLeaks staff and supporters (including the journalist Glenn
Greenwald). HBGary was also
bidding to fulfil a tender from the US Air Force to assist it in manipulating
social media to spread propaganda about the Air Force." (my bold)
As background, here is a summary of HBGary's expertise:
As I highlighted above, the plan was to destroy WikiLeaks from
within by discrediting their efforts with the use of false documents.
This plan is highlighted in the following innocuous looking email from 2010:
Note that there is an attachment to this email, a 24 slide
presentation outlining "The Wikileaks Threat" which you can download
from Scribd here. As well, please note that Palantir Technologies is
one of the partners in this program; Palantir claims the following on its
website:
"Palantir Technologies is a mission-driven company, and a core
component of that mission is protecting our fundamental rights to privacy and
civil liberties. Since its inception, Palantir has invested its intellectual
and financial capital in engineering technology that can be used to solve the
world’s hardest problems while simultaneously protecting individual liberty.
Robust privacy and civil liberties protections are essential to building public
confidence in the management of data, and thus are an essential part of any
information system that uses Palantir software." (my bold)
As you
will see in this posting, this self-description is somewhat ironic.
Let's start by looking at some background information about
WikiLeaks from the presentation noting that "Glenn" refers to
Glenn Greenwald, former journalist for The Guardian who was responsible
for breaking the Edward Snowden/NSA snooping story:
The presentation goes on to note that WikiLeaks uses a strategy of
migrating their use of servers around the globe, making the organization
far more difficult to trace (and shut down). As well, they are incorporated and
registered in different countries that provide maximum legal protection; for
example, at the time, they had a library in Australia, a foundation in France and two no-name tax
exempt non-profits in the United States. The presentation notes that
their weakness is a lack of funding because governments are blocking
their funding sources and that security concerns could be used to make
potential submitters of documents to WikiLeaks doubt the safety of
interacting with the group.
Here's the key slide, the proposed strategy for discrediting and ultimately destroying WikiLeaks:
Note the use of disinformation through the submission of fake documents
to bring WikiLeaks to its knees. The plan by HBGary and
its affiliates was to destroy WikiLeaks by having them release fake
documents to the public. Additionally, they wanted to use cyber
attacks against Wikileaks's server infrastructure and create the impression
that supplying information to WikiLeaks was risky.
This gives us an inside look at what lengths the Deep State will go to to keep information from reaching the public. During the 2016 election cycle, the information released by WikiLeaks likely played at least some role in the final outcome of the U.S. Presidential race. The loss of an organization like WikiLeaks would mean that so much more secret activity would go on behind closed doors, keeping the public from knowing what is really going on in Washington, Corporate America and other jurisdictions. After all, those who lead us would rather that the sweaty masses lived their humble lives without giving any thought to their true motivations.
No comments:
Post a Comment