Tuesday, July 24, 2012

PRESS RELEASE: Baltasar Garzón, will lead the legal team representing Julian Assange and WikiLeaks.

Tue Jul 24 19:36:07 UTC 2012

Statement approved by Julian Assange and Baltasar Garzón

The Spanish judge, lawyer, and international jurist, Baltasar Garzón, will lead the legal team representing Julian Assange and WikiLeaks. The jurist met with Julian Assange at the Ecuadorian embassy in the United Kingdom recently. The purpose of the meeting was to discuss the new legal strategy which will defend both WikiLeaks and Julian Assange from the existing abuse of process; expose the arbitrary, extrajudicial actions by the international financial system which target Julian Assange and WikiLeaks specifically; and show how the secret US processes against Julian Assange and WikiLeaks have compromised and contaminated other legal processes, including the extradition process against Mr Assange. Despite having been imprisoned, fiscally blockaded, and placed under house arrest for over 650 days, Mr. Assange has not been charged with an offense in any country.

Baltasar Garzón revolutionized the international justice system two decades ago by issuing an international arrest warrant for the former Head of State of Chile, Augusto Pinochet. His actions spearheaded the fight against impunity in Latin America and in the rest of the world. The judge has expressed serious concerns regarding the lack of safeguards and transparency whith which actions are being taken against Julian Assange, and the harassment he is being subjected to which has irreparable effects on his physical and mental wellbeing. The threats against his person are further aggravated by the complicit behaviour of the Swedish and U.K. governments, who are wrongfully abrogating his rights.

More information:


===== Spanish ======

El  Juez español, abogado y jurista Internacional Baltasar Garzón asumirá la dirección jurídica del equipo de abogados que representa a Julian Assange y Wikileaks. El Jurista, celebró una reunión privada con Julian Assange en la sede de la Embajada Ecuatoriana en Londres, para discutir una nueva y contundente estrategia jurídica que buscará defender tanto a WikiLeaks, como a su fundador, de los abusos de proceso y de arbitrariedades del Sistema Financiero internacional que pondrán de manifiesto el alcance real de la operación contra Julian Assange, en la que el proceso secreto que se le sigue en los Estados Unidos de América supone una clara amenaza que vicia cualquier otro proceso, como el que motiva la petición de extradición para ser cuestionado en Suecia, solicitud que aparece como mero instrumento para conseguir aquella finalidad.

Baltasar Garzón, que hace dos décadas revolucionó la justicia internacional al hacer efectiva una orden de aprehensión contra el ex Jefe de Estado chileno Augusto Pinochet, lo que permitió importantísimos avances en la lucha contra la impunidad en Latinoamérica y el mundo entero, mostró su grave preocupacion por la ausencia de garantías con las que se está actuando contra Julian Assange y el acoso al que está siendo sometido, con consecuencias irreparables para su propia salud física y mental. Riesgo que se ha agravado con la actitud coactiva del gobierno británico que, sin ofrecer garantías creíbles respecto de Suecia y los Estados Unidos, está moviendo todos los resortes para acabar con una situación que políticamente le perjudica.

Saturday, July 21, 2012

#FBI : Person responsible for drafting State Dept's #WikiLeaks damage assessment is also State's chief liaison with the FBI

Source ; Alexa O'Brien via twitter


2009-10-06 00:00:00
Secretary of State


E.O. 12958: N/A

STATE 00104215 001.2 OF 002

1. SUMMARY: That's how Washington Post columnist David
Ignatius described INR. Ignatius wrote that INR owes
success to "a culture that supports dissent -- and
expertise...When that kind of intolerance for mediocrity
is shared throughout the intelligence community, we'll
know that reform has really begun." Ignatius advised,
"people should take a careful look at one of
Washington's hidden jewels -- the State Department's
tiny Bureau of
Intelligence and Research." We urge bidders to follow
Ignatius' advice and take a close look at INR's Foreign
Service positions opening in summer 2010.


2. Foreign Affairs Political and Economic Analysts (FS-
and FS-02). Analysts draft assessments, orally brief
senior policymakers at the Department and White House,
inject their expertise and perspective into the
intelligence community, and exchange knowledge with
outside experts.
-- Political Analyst for Zimbabwe and other Southern
African countries, INR/AF (S9089700, FS-03) POC: Donald
Koran 202-647-7339
-- Political Analyst for European Union affairs, INR/EUR
(S9089602, FS-03) POC: Harry O'Hara 202-647-8052
-- Political Analyst for the Nordic countries, INR/EUR
(S9089603, FS-03) POC: Harry O'Hara 202-647-8052
-- Political Analyst for Cyprus and Greece, with back-up
responsibility for Turkey, INR/EUR (S7832700, FS-02)
POC: Harry O'Hara 202-647-8052
-- Political Analyst for the West Balkans, Croatia, and
Bosnia Herzegovina, INR/EUR (S7832706, FS-02)
POC: Harry O'Hara 202-647-8052
-- Political Analyst for Ukraine, Moldova, and Belarus,
INR/REA (S7379605, FS-02) POC: Wayne Limberg 202-647-
-- Political Analyst for Azerbaijan, Nagorno-Karabakh,
Armenia, INR/REA (S7377900, FS-02) POC: John Parker
-- Political Analyst for Chechnya and the Caucuses,
INR/REA (S7379607, FS-02) POC: John Williams 202-647-
-- Political Analyst for Iraq political affairs,
INR/NESA (S8636000, FS-02) POC: Conny Mayer 202-647-5076
-- Economic Analyst for Egypt and Middle Eastern
countries, INR/EC (S8634702, FS-02) POC: William Miller

3. Foreign Affairs Analysts, INR/WATCH (S6985400, FS-
One year tour of duty. The INR Watch works closely with
the Department's OPS Center to provide round-the-clock
intelligence support to Department principals, task
forces, the INR Front Office and analysts. Writes daily
gist of overnight intelligence for the Secretary. Serves
as the Department's after-hours liaison with the
intelligence community. POC: Scott Dean 202-647-8710

4. Special Assistant, INR (S7412300, FS-03). One year
tour of duty. Serves the Assistant Secretary, Principal
Deputy Assistant Secretary, Deputy Assistant Secretaries, and
all of INR to ensure the Bureau succeeds as the Secretary of
State's intelligence staff. Supports INR's mission to
put intelligence and the intelligence community at the
Ken Toko 202-647-8933

5. Management Officer/Political Analyst, INR/GGI
(S6886401, FS-02). Deputy Chief of the Humanitarian
Information Unit in the Office of the Geographer and
Global Issues. Assists the Chief to supervise over a
dozen staff, overseeing projects, and managing budget,
procurement, personnel, and contracts. POC: Lee Schwartz

6. Media Reaction Division Chief, INR/OPN (U0036000,
FS-02). Supervises four civil service Foreign Media
Analysts, who analyze foreign media and public opinion.
POC: James Bell 202-736-4279

7. Office Director, INR/WATCH (S7094700, FS-01).
Manages the Department's 24/7 alert center. Supervises a staff

STATE 00104215 002.2 OF 002

of 13, including 11 FSOs and two civil servants, who
provide intelligence support to senior Department policymakers,
the Operations Center, task forces, and INR's Front
Office and analysts. POC: Acting A/S John Dinger 202-

8. Deputy Executive Director, INR/EX (S8227400, FS-01).
Oversees the management and budget of a 330 person
Formulates administrative policies and plans.
POC: Leona Coulombe, 202-647-1080

9. Deputy Director, National Human Intelligence
Requirements Tasking Center (NHRTC), detailed to CIA
Headquarters (S8634200, FE-OC). Senior State
representative and NHRTC Deputy Director. Coordinates
with senior officials at State, NSC, DOD, and other
departments and agencies. Supervises four staff. POC:
Robert Yamate 703-874-4307

10. Office Director, INR/CSS (S6499700, FE-OC) The
Director of the Office of Counter-Intelligence and Consular
Support coordinates counterintelligence and sensitive law
enforcement operations and policy. Advises Department
principals on those issues. Acts as State's primary
liaison with the FBI, the National Counterterrorism
Center, and the Terrorist Screening Center for
counterterrorism lookout purposes. Provides
intelligence support to the Bureau of Consular Affairs.
Supervises six staff. POC: David Appleton 202-647-7679

11. Deputy Director, Terrorist Screening Center
(S8726800, FE-OC), detailed to the Terrorist Screening
Center. Responsible for representing Department of State
Interests to this interagency body. Works closely with
the Bureau of Consular Affairs in the review of visa
security advisory opinions and visa revocations.
POC: DAS Catherine Brown 202-647-7754

12. Office Director, INR/NESA (S9734500, FE-MC) Directs
the INR office responsible for analyzing the Middle
East, South Asia, and North Africa. Supervises two division
chiefs and twelve analysts who provide intelligence
support to the Secretary and other Department
policymakers. Sets the office's analytical agenda and
represents INR and the Department in interagency
settings with the intelligence and policymaking
POC: DAS James Buchanan 202-647-9633

13. Office Director, INR/SPM (S8558700, FE-MC) Directs
the INR office responsible for analyzing strategic
forces, WMD, proliferation, and conventional military
affairs. Supervises three division chiefs and fourteen
analysts. Sets the office's analytical agenda and
represents INR and the Department in interagency
settings with the intelligence and policymaking
communities. POC: DAS James Buchanan 202-647-9633

14. Minimize considered.
DE RUEHC #4215/01 2792144
O 062124Z OCT 09

2011-09-05 13:08:57
2011-09-05 13:08:57

Friday, July 13, 2012

Wikileaks Join NATO Attack On Syria.

Washington DC, 12 July 2012 - As the NATO alliance inches closer to a military attack on Syria, a new front in the destabilization of the Damascus government has been opened by the intelligence agencies of the Western powers. The vehicle chosen by the CIA and its allies for this new assault is once again the shadowy limited hangout operation calling itself Wikileaks, and its chief spokesman, the Australian Julian Assange.

On July 5, the Wikileaks website (which the US National Security Agency could cripple within minutes if it so chose) announced a two-month summer offensive against the Baath party government of President Assad based on the release of some 2.43 million e-mails by Syrian government officials, politicians, and companies doing business with the Syrian government, generated between August 2006 and March 2012. About 400,000 emails are in Arabic, and some 70,000 are in Russian.

Assange and his staffers left no doubt that the goal of this new document dump was to discredit the Syrian government, and even more to harass companies in the NATO sphere who are working as contractors for Damascus.

A case in point is the Italian defense contractor Finmeccanica, which was accused based on these e-mails of supplying 500 radios to the Syrian police through Selex Elsag, a subsidiary company. The Italian radical chic newsweekly L’Espresso, owned by financier Carlo de Benedetti, attempted to make these dealings into a scandal under the headline “Finmeccanica helped the dictator.” De Benedetti is a predatory speculator with intelligence links who operates under left cover, very much in the manner of George Soros. The goal of Wikileaks is obviously to incite public opinion against Finmeccanica and similar companies, and to mobilize parliamentary witch hunts against them for supposedly contributing to repression in Syria. If Syria’s western equipment suppliers can be shut down, then the weapons shipped into Syria by Saudi Arabia, Qatar, and the other Gulf monarchies through the CIA distribution network based in southern Turkey could tip the balance in favor of anarchy. Wikileaks is thus complicit in the violent overthrow of the Syrian government by the NATO-backed death squads....read more


Tuesday, July 10, 2012

Wikileaks : Whay Have They Removed The Chile - Syria Cables ?

This was the link to the cables on Chile and Syria ; there is now a trumped up explaination as to why the link can no longer be found !

It would appear we are only to view the latest 'SyriaFiles' ...questions are being asked as to what is the  ASSANGE/ WIKILEAKS agenda  ?



Monday, July 9, 2012

#SyriaFiles #Wikileaks: Brown Lloyd James's political communications memo to Assad on management of protests.

Before Wikileaks:Sensitive Information Security Sources and Breaches


Unauthorized disclosures of secrets are essential for democracy.
In response to Wikileaks background inquiries Cryptome offers that there are hundreds of online and offline sources of sensitive information security breaches which preceded Wikileaks beginning about 120 years ago. This outline traces the conflict between technological capabilities for sensitive information breaches and control by law enforcement when technical countermeasures are insufficient -- a few examples among many others worldwide:
Socrates (c.400BC, Socratic Method): http://en.wikipedia.org/wiki/Socrates
Electromagnetic Spying Timeline (Mid-late 1800's): http://cryptome.org/tempest-time.htm
Peter Zenger Press Freedom Trial (1735): http://en.wikipedia.org/wiki/John_Peter_Zenger
First Amendment of the US Constitution (1791): http://www.usconstitution.net/const.pdf
Alexander Graham Bell (1876): http://en.wikipedia.org/wiki/Alexander_Graham_Bell
UK Official Secrets Act (1889): http://en.wikipedia.org/wiki/Official_Secrets_Act
Nikola Tesla (1894): http://en.wikipedia.org/wiki/Nikola_Tesla
Guglielmo Marconi (1897): http://en.wikipedia.org/wiki/Guglielmo_Marconi
John Dewey (1903): http://en.wikipedia.org/wiki/John_Dewey
Ida Tarbell (1904 The History of the Standard Oil Company): http://en.wikipedia.org/wiki/Ida_M._Tarbell
US Espionage Act of 1917: http://en.wikipedia.org/wiki/Espionage_Act_of_1917
UK Communications-Electronics Security Group (1919): http://www.cesg.gov.uk/
UK GCHQ: http://www.gchq.gov.uk/
American Civil Liberties Union (1920): http://www.aclu.org/
UKUSA Agreement (1940): http://www.nsa.gov/public_info/declass/ukusa.shtml
Echelon: http://en.wikipedia.org/wiki/Echelon_(signals_intelligence)
Nicky Hager (1996): http://www.nickyhager.info/
Mike Frost: http://www.converge.org.nz/abc/frostspy.htm

Duncan Campbell: http://en.wikipedia.org/wiki/Duncan_Campbell_(journalist)
Federation of American Scientists (1945): http://www.fas.org/
Secrecy News (FAS kid): http://www.fas.org/sgp/news/secrecy/

Global Security (FAS kid): http://www.globalsecurity.org/
Les Temps modernes (1945: http://en.wikipedia.org/wiki/Les_Temps_modernes
National Security Act of 1947: http://en.wikipedia.org/wiki/National_Security_Act_of_1947
Central Intelligence Agency (1947): http://www.cia.gov/
Emergence of the Intelligence Establishment: http://history.state.gov/historicaldocuments/frus1945-50Intel

Central Intelligence: Origin and Evolution: http://cryptome.org/cia-origin.htm

Philip Agee (1975; CIA kid): http://en.wikipedia.org/wiki/Philip_Agee

CIA FOIA Documents: http://www.foia.cia.gov/
National Security Agency (1952): http://www.nsa.gov/
Winslow Peck (1972; NSA kid): http://cryptome.org/jya/nsa-elint.htm
Anonymous AU (1973): http://cryptome.org/jya/nsa-40k.htm

US Senate Church Report (1975): http://cryptome.org/nsa-4th.htm

NIST Information Technology Laboratory: http://www.nist.gov/itl/

US Navy The Onion Router: http://www.torproject.org/

NSA FOIA Documents: http://www.nsa.gov/public_info/declass/index.shtml

Wayne Madsen Report: http://www.waynemadsenreport.com/
Simone de Beauvoir (1949, The Second Sex): http://en.wikipedia.org/wiki/The_Second_Sex
I. F. Stone's Weekly (1953-67): http://www.ifstone.org/
Ralph Nader (1965): http://www.nader.org/
Noam Chomsky (1960s): http://www.chomsky.info/;
The Internet (1960s): http://en.wikipedia.org/wiki/Internet

Usenet Newsgroups (1980s): http://en.wikipedia.org/wiki/News_groups

World Wide Web (1989): http://en.wikipedia.org/wiki/Tim_Berners-Lee

Classified Networks: SIPRNet, .smil, .intel, .nsa, .fbi, et al
Hacking (1960s): http://pcworld.about.com/news/Apr102001id45764.htm

2600: http://www.2600.com/

Chaos Computer Club (1985): http://www.ccc.de/

PHRACK: http://www.phrack.org/
Freedom of Information Act (1966): http://en.wikipedia.org/wiki/Freedom_of_Information_Act_(United_States)
National Archives: http://www.archives.gov/
Classified National Security Information: http://www.archives.gov/isoo/policy-documents/eo-12958-amendment.html

Presidential Libraries: http://www.archives.gov/presidential-libraries/

The Federal Register: http://www.archives.gov/federal-register/
Library of Congress: http://www.loc.gov/
David Kahn (1967): http://en.wikipedia.org/wiki/David_Kahn_(writer)
MapQuest (1967): http://www.mapquest.com/
Urban Deadline (Cryptome precursor, 1968): http://cryptome.org/0001/cryptome-ud.htm
Seymour Hersh (1969): http://en.wikipedia.org/wiki/Seymour_Hersh
FTP (ARPANET, 1971): http://en.wikipedia.org/wiki/File_Transfer_Protocol 
Email (ARPANET, 1973): http://en.wikipedia.org/wiki/Email
Electronic Surveillance 1972-1995: http://cryptome.org/esnoop.htm
Bob Woodward and Carl Bernstein (1974): http://www.hrc.utexas.edu/exhibitions/web/woodstein/
Privacy Act (1974): http://www.gpoaccess.gov/privacyact/index.html
Personal Computer Invention (1976): http://www.ideafinder.com/history/inventions/compersonal.htm
Whitfield Diffie (1977): http://en.wikipedia.org/wiki/Whitfield_Diffie
Martin Hellman (1977): http://en.wikipedia.org/wiki/Martin_Hellman
Ralph Merkle (1977): http://en.wikipedia.org/wiki/Ralph_Merkle
Ronald Rivest: http://people.csail.mit.edu/rivest/

Adi Shamir: http://www.wisdom.weizmann.ac.il/profile/scientists/shamir-profile.html
Len Adleman: http://www.usc.edu/dept/molecular-science/fm-adleman.htm

Philip Zimmerman PGP: http://philzimmermann.com/EN/findpgp/
GnuPG: http://www.gnupg.org/
OpenSSL: http://www.openssl.org/
Progressive Magazine Publishes H-Bomb Design 1979: http://www.progressive.org/images/pdf/1179.pdf
Disk Operating System (1980): http://www.ideafinder.com/history/inventions/compersonal.htm
James Bamford (1983): http://en.wikipedia.org/wiki/James_Bamford
Forum on Risks to the Public in Computers and Related Systems (1985): http://catless.ncl.ac.uk/Risks
Jeffrey T. Richelson (1985): http://en.wikipedia.org/wiki/Jeffrey_T._Richelson
National Security Archive (1985): http://www.gwu.edu/~nsarchiv/
Article 19 (1987): http://www.article19.org/
Transactional Records Access Clearinghouse (1989): http://trac.syr.edu/
Public Interest Research (1989): http://www.namebase.org/staffbl.html
Namebase: http://www.namebase.org/

Google Watch: http://www.google-watch.org/

Wikipedia-Watch: http://www.wikipedia-watch.org/
Electronic Frontier Foundation (1990): http://www.eff.org/
Gopher (1991): http://en.wikipedia.org/wiki/Gopher_(protocol)
Lynx (1992): http://en.wikipedia.org/wiki/Lynx_(web_browser)
Cypherpunks Mail List (1992): http://en.wikipedia.org/wiki/Cypherpunk
Crypto Rebels: http://www.wired.com/wired/archive/1.02/crypto.rebels_pr.html
John Gilmore: http://en.wikipedia.org/wiki/John_Gilmore_(activist)

Eric Hughes, A Cypherpunk's Manifesto: http://www.activism.net/cypherpunk/manifesto.html

Timothy C. May: http://en.wikipedia.org/wiki/Timothy_C._May
Timothy C. May Cyphernomicon: http://www.cypherpunks.to/faq/cyphernomicron/cyphernomicon.html
Matt Blaze Crypto: http://www.crypto.com/

Marc Briceno: http://blog.pgp.com/index.php/author/mbriceno/

David Wagner: http://www.cs.berkeley.edu/~daw/

Joel McNamara: http://www.eskimo.com/~joelm/ also:
Joel McNamara Tempest Page: http://www.eskimo.com/~joelm/tempest.html
Cryptography (Cypherpunks kid): http://www.mail-archive.com/cryptography@metzdowd.com/maillist.html

James Dalton Bell (Cypherpunks Kid): Federal Correctional Institution Sheridan also:
Arrest: http://cryptome.org/jya/jimbell.htm

Trial: http://cryptome.org/jya/jdbfiles.htm
Carl Edward Johnson (Bell kid): http://cryptome.org/jya/cejfiles.htm
Cypherpunks Archives 1992-1998 http://cryptome.org/cpunks/cpunks-92-98.zip (83MB)
Cryptome (originally jya.com 1996; Cypherpunks kid): http://www.cryptome.org/
Cartome (2001): http://www.cartome.org/

Eyeball Series (2002): http://cryptome.org/eyeball/index.html
UK Secret Bases: http://www.secret-bases.co.uk/ Public Sources for Satellite and Aerial Photos and Maps: http://cryptome.org/gis-sources.htm
Wikileaks (2006; Cryptome "spiritual godkid"): http://www.wikileaks.org/
Julian Assange on Cypherpunks 1995-2005: http://cryptome.org/0001/assange-cpunks.htm
Julian Assange Best of Security (1995): http://marc.info/?l=best-of-security&r=1&b=199507&w=2
Interesting-People Mail List (1993): http://www.interesting-people.org/archives/interesting-people/
Electronic Privacy Information Center (1994): http://www.epic.org/
Quintessenz (1994): http://www.quintessenz.at/cgi-bin/index?funktion=about
AltaVista (1995): http://www.altavista.com/
The Internet Archive (1996): http://www.archive.org/ (Generous links to online libraries)
UK Crypto Mail List (1996): http://www.chiark.greenend.org.uk/mailman/listinfo/ukcrypto
Ben Laurie (Wikileaks Advisor): http://www.apache-ssl.org/ben.html

Ross Anderson: http://www.cl.cam.ac.uk/~rja14/
Marcus Kuhn: http://www.cl.cam.ac.uk/~mgk25/
Adam Back Cypherspace: http://www.cypherspace.org/adam/
GSM Crypto Cracks (1997-2010): http://cryptome.org/0001/gsm-a5-files.htm
Terraserver USA (1998): http://www.terraserver-usa.com/
Bing Maps (2009): http://www.bing.com/maps
Google (1998): http://www.google.com/
Google Earth: http://earth.google.com/
Wikipedia (2001): http://www.wikipedia.org/
Advanced Encryption Standard (2001): http://en.wikipedia.org/wiki/Advanced_Encryption_Standard
USA PATRIOT Act (2001): http://en.wikipedia.org/wiki/Patriot_act
NSA warrant-less surveillance (2001): http://en.wikipedia.org/wiki/NSA_warrantless_surveillance_controversy
Total Information Awareness (2002): http://en.wikipedia.org/wiki/Total_information_awareness
Daniel Bernstein: http://cr.yp.to/djb.html
Bruce Schneier: http://www.schneier.com/
Cryptography Research: http://www.cryptography.com/
Ciphers by Ritter: http://www.ciphersbyritter.com/ (Generous links)
Cryptography Org: http://www.cryptography.org/ (Generous links)
Scribd: http://www.scribd.com/
PGPBoard: http://www.pgpboard.com/
The Memory Hole: http://www.thememoryhole.org [Temporarily down]
ProPublica (June 2008): http://www.propublica.org/
Government Attic (longtime source of FOI to others): http://www.governmentattic.org/
Public Intelligence: http://publicintelligence.net/
Public Intelligence Blog: http://www.phibetaiota.net/ (Handy list of comsec and spy sites)
History Anarchy Blog: http://historyanarchy.blogspot.com/
WikiSpooks: http://www.wikispooks.com/
Cryptocomb: http://cryptocomb.org/
29 June 2012
Compedium of the ever-growing leak sites: http://leakdirectory.org/index.php/Leak_Site_Directory
7 July 2012
Project PM: Tracking the Spy Industry: http://wiki.echelon2.org/wiki/Main_Page
Anonymous Analytics: http://anonanalytics.com/
Par:AnoIA - Potentially Alarming Research: Anonymous Intelligence Agency: http://www.par-anoia.net/