Cleaves NEWSWIRE [Cleaves Newswire has been decommissioned but will remain online as a resource and to preserve backlinks; new site here.] Independent Open Publishing
 
"He who passively accepts evil is an accessory to it" -- Martin Luther King, Jr
» Gallery

Search

search comments
advanced search
printable version
PDF version

Be Our Guest, Julian!
by Raffi Khatchadourian via Kismo - The New Yorker Friday, Jun 11 2010, 10:38am
international / miscellaneous / other press

NO SECRETS

The house on Grettisgata Street, in Reykjavik, is a century old, small and white, situated just a few streets from the North Atlantic. The shifting northerly winds can suddenly bring ice and snow to the city, even in springtime, and when they do a certain kind of silence sets in. This was the case on the morning of March 30th, when a tall Australian man named Julian Paul Assange, with gray eyes and a mop of silver-white hair, arrived to rent the place. Assange was dressed in a gray full-body snowsuit, and he had with him a small entourage. “We are journalists,” he told the owner of the house. Eyjafjallajökull had recently begun erupting, and he said, “We’re here to write about the volcano.”

Julian Assange
Julian Assange

After the owner left, Assange quickly closed the drapes, and he made sure that they stayed closed, day and night. The house, as far as he was concerned, would now serve as a war room; people called it the Bunker. Half a dozen computers were set up in a starkly decorated, white-walled living space. Icelandic activists arrived, and they began to work, more or less at Assange’s direction, around the clock. Their focus was Project B—Assange’s code name for a thirty-eight-minute video taken from the cockpit of an Apache military helicopter in Iraq in 2007. The video depicted American soldiers killing at least eighteen people, including two Reuters journalists; it later became the subject of widespread controversy, but at this early stage it was still a closely guarded military secret.

Assange is an international trafficker, of sorts. He and his colleagues collect documents and imagery that governments and other institutions regard as confidential and publish them on a Web site called WikiLeaks.org. Since it went online, three and a half years ago, the site has published an extensive catalogue of secret material, ranging from the Standard Operating Procedures at Camp Delta, in Guantánamo Bay, and the “Climategate” e-mails from the University of East Anglia, in England, to the contents of Sarah Palin’s private Yahoo account. The catalogue is especially remarkable because WikiLeaks is not quite an organization; it is better described as a media insurgency. It has no paid staff, no copiers, no desks, no office. Assange does not even have a home. He travels from country to country, staying with supporters, or friends of friends—as he once put it to me, “I’m living in airports these days.” He is the operation’s prime mover, and it is fair to say that WikiLeaks exists wherever he does. At the same time, hundreds of volunteers from around the world help maintain the Web site’s complicated infrastructure; many participate in small ways, and between three and five people dedicate themselves to it full time. Key members are known only by initials—M, for instance—even deep within WikiLeaks, where communications are conducted by encrypted online chat services. The secretiveness stems from the belief that a populist intelligence operation with virtually no resources, designed to publicize information that powerful institutions do not want public, will have serious adversaries.

Iceland was a natural place to develop Project B. In the past year, Assange has collaborated with politicians and activists there to draft a free-speech law of unprecedented strength, and a number of these same people had agreed to help him work on the video in total secrecy. The video was a striking artifact—an unmediated representation of the ambiguities and cruelties of modern warfare—and he hoped that its release would touch off a worldwide debate about the conflicts in Iraq and Afghanistan. He was planning to unveil the footage before a group of reporters at the National Press Club, in Washington, on April 5th, the morning after Easter, presumably a slow news day. To accomplish this, he and the other members of the WikiLeaks community would have to analyze the raw video and edit it into a short film, build a stand-alone Web site to display it, launch a media campaign, and prepare documentation for the footage—all in less than a week’s time.

Assange also wanted to insure that, once the video was posted online, it would be impossible to remove. He told me that WikiLeaks maintains its content on more than twenty servers around the world and on hundreds of domain names. (Expenses are paid by donations, and a few independent well-wishers also run “mirror sites” in support.) Assange calls the site “an uncensorable system for untraceable mass document leaking and public analysis,” and a government or company that wanted to remove content from WikiLeaks would have to practically dismantle the Internet itself. So far, even though the site has received more than a hundred legal threats, almost no one has filed suit. Lawyers working for the British bank Northern Rock threatened court action after the site published an embarrassing memo, but they were practically reduced to begging. A Kenyan politician also vowed to sue after Assange published a confidential report alleging that President Daniel arap Moi and his allies had siphoned billions of dollars out of the country. The site’s work in Kenya earned it an award from Amnesty International.

Assange typically tells would-be litigants to go to hell. In 2008, WikiLeaks posted secret Scientology manuals, and lawyers representing the church demanded that they be removed. Assange’s response was to publish more of the Scientologists’ internal material, and to announce, “WikiLeaks will not comply with legally abusive requests from Scientology any more than WikiLeaks has complied with similar demands from Swiss banks, Russian offshore stem-cell centers, former African kleptocrats, or the Pentagon.”

In his writing online, especially on Twitter, Assange is quick to lash out at perceived enemies. By contrast, on television, where he has been appearing more frequently, he acts with uncanny sang-froid. Under the studio lights, he can seem—with his spectral white hair, pallid skin, cool eyes, and expansive forehead—like a rail-thin being who has rocketed to Earth to deliver humanity some hidden truth. This impression is magnified by his rigid demeanor and his baritone voice, which he deploys slowly, at low volume.

In private, however, Assange is often bemused and energetic. He can concentrate intensely, in binges, but he is also the kind of person who will forget to reserve a plane ticket, or reserve a plane ticket and forget to pay for it, or pay for the ticket and forget to go to the airport. People around him seem to want to care for him; they make sure that he is where he needs to be, and that he has not left all his clothes in the dryer before moving on. At such times, he can seem innocent of the considerable influence that he has acquired.

Sitting at a small wooden table in the Bunker, Assange looked exhausted. His lanky frame was arched over two computers—one of them online, and the other disconnected from the Internet, because it was full of classified military documents. (In the tradecraft of espionage, this is known as maintaining an “air gap.”) He has a cyber-security analyst’s concern about computer vulnerability, and habitually takes precautions to frustrate eavesdroppers. A low-grade fever of paranoia runs through the WikiLeaks community. Assange says that he has chased away strangers who have tried to take his picture for surveillance purposes. In March, he published a classified military report, created by the Army Counterintelligence Center in 2008, that argued that the site was a potential threat to the Army and briefly speculated on ways to deter government employees from leaking documents to it. Assange regarded the report as a declaration of war, and posted it with the title “U.S. Intelligence Planned to Destroy WikiLeaks.” During a trip to a conference before he came to the Bunker, he thought he was being followed, and his fear began to infect others. “I went to Sweden and stayed with a girl who is a foreign editor of a newspaper there, and she became so paranoid that the C.I.A. was trying to get me she left the house and abandoned me,” he said.

Assange was sitting opposite Rop Gonggrijp, a Dutch activist, hacker, and businessman. Gonggrijp—thin and balding, with a soft voice—has known Assange well for several years. He had noticed Assange’s panicky communiqués about being watched and decided that his help was needed. “Julian can deal with incredibly little sleep, and a hell of a lot of chaos, but even he has his limits, and I could see that he was stretching himself,” Gonggrijp told me. “I decided to come out and make things sane again.” Gonggrijp became the unofficial manager and treasurer of Project B, advancing about ten thousand euros to WikiLeaks to finance it. He kept everyone on schedule, and made sure that the kitchen was stocked with food and that the Bunker was orderly.

At around three in the afternoon, an Icelandic parliamentarian named Birgitta Jonsdottir walked in. Jonsdottir, who is in her forties, with long brown hair and bangs, was wearing a short black skirt and a black T-shirt with skulls printed on it. She took a WikiLeaks T-shirt from her bag and tossed it at Assange.

“That’s for you,” she said. “You need to change.” He put the T-shirt on a chair next to him, and continued working.

Jonsdottir has been in parliament for about a year, but considers herself a poet, artist, writer, and activist. Her political views are mostly anarchist. “I was actually unemployed before I got this job,” she explained. “When we first got to parliament, the staff was so nervous: here are people who were protesting parliament, who were for revolution, and now we are inside. None of us had aspirations to be politicians. We have a checklist, and, once we’re done, we are out.”

As she unpacked her computer, she asked Assange how he was planning to delegate the work on Project B. More Icelandic activists were due to arrive; half a dozen ultimately contributed time to the video, and about as many WikiLeaks volunteers from other countries were participating. Assange suggested that someone make contact with Google to insure that YouTube would host the footage.

“To make sure it is not taken down under pressure?” she asked.

“They have a rule that mentions gratuitous violence,” Assange said. “The violence is not gratuitous in this case, but nonetheless they have taken things down. It is too important to be interfered with.”

“What can we ask M to do?” Jonsdottir asked. Assange, engrossed in what he was doing, didn’t reply.

His concerns about surveillance had not entirely receded. On March 26th, he had written a blast e-mail, titled “Something Is Rotten in the State of Iceland,” in which he described a teen-age Icelandic WikiLeaks volunteer’s story of being detained by local police for more than twenty hours. The volunteer was arrested for trying to break into the factory where his father worked—“the reasons he was trying to get in are not totally justified,” Assange told me—and said that while in custody he was interrogated about Project B. Assange claimed that the volunteer was “shown covert photos of me outside the Reykjavik restaurant Icelandic Fish & Chips,” where a WikiLeaks production meeting had taken place in a private back room.

The police were denying key parts of the volunteer’s story, and Assange was trying to learn more. He received a call, and after a few minutes hung up. “Our young friend talked to one of the cops,” he said. “I was about to get more details, but my battery died.” He smiled and looked suspiciously at his phone.

“We are all paranoid schizophrenics,” Jonsdottir said. She gestured at Assange, who was still wearing his snowsuit. “Just look at how he dresses.”

Gonggrijp got up, walked to the window, and parted the drapes to peer out.

“Someone?” Jonsdottir asked.

“Just the camera van,” he deadpanned. “The brain-manipulation van.”

At around six in the evening, Assange got up from his spot at the table. He was holding a hard drive containing Project B. The video—excerpts of running footage captured by a camera mounted on the Apache—depicts soldiers conducting an operation in eastern Baghdad, not long after the surge began. Using the Freedom of Information Act, Reuters has sought for three years to obtain the video from the Army, without success. Assange would not identify his source, saying only that the person was unhappy about the attack. The video was digitally encrypted, and it took WikiLeaks three months to crack. Assange, a cryptographer of exceptional skill, told me that unlocking the file was “moderately difficult.”

People gathered in front of a computer to watch. In grainy black-and-white, we join the crew of the Apache, from the Eighth Cavalry Regiment, as it hovers above Baghdad with another helicopter. A wide-angle shot frames a mosque’s dome in crosshairs. We see a jumble of buildings and palm trees and abandoned streets. We hear bursts of static, radio blips, and the clipped banter of tactical communication. Two soldiers are in mid-conversation; the first recorded words are “O.K., I got it.” Assange hit the pause button, and said, “In this video, you will see a number of people killed.” The footage, he explained, had three broad phases. “In the first phase, you will see an attack that is based upon a mistake, but certainly a very careless mistake. In the second part, the attack is clearly murder, according to the definition of the average man. And in the third part you will see the killing of innocent civilians in the course of soldiers going after a legitimate target.”

The first phase was chilling, in part because the banter of the soldiers was so far beyond the boundaries of civilian discourse. “Just fuckin’, once you get on ’em, just open ’em up,” one of them said. The crew members of the Apache came upon about a dozen men ambling down a street, a block or so from American troops, and reported that five or six of the men were armed with AK-47s; as the Apache maneuvered into position to fire at them, the crew saw one of the Reuters journalists, who were mixed in among the other men, and mistook a long-lensed camera for an RPG. The Apaches fired on the men for twenty-five seconds, killing nearly all of them instantly.

Phase two began shortly afterward. As the helicopter hovered over the carnage, the crew noticed a wounded survivor struggling on the ground. The man appeared to be unarmed. “All you gotta do is pick up a weapon,” a soldier in the Apache said. Suddenly, a van drove into view, and three unarmed men rushed to help the wounded person. “We have individuals going to the scene, looks like possibly, uh, picking up bodies and weapons,” the Apache reported, even though the men were helping a survivor, and were not collecting weapons. The Apache fired, killing the men and the person they were trying to save, and wounding two young children in the van’s front seat.

In phase three, the helicopter crew radioed a commander to say that at least six armed men had entered a partially constructed building in a dense urban area. Some of the armed men may have walked over from a skirmish with American troops; it is unclear. The crew asked for permission to attack the structure, which they said appeared abandoned. “We can put a missile in it,” a soldier in the Apache suggested, and the go-ahead was quickly given. Moments later, two unarmed people entered the building. Though the soldiers acknowledged them, the attack proceeded: three Hellfire missiles destroyed the building. Passersby were engulfed by clouds of debris.

Assange saw these events in sharply delineated moral terms, yet the footage did not offer easy legal judgments. In the month before the video was shot, members of the battalion on the ground, from the Sixteenth Infantry Regiment, had suffered more than a hundred and fifty attacks and roadside bombings, nineteen injuries, and four deaths; early that morning, the unit had been attacked by small-arms fire. The soldiers in the Apache were matter-of-fact about killing and spoke callously about their victims, but the first attack could be judged as a tragic misunderstanding. The attack on the van was questionable—the use of force seemed neither thoughtful nor measured—but soldiers are permitted to shoot combatants, even when they are assisting the wounded, and one could argue that the Apache’s crew, in the heat of the moment, reasonably judged the men in the van to be assisting the enemy. Phase three may have been unlawful, perhaps negligent homicide or worse. Firing missiles into a building, in daytime, to kill six people who do not appear to be of strategic importance is an excessive use of force. This attack was conducted with scant deliberation, and it is unclear why the Army did not investigate it.

Assange had obtained internal Army records of the operation, which stated that everyone killed, except for the Reuters journalists, was an insurgent. And the day after the incident an Army spokesperson said, “There is no question that Coalition Forces were clearly engaged in combat operations against a hostile force.” Assange was hoping that Project B would undermine the Army’s official narrative. “This video shows what modern warfare has become, and, I think, after seeing it, whenever people hear about a certain number of casualties that resulted during fighting with close air support, they will understand what is going on,” he said in the Bunker. “The video also makes clear that civilians are listed as insurgents automatically, unless they are children, and that bystanders who are killed are not even mentioned.”

WikiLeaks receives about thirty submissions a day, and typically posts the ones it deems credible in their raw, unedited state, with commentary alongside. Assange told me, “I want to set up a new standard: ‘scientific journalism.’ If you publish a paper on DNA, you are required, by all the good biological journals, to submit the data that has informed your research—the idea being that people will replicate it, check it, verify it. So this is something that needs to be done for journalism as well. There is an immediate power imbalance, in that readers are unable to verify what they are being told, and that leads to abuse.” Because Assange publishes his source material, he believes that WikiLeaks is free to offer its analysis, no matter how speculative. In the case of Project B, Assange wanted to edit the raw footage into a short film as a vehicle for commentary. For a while, he thought about calling the film “Permission to Engage,” but ultimately decided on something more forceful: “Collateral Murder.” He told Gonggrijp, “We want to knock out this ‘collateral damage’ euphemism, and so when anyone uses it they will think ‘collateral murder.’ ”

The video, in its original form, was a puzzle—a fragment of evidence divorced from context. Assange and the others in the Bunker spent much of their time trying to piece together details: the units involved, their command structure, the rules of engagement, the jargon soldiers used on the radio, and, most important, whether and how the Iraqis on the ground were armed.

“One of them has a weapon,” Assange said, peering at blurry footage of the men walking down the street. “See all those people standing out there.”

“And there is a guy with an RPG over his arm,” Gonggrijp said.

“I’m not sure.” Assange said. “It does look a little bit like an RPG.” He played the footage again. “I’ll tell you what is very strange,” he said. “If it is an RPG, then there is just one RPG. Where are all the other weapons? All those guys. It is pretty weird.”

The forensic work was made more difficult because Assange had declined to discuss the matter with military officials. “I thought it would be more harmful than helpful,” he told me. “I have approached them before, and, as soon as they hear it is WikiLeaks, they are not terribly coöperative.” Assange was running Project B as a surprise attack. He had encouraged a rumor that the video was shot in Afghanistan in 2009, in the hope that the Defense Department would be caught unprepared. Assange does not believe that the military acts in good faith with the media. He said to me, “What right does this institution have to know the story before the public?”

This adversarial mind-set permeated the Bunker. Late one night, an activist asked if Assange might be detained upon his arrival in the United States.

“If there is ever a time it was safe for me to go, it is now,” Assange assured him.

“They say that Gitmo is nice this time of year,” Gonggrijp said.

Assange was the sole decision-maker, and it was possible to leave the house at night and come back after sunrise and see him in the same place, working. (“I spent two months in one room in Paris once without leaving,” he said. “People were handing me food.”) He spoke to the team in shorthand—“I need the conversion stuff,” or “Make sure that credit-card donations are acceptable”—all the while resolving flareups with the overworked volunteers. To keep track of who was doing what, Gonggrijp and another activist maintained a workflow chart with yellow Post-Its on the kitchen cabinets. Elsewhere, people were translating the video’s subtitles into various languages, or making sure that servers wouldn’t crash from the traffic that was expected after the video was posted. Assange wanted the families of the Iraqis who had died in the attack to be contacted, to prepare them for the inevitable media attention, and to gather additional information. In conjunction with Iceland’s national broadcasting service, RUV, he sent two Icelandic journalists to Baghdad to find them.

By the end of the week, a frame-by-frame examination of the footage was nearly complete, revealing minute details—evidence of a body on the ground, for instance—that were not visible by casual viewing. (“I am about twelve thousand frames in,” the activist who reviewed it told me. “It’s been a morbid day, going through these people’s last moments.”) Assange had decided to exclude the Hellfire incident from the film; the attack lacked the obvious human dimension of the others, and he thought that viewers might be overloaded with information.

The edited film, which was eighteen minutes long, began with a quote from George Orwell that Assange and M had selected: “Political language is designed to make lies sound truthful and murder respectable, and to give the appearance of solidity to pure wind.” It then presented information about the journalists who had been killed, and about the official response to the attack. For the audio of this section, one of the film’s Icelandic editors had layered in fragments of radio banter from the soldiers. As Assange reviewed the cut, an activist named Gudmundur Gudmundsson spoke up to say that the banter allowed viewers to “make an emotional bond” with the soldiers. Assange argued that it was mostly fragmentary and garbled, but Gudmundsson insisted: “It is just used all the time for triggering emotions.”

“At the same time, we are displaying them as monsters,” the editor said.

“But emotions always rule,” Gudmundsson said. “By the way, I worked on the sound recording for a film, ‘Children of Nature,’ that was nominated for an Oscar, so I am speaking from experience.”

“Well, what is your alternative?” Assange asked.

“Basically, bursts of sounds, interrupting the quiet,” he said.

The editor made the change, stripping the voices of the soldiers from the opening, but keeping blips and whirs of radio distortion. Assange gave the edit his final approval.

Late Saturday night, shortly before all the work had to be finished, the journalists who had gone to Baghdad sent Assange an e-mail: they had found the two children in the van. The children had lived a block from the location of the attack, and were being driven to school by their father that morning. “They remember the bombardment, felt great pain, they said, and lost consciousness,” one of the journalists wrote. The journalists also found the owner of the building that had been attacked by the Hellfires, who said that families had been living in the structure, and that seven residents had died. The owner, a retired English teacher, had lost his wife and daughter. An intense discussion arose about what to do with this news: Was it worth using at the National Press Club, or was it a better tactic to hold on to it? If the military justified the Hellfire attacks by claiming that there were no civilian casualties, WikiLeaks could respond by releasing the information, in a kind of ambush. Jonsdottir turned to Gonggrijp, whose eyes had welled up.

“Are you crying?” she asked.

“I am,” he said. “O.K., O.K., it is just the kids. It hurts.” Gonggrijp gathered himself. “Fuck!” he said. Resuming the conversation about ambushing the Army, he said, “Anyway, let them walk into this knife—”

“That is a wonderful thing to do,” one of the activists said.

“Let them walk into this, and they will,” Gonggrijp said. “It is a logical response.”

Jonsdottir was now in tears, too, and wiping her nose.

“Now I want to reëdit the thing,” Assange said. “I want to put in the missile attack. There were three families living in the bottom, so it wasn’t abandoned.” But it was impossible to reëdit the film. The activists were working at capacity, and in several hours it would be Easter.

At half past ten in the morning, Gonggrijp pulled open the drapes, and the Bunker was filled with sunlight. He was wearing a long-sleeved T-shirt and black pants, freshly washed and ironed, and he was struggling to keep everyone on schedule. Last-minute concerns—among them finding a criminal-defense lawyer in the United States—were being addressed. Assange was at a computer, his posture upright as he steadily typed.

“How are we on time?” he asked no one in particular.

“We have three hours,” Gonggrijp said.

Assange wrinkled his brow and turned his attention back to the screen. He was looking at a copy of classified rules of engagement in Iraq from 2006, one of several secret American military documents that he was planning to post with the video. WikiLeaks scrubs such documents to insure that no digital traces embedded in them can identify their source. Assange was purging these traces as fast as he could.

Reykjavik’s streets were empty, and the bells of a cathedral began to toll. “Remember, remember the fifth of November,” Assange said, repeating a line from the English folk poem celebrating Guy Fawkes. He smiled, as Gonggrijp dismantled the workflow chart, removing Post-Its from the cabinets and flushing them down the toilet. Shortly before noon, there was a desperate push to clear away the remaining vestiges of Project B and to get to the airport. Assange was unpacked and unshaven, and his hair was a mess. He was typing up a press release. Jonsdottir came by to help, and he asked her, “Can’t you cut my hair while I’m doing this?”

“No, I am not going to cut your hair while you are working,” she said.

Jonsdottir walked over to the sink and made tea. Assange kept on typing, and after a few minutes she reluctantly began to trim his hair. At one point, she stopped and asked, “If you get arrested, will you get in touch with me?” Assange nodded. Gonggrijp, meanwhile, shoved some of Assange’s things into a bag. He settled the bill with the owner. Dishes were washed. Furniture was put back in place. People piled into a small car, and in an instant the house was empty and still.

The name Assange is thought to derive from Ah Sang, or Mr. Sang, a Chinese émigré who settled on Thursday Island, off the coast of Australia, in the early eighteen-hundreds, and whose descendants later moved to the continent. Assange’s maternal ancestors came to Australia in the mid-nineteenth century, from Scotland and Ireland, in search of farmland, and Assange suspects, only half in jest, that his proclivity for wandering is genetic. His phone numbers and e-mail address are ever-changing, and he can drive the people around him crazy with his elusiveness and his propensity to mask details about his life.

Assange was born in 1971, in the city of Townsville, on Australia’s northeastern coast, but it is probably more accurate to say that he was born into a blur of domestic locomotion. Shortly after his first birthday, his mother—I will call her Claire—married a theatre director, and the two collaborated on small productions. They moved often, living near Byron Bay, a beachfront community in New South Wales, and on Magnetic Island, a tiny pile of rock that Captain Cook believed had magnetic properties that distorted his compass readings. They were tough-minded nonconformists. (At seventeen, Claire had burned her schoolbooks and left home on a motorcycle.) Their house on Magnetic Island burned to the ground, and rifle cartridges that Claire had kept for shooting snakes exploded like fireworks. “Most of this period of my childhood was pretty Tom Sawyer,” Assange told me. “I had my own horse. I built my own raft. I went fishing. I was going down mine shafts and tunnels.”

Assange’s mother believed that formal education would inculcate an unhealthy respect for authority in her children and dampen their will to learn. “I didn’t want their spirits broken,” she told me. In any event, the family had moved thirty-seven times by the time Assange was fourteen, making consistent education impossible. He was homeschooled, sometimes, and he took correspondence classes and studied informally with university professors. But mostly he read on his own, voraciously. He was drawn to science. “I spent a lot of time in libraries going from one thing to another, looking closely at the books I found in citations, and followed that trail,” he recalled. He absorbed a large vocabulary, but only later did he learn how to pronounce all the words that he learned.

When Assange was eight, Claire left her husband and began seeing a musician, with whom she had another child, a boy. The relationship was tempestuous; the musician became abusive, she says, and they separated. A fight ensued over the custody of Assange’s half brother, and Claire felt threatened, fearing that the musician would take away her son. Assange recalled her saying, “Now we need to disappear,” and he lived on the run with her from the age of eleven to sixteen. When I asked him about the experience, he told me that there was evidence that the man belonged to a powerful cult called the Family—its motto was “Unseen, Unknown, and Unheard.” Some members were doctors who persuaded mothers to give up their newborn children to the cult’s leader, Anne Hamilton-Byrne. The cult had moles in government, Assange suspected, who provided the musician with leads on Claire’s whereabouts. In fact, Claire often told friends where she had gone, or hid in places where she had lived before.

While on the run, Claire rented a house across the street from an electronics shop. Assange would go there to write programs on a Commodore 64, until Claire bought it for him, moving to a cheaper place to raise the money. He was soon able to crack into well-known programs, where he found hidden messages left by their creators. “The austerity of one’s interaction with a computer is something that appealed to me,” he said. “It is like chess—chess is very austere, in that you don’t have many rules, there is no randomness, and the problem is very hard.” Assange embraced life as an outsider. He later wrote of himself and a teen-age friend, “We were bright sensitive kids who didn’t fit into the dominant subculture and fiercely castigated those who did as irredeemable boneheads.”

When Assange turned sixteen, he got a modem, and his computer was transformed into a portal. Web sites did not exist yet—this was 1987—but computer networks and telecom systems were sufficiently linked to form a hidden electronic landscape that teen-agers with the requisite technical savvy could traverse. Assange called himself Mendax—from Horace’s splendide mendax, or “nobly untruthful”—and he established a reputation as a sophisticated programmer who could break into the most secure networks. He joined with two hackers to form a group that became known as the International Subversives, and they broke into computer systems in Europe and North America, including networks belonging to the U.S. Department of Defense and to the Los Alamos National Laboratory. In a book called “Underground,” which he collaborated on with a writer named Suelette Dreyfus, he outlined the hacker subculture’s early Golden Rules: “Don’t damage computer systems you break into (including crashing them); don’t change the information in those systems (except for altering logs to cover your tracks); and share information.”

Around this time, Assange fell in love with a sixteen-year-old girl, and he briefly moved out of his mother’s home to stay with her. “A couple of days later, police turned up, and they carted off all my computer stuff,” he recalled. The raid, he said, was carried out by the state police, and “it involved some dodgy character who was alleging that we had stolen five hundred thousand dollars from Citibank.” Assange wasn’t charged, and his equipment was returned. “At that point, I decided that it might be wise to be a bit more discreet,” he said. Assange and the girl joined a squatters’ union in Melbourne, until they learned she was pregnant, and moved to be near Claire. When Assange was eighteen, the two got married in an unofficial ceremony, and soon afterward they had a son.

Hacking remained a constant in his life, and the thrill of digital exploration was amplified by the growing knowledge, among the International Subversives, that the authorities were interested in their activities. The Australian Federal Police had set up an investigation into the group, called Operation Weather, which the hackers strove to monitor.

In September, 1991, when Assange was twenty, he hacked into the master terminal that Nortel, the Canadian telecom company, maintained in Melbourne, and began to poke around. The International Subversives had been visiting the master terminal frequently. Normally, Assange hacked into computer systems at night, when they were semi-dormant, but this time a Nortel administrator was signed on. Sensing that he might be caught, Assange approached him with humor. “I have taken control,” he wrote, without giving his name. “For years, I have been struggling in this grayness. But now I have finally seen the light.” The administrator did not reply, and Assange sent another message: “It’s been nice playing with your system. We didn’t do any damage and we even improved a few things. Please don’t call the Australian Federal Police.”

The International Subversives’ incursions into Nortel turned out to be a critical development for Operation Weather. Federal investigators tapped phone lines to see which ones the hackers were using. “Julian was the most knowledgeable and the most secretive of the lot,” Ken Day, the lead investigator, told me. “He had some altruistic motive. I think he acted on the belief that everyone should have access to everything.”

“Underground” describes Assange’s growing fear of arrest: “Mendax dreamed of police raids all the time. He dreamed of footsteps crunching on the driveway gravel, of shadows in the pre-dawn darkness, of a gun-toting police squad bursting through his backdoor at 5 am.” Assange could relax only when he hid his disks in an apiary that he kept. By October, he was in a terrible state. His wife had left him, taking with her their infant son. His home was a mess. He barely ate or slept. On the night the police came, the twenty-ninth, he wired his phone through his stereo and listened to the busy signal until eleven-thirty, when Ken Day knocked on his door, and told him, “I think you’ve been expecting me.”

Assange was charged with thirty-one counts of hacking and related crimes. While awaiting trial, he fell into a depression, and briefly checked himself into a hospital. He tried to stay with his mother, but after a few days he took to sleeping in nearby parks. He lived and hiked among dense eucalyptus forests in the Dandenong Ranges National Park, which were thick with mosquitoes whose bites scarred his face. “Your inner voice quiets down,” he told me. “Internal dialogue is stimulated by a preparatory desire to speak, but it is not actually useful if there are no other people around.” He added, “I don’t want to sound too Buddhist. But your vision of yourself disappears.”

It took more than three years for the authorities to bring the case against Assange and the other International Subversives to court. Day told me, “We had just formed the computer-crimes team, and the government said, ‘Your charter is to establish a deterrent.’ Well, to get a deterrent you have to prosecute people, and we achieved that with Julian and his group.” A computer-security team working for Nortel in Canada drafted an incident report alleging that the hacking had caused damage that would cost more than a hundred thousand dollars to repair. The chief prosecutor, describing Assange’s near-limitless access, told the court, “It was God Almighty walking around doing what you like.”

Assange, facing a potential sentence of ten years in prison, found the state’s reaction confounding. He bought Aleksandr Solzhenitsyn’s “The First Circle,” a novel about scientists and technicians forced into the Gulag, and read it three times. (“How close the parallels to my own adventures!” he later wrote.) He was convinced that “look/see” hacking was a victimless crime, and intended to fight the charges. But the other members of the group decided to coöperate. “When a judge says, ‘The prisoner shall now rise,’ and no one else in the room stands—that is a test of character,” he told me. Ultimately, he pleaded guilty to twenty-five charges and six were dropped. But at his final sentencing the judge said, “There is just no evidence that there was anything other than sort of intelligent inquisitiveness and the pleasure of being able to—what’s the expression—surf through these various computers.” Assange’s only penalty was to pay the Australian state a small sum in damages.

As the criminal case was unfolding, Assange and his mother were also waging a campaign to gain full custody of Assange’s son—a legal fight that was, in many ways, far more wrenching than his criminal defense. They were convinced that the boy’s mother and her new boyfriend posed a danger to the child, and they sought to restrict her rights. The state’s child-protection agency, Health and Community Services, disagreed. The specifics of the allegations are unclear; family-court records in Australia are kept anonymous. But in 1995 a parliamentary committee found that the agency maintained an “underlying philosophy of deflecting as many cases away from itself as possible.” When the agency decided that a child was living in a safe household, there was no way to immediately appeal its decision.

The custody battle evolved into a bitter fight with the state. “What we saw was a great bureaucracy that was squashing people,” Claire told me. She and Assange, along with another activist, formed an organization called Parent Inquiry Into Child Protection. “We used full-on activist methods,” Claire recalled. In meetings with Health and Community Services, “we would go in and tape-record them secretly.” The organization used the Australian Freedom of Information Act to obtain documents from Health and Community Services, and they distributed flyers to child-protection workers, encouraging them to come forward with inside information, for a “central databank” that they were creating. “You may remain anonymous if you wish,” one flyer stated. One protection worker leaked to the group an important internal manual. Assange told me, “We had moles who were inside dissidents.”

In 1999, after nearly three dozen legal hearings and appeals, Assange worked out a custody agreement with his wife. Claire told me, “We had experienced very high levels of adrenaline, and I think that after it all finished I ended up with P.T.S.D. It was like coming back from a war. You just can’t interact with normal people to the same degree, and I am sure that Jules has some P.T.S.D. that is untreated.” Not long after the court cases, she said, Assange’s hair, which had been dark brown, became drained of all color.

Assange was burned out. He motorcycled across Vietnam. He held various jobs, and even earned money as a computer-security consultant, supporting his son to the extent that he was able. He studied physics at the University of Melbourne. He thought that trying to decrypt the secret laws governing the universe would provide the intellectual stimulation and rush of hacking. It did not. In 2006, on a blog he had started, he wrote about a conference organized by the Australian Institute of Physics, “with 900 career physicists, the body of which were sniveling fearful conformists of woefully, woefully inferior character.”

He had come to understand the defining human struggle not as left versus right, or faith versus reason, but as individual versus institution. As a student of Kafka, Koestler, and Solzhenitsyn, he believed that truth, creativity, love, and compassion are corrupted by institutional hierarchies, and by “patronage networks”—one of his favorite expressions—that contort the human spirit. He sketched out a manifesto of sorts, titled “Conspiracy as Governance,” which sought to apply graph theory to politics. Assange wrote that illegitimate governance was by definition conspiratorial—the product of functionaries in “collaborative secrecy, working to the detriment of a population.” He argued that, when a regime’s lines of internal communication are disrupted, the information flow among conspirators must dwindle, and that, as the flow approaches zero, the conspiracy dissolves. Leaks were an instrument of information warfare.

These ideas soon evolved into WikiLeaks. In 2006, Assange barricaded himself in a house near the university and began to work. In fits of creativity, he would write out flow diagrams for the system on the walls and doors, so as not to forget them. There was a bed in the kitchen, and he invited backpackers passing through campus to stay with him, in exchange for help building the site. “He wouldn’t sleep at all,” a person who was living in the house told me. “He wouldn’t eat.”

As it now functions, the Web site is primarily hosted on a Swedish Internet service provider called PRQ.se, which was created to withstand both legal pressure and cyber attacks, and which fiercely preserves the anonymity of its clients. Submissions are routed first through PRQ, then to a WikiLeaks server in Belgium, and then on to “another country that has some beneficial laws,” Assange told me, where they are removed at “end-point machines” and stored elsewhere. These machines are maintained by exceptionally secretive engineers, the high priesthood of WikiLeaks. One of them, who would speak only by encrypted chat, told me that Assange and the other public members of WikiLeaks “do not have access to certain parts of the system as a measure to protect them and us.” The entire pipeline, along with the submissions moving through it, is encrypted, and the traffic is kept anonymous by means of a modified version of the Tor network, which sends Internet traffic through “virtual tunnels” that are extremely private. Moreover, at any given time WikiLeaks computers are feeding hundreds of thousands of fake submissions through these tunnels, obscuring the real documents. Assange told me that there are still vulnerabilities, but “this is vastly more secure than any banking network.”

Before launching the site, Assange needed to show potential contributors that it was viable. One of the WikiLeaks activists owned a server that was being used as a node for the Tor network. Millions of secret transmissions passed through it. The activist noticed that hackers from China were using the network to gather foreign governments’ information, and began to record this traffic. Only a small fraction has ever been posted on WikiLeaks, but the initial tranche served as the site’s foundation, and Assange was able to say, “We have received over one million documents from thirteen countries.”

In December, 2006, WikiLeaks posted its first document: a “secret decision,” signed by Sheikh Hassan Dahir Aweys, a Somali rebel leader for the Islamic Courts Union, that had been culled from traffic passing through the Tor network to China. The document called for the execution of government officials by hiring “criminals” as hit men. Assange and the others were uncertain of its authenticity, but they thought that readers, using Wikipedia-like features of the site, would help analyze it. They published the decision with a lengthy commentary, which asked, “Is it a bold manifesto by a flamboyant Islamic militant with links to Bin Laden? Or is it a clever smear by US intelligence, designed to discredit the Union, fracture Somali alliances and manipulate China?”

The document’s authenticity was never determined, and news about WikiLeaks quickly superseded the leak itself. Several weeks later, Assange flew to Kenya for the World Social Forum, an anti-capitalist convention, to make a presentation about the Web site. “He packed in the funniest way I have ever seen,” the person who had been living in the house recalled. “Someone came to pick him up, and he was asked, ‘Where is your luggage?’ And he ran back into the house. He had a sailor’s sack, and he grabbed a whole bunch of stuff and threw it in there, mostly socks.”

Assange ended up staying in Kenya for several months. He would check in with friends by phone and through the Internet from time to time, but was never precise about his movements. One friend told me, “It would always be, ‘Where is Julian?’ It was always difficult to know where he was. It was almost like he was trying to hide.”

It took about an hour on Easter morning to get from the house on Grettisgata Street to Iceland’s international airport, which is situated on a lava field by the sea. Assange, in the terminal, carried a threadbare blue backpack that contained hard drives, phone cards, and multiple cell phones. Gonggrijp had agreed to go to Washington to help with the press conference. He checked in, and the ticketing agent turned to Assange.

“I am sorry,” she said to him. “I cannot find your name.”

“Interesting,” Assange said to Gonggrijp. “Have fun at the press conference.”

“No,” Gonggrijp told the attendant. “We have a booking I.D. number.”

“It’s been confirmed,” Assange insisted.

The attendant looked perplexed. “I know,” she said. “But my booking information has it ‘cancelled.’ ”

The two men exchanged a look: was a government agency tampering with their plans? Assange waited anxiously, but it turned out that he had bought the ticket and neglected to confirm the purchase. He quickly bought another ticket, and the two men flew to New York and then rushed to catch the Acela to Washington. It was nearly two in the morning when they arrived. They got into a taxi, and Assange, who didn’t want to reveal the location of his hotel, told the driver to go to a nearby cross street.

“Here we are in the lion’s den,” Gonggrijp said as the taxi raced down Massachusetts Avenue, passing rows of nondescript office buildings. Assange said, “Not looking too lionish.”

A few hours after sunrise, Assange was standing at a lectern inside the National Press Club, ready to present “Collateral Murder” to the forty or so journalists who had come. He was dressed in a brown blazer, a black shirt, and a red tie. He played the film for the audience, pausing it to discuss various details. After the film ended, he ran footage of the Hellfire attack—a woman in the audience gasped as the first missile hit the building—and read from the e-mail sent by the Icelandic journalists who had gone to Iraq. The leak, he told the reporters, “sends a message that some people within the military don’t like what is going on.”

The video, in both raw and edited forms, was released on the site that WikiLeaks had built for it, and also on YouTube and a number of other Web sites. Within minutes after the press conference, Assange was invited to Al Jazeera’s Washington headquarters, where he spent half the day giving interviews, and that evening MSNBC ran a long segment about the footage. The video was covered in the Times, in multiple stories, and in every other major paper. On YouTube alone, more than seven million viewers have watched “Collateral Murder.”

Defense Secretary Robert Gates was asked about the footage, and said, clearly irritated, “These people can put anything out they want and are never held accountable for it.” The video was like looking at war “through a soda straw,” he said. “There is no before and there is no after.” Army spokespeople insisted that there was no violation of the rules of engagement. At first, the media’s response hewed to Assange’s interpretation, but, in the ensuing days, as more commentators weighed in and the military offered its view, Assange grew frustrated. Much of the coverage focussed not on the Hellfire attack or the van but on the killing of the journalists and on how a soldier might reasonably mistake a camera for an RPG. On Twitter, Assange accused Gates of being “a liar,” and beseeched members of the media to “stop spinning.”

In some respects, Assange appeared to be most annoyed by the journalistic process itself—“a craven sucking up to official sources to imbue the eventual story with some kind of official basis,” as he once put it. WikiLeaks has long maintained a complicated relationship with conventional journalism. When, in 2008, the site was sued after publishing confidential documents from a Swiss bank, the Los Angeles Times, the Associated Press, and ten other news organizations filed amicus briefs in support. (The bank later withdrew its suit.) But, in the Bunker one evening, Gonggrijp told me, “We are not the press.” He considers WikiLeaks an advocacy group for sources; within the framework of the Web site, he said, “the source is no longer dependent on finding a journalist who may or may not do something good with his document.”

Assange, despite his claims to scientific journalism, emphasized to me that his mission is to expose injustice, not to provide an even-handed record of events. In an invitation to potential collaborators in 2006, he wrote, “Our primary targets are those highly oppressive regimes in China, Russia and Central Eurasia, but we also expect to be of assistance to those in the West who wish to reveal illegal or immoral behavior in their own governments and corporations.” He has argued that a “social movement” to expose secrets could “bring down many administrations that rely on concealing reality—including the US administration.”

Assange does not recognize the limits that traditional publishers do. Recently, he posted military documents that included the Social Security numbers of soldiers, and in the Bunker I asked him if WikiLeaks’ mission would have been compromised if he had redacted these small bits. He said that some leaks risked harming innocent people—“collateral damage, if you will”—but that he could not weigh the importance of every detail in every document. Perhaps the Social Security numbers would one day be important to researchers investigating wrongdoing, he said; by releasing the information he would allow judgment to occur in the open.

A year and a half ago, WikiLeaks published the results of an Army test, conducted in 2004, of electromagnetic devices designed to prevent IEDs from being triggered. The document revealed key aspects of how the devices functioned and also showed that they interfered with communication systems used by soldiers—information that an insurgent could exploit. By the time WikiLeaks published the study, the Army had begun to deploy newer technology, but some soldiers were still using the devices. I asked Assange if he would refrain from releasing information that he knew might get someone killed. He said that he had instituted a “harm-minimization policy,” whereby people named in certain documents were contacted before publication, to warn them, but that there were also instances where the members of WikiLeaks might get “blood on our hands.”

One member told me that Assange’s editorial policy initially made her uncomfortable, but that she has come around to his position, because she believes that no one has been unjustly harmed. Of course, such harm is not always easy to measure. When Assange was looking for board members, he contacted Steven Aftergood, who runs an e-mail newsletter for the Federation of American Scientists, and who publishes sensitive documents. Aftergood declined to participate. “When a technical record is both sensitive and remote from a current subject of controversy, my editorial inclination is to err on the side of caution,” he said. “I miss that kind of questioning on their part.”

At the same time, Aftergood told me, the overclassification of information is a problem of increasing scale—one that harms not only citizens, who should be able to have access to government records, but the system of classification itself. When too many secrets are kept, it becomes difficult to know which ones are important. Had the military released the video from the Apache to Reuters under FOIA, it would probably not have become a film titled “Collateral Murder,” and a public-relations nightmare.

Lieutenant Colonel Lee Packnett, the spokesperson for intelligence matters for the Army, was deeply agitated when I called him. “We’re not going to give validity to WikiLeaks,” he said. “You’re not doing anything for the Army by putting us in a conversation about WikiLeaks. You can talk to someone else. It’s not an Army issue.” As he saw it, once “Collateral Murder” had passed through the news cycle, the broader counter-intelligence problem that WikiLeaks poses to the military had disappeared as well. “It went away,” he said.

With the release of “Collateral Murder,” WikiLeaks received more than two hundred thousand dollars in donations, and on April 7th Assange wrote on Twitter, “New funding model for journalism: try doing it for a change.” Just this winter, he had put the site into a state of semi-dormancy because there was not enough money to run it, and because its technical engineering needed adjusting. Assange has far more material than he can process, and he is seeking specialists who can sift through the chaotic WikiLeaks library and assign documents to volunteers for analysis. The donations meant that WikiLeaks would now be able to pay some volunteers, and in late May its full archive went back online. Still, the site remains a project in early development. Assange has been searching for the right way not only to manage it but also to get readers interested in the more arcane material there.

In 2007, he published thousands of pages of secret military information detailing a vast number of Army procurements in Iraq and Afghanistan. He and a volunteer spent weeks building a searchable database, studying the Army’s purchasing codes, and adding up the cost of the procurements—billions of dollars in all. The database catalogued matériel that every unit had ordered: machine guns, Humvees, cash-counting machines, satellite phones. Assange hoped that journalists would pore through it, but barely any did. “I am so angry,” he said. “This was such a fucking fantastic leak: the Army’s force structure of Afghanistan and Iraq, down to the last chair, and nothing.”

WikiLeaks is a finalist for a Knight Foundation grant of more than half a million dollars. The intended project would set up a way for sources to pass documents to newspaper reporters securely; WikiLeaks would serve as a kind of numbered Swiss bank account, where information could be anonymously exchanged. (The system would allow the source to impose a deadline on the reporter, after which the document would automatically appear on WikiLeaks.) Assange has been experimenting with other ideas, too. On the principle that people won’t regard something as valuable unless they pay for it, he has tried selling documents at auction to news organizations; in 2008, he attempted this with seven thousand internal e-mails from the account of a former speechwriter for Hugo Chávez. The auction failed. He is thinking about setting up a subscription service, where high-paying members would have early access to leaks.

But experimenting with the site’s presentation and its technical operations will not answer a deeper question that WikiLeaks must address: What is it about? The Web site’s strengths—its near-total imperviousness to lawsuits and government harassment—make it an instrument for good in societies where the laws are unjust. But, unlike authoritarian regimes, democratic governments hold secrets largely because citizens agree that they should, in order to protect legitimate policy. In liberal societies, the site’s strengths are its weaknesses. Lawsuits, if they are fair, are a form of deterrence against abuse. Soon enough, Assange must confront the paradox of his creation: the thing that he seems to detest most—power without accountability—is encoded in the site’s DNA, and will only become more pronounced as WikiLeaks evolves into a real institution.

After the press conference in Washington, I met Assange in New York, in Bryant Park. He had brought his luggage with him, because he was moving between the apartments of friends of friends. We sat near the fountain, and drank coffee. That week, Assange was scheduled to fly to Berkeley, and then to Italy, but back in Iceland the volcano was erupting again, and his flight to Europe was likely to change. He looked a bit shell-shocked. “It was surprising to me that we were seen as such an impartial arbiter of the truth, which may speak well to what we have done,” he told me. But he also said, “To be completely impartial is to be an idiot. This would mean that we would have to treat the dust in the street the same as the lives of people who have been killed.”

A number of commentators had wondered whether the video’s title was manipulative. “In hindsight, should we have called it ‘Permission to Engage’ rather than ‘Collateral Murder’?” he said. “I’m still not sure.” He was annoyed by Gates’s comment on the film: “He says, ‘There is no before and no after.’ Well, at least there is now a middle, which is a vast improvement.” Then Assange leaned forward and, in a whisper, began to talk about a leak, code-named Project G, that he is developing in another secret location. He promised that it would be news, and I saw in him the same mixture of seriousness and amusement, devilishness and intensity that he had displayed in the Bunker. “If it feels a little bit like we’re amateurs, it is because we are,” he said. “Everyone is an amateur in this business.” And then, his coffee finished, he made his way out of the park and into Times Square, disappearing among the masses of people moving this way and that.

Copyright applies.






wikileaksm.jpg

COMMENTS

show latest comments first   show comment titles only

jump to comment 1 2 3 4 5 6

Pentagon Fears Wikileaks Founder Julian Assange Will Spill Secrets
by Philip Shenon via Kismo - ABC (US) Saturday, Jun 12 2010, 5:36am

Pentagon investigators are trying to determine the whereabouts of the Australian-born founder of the secretive website Wikileaks for fear that he may be about to publish a huge cache of classified State Department cables that, if made public, could do serious damage to national security, government officials tell The Daily Beast.

The officials acknowledge that even if they found the website founder, Julian Assange, it is not clear what they could do to block publication of the cables on Wikileaks, which is nominally based on a server in Sweden and bills itself as a champion of whistleblowers.

American officials said Pentagon investigators are convinced that Assange is in possession of at least some classified State Department cables leaked by a 22-year-old Army intelligence specialist, Bradley Manning of Potomac, Maryland, who is now in custody in Kuwait.

And given the contents of the cables, the feds have good reason to be concerned.

As The Daily Beast reported June 8, Manning, while posted in Iraq, apparently had special access to cables prepared by diplomats and State Department officials throughout the Middle East, regarding the workings of Arab governments and their leaders, according to an American diplomat.

The cables, which date back over several years, went out over interagency computer networks available to the Army and contained information related to American diplomatic and intelligence efforts in the war zones in Afghanistan and Iraq, the diplomat said.

American officials would not discuss the methods being used to find Assange, nor would they say if they had information to suggest where he is now. "We'd like to know where he is; we'd like his cooperation in this," one U.S. official said of Assange.

Assange, who first gained notoriety as a computer hacker, is as secretive as his website and has no permanent home.

Investigators may get their chance Friday night, when Assange is scheduled to appear at an Investigative Reporters and Editors conference in Las Vegas. Whether he will physically appear at the conference is anyone's guess.

Last week, Assange was scheduled to join famed Pentagon Papers leaker Daniel Ellsberg for a talk at New York's Personal Democracy Forum. Assange appeared via Skype from Australia instead, saying lawyers recommended he not return to the United States.

Assange was in the United States as recently as several weeks ago, when he gave press interviews to promote the website's release of an explosive 2007 video of an American helicopter attack in Baghdad that left 12 people dead, including two employees of the news agency Reuters.

Wikileaks has not replied directly to email messages from The Daily Beast.

However, in cryptic messages he sent this week via Twitter, Wikileaks referred to an earlier Daily Beast article on the investigation of Manning and said that it "looks like we're about to be attacked by everything the U.S. has."

In an earlier post, the site said that allegations that "we have been sent 260,000 classified U.S. embassy cables are, as far as we can tell, incorrect."

This morning, a new Wikileaks tweet went out: "Any signs of unacceptable behavior by the Pentagon or its agents towards this press will be viewed dimly."

In one post, the site said that allegations that "we have been sent 260,000 classified U.S. embassy cables are, as far as we can tell, incorrect."

Pentagon investigators say that particular post may have been an effort by Wikileaks to throw them-and news organizations-off the track as the site prepared the library of State Department cables for release, officials said.

"It looks like they're playing some sort of semantic games," one American official said of Wikileaks. "They may not have 260,000 cables, but they've probably got enough cables to make trouble."

In another cryptic Twitter message, the site said that while the State Department might be alarmed about the prospect of the release of classified cables, "we have not been contacted."

American officials were unwilling to say what would happen if Assange is tracked down, although they suggested they would have many more legal options available to them if he were still somewhere in the United States.

Manning has reportedly admitted that he downloaded 260,000 diplomatic cables and provided them to Wikileaks. In Internet chat logs first revealed by Wired magazine, Manning also took credit for leaking the 2007 video to the website.

"Hillary Clinton and several thousand diplomats around the world are going to have a heart attack when they wake up one morning and find an entire repository of classified foreign policy is available," Manning wrote of the diplomatic cables, according to Wired.

Wikileaks has not confirmed that Manning is a source of any information posted on the site. "We do not know if Mr. Manning is our source, but the U.S. military is claiming he is, so we will defend him," Wikileaks said in another Twitter message.

Manning was turned in to the Pentagon by a former computer hacker based in California, Adrian Lamo, after Manning approached Lamo for counsel. Manning is believed to have contacted Lamo after reading a recent profile of him in Wired.

In the chat log revealed by Wired, Manning bragged to Lamo about having downloaded a huge library of State Department cables, as well as the 2007 video of the helicopter attack, and having provided the material to Wikileaks.

Manning took credit for having leaked a classified diplomatic cable that has already appeared on the site-a memo prepared by the United States embassy in Reykjavik, Iceland, that described a meeting there between American and Icelandic officials over that country's banking meltdown.

The January 2010 memo may have been of special interest to Wikileaks given the site's close ties to Iceland, where Assange has based himself at times and where he worked with local lawmakers to draft free-speech laws that give broad freedom to journalists to protect their sources.

A profile this week in The New Yorker magazine depicted Assange feverishly at work with Icelandic colleagues in Reykjavik in March as he organized the release of the 2007 video of the helicopter attack. The edited video was given the title Collateral Murder, and its release infuriated officials at the Defense Department.

With its network of whistleblowers, Wikileaks has published documents and videos on its site that have outraged other foreign governments. To protect the site from attack by intelligence agencies, Assange has placed Wikileaks on several Internet servers, making it all but impossible for any government to shut down the site entirely.

© 2010 The Daily Beast

Wikileaks Commissions Lawyers to Defend Alleged Army Source
by Kevin Poulsen and Kim Zetter via stan - Wired.com Saturday, Jun 12 2010, 6:17am

Wikileaks founder Julian Assange wants a copy of the chat logs in which a U.S. intelligence analyst discussed providing classified materials to the whistle-blower site, according to an e-mail shown to Wired.com by the ex-hacker who turned the analyst in.

Assange says he’s arranging the legal defense for 22-year-old Bradley Manning, now in his third week in military custody.

In the Friday e-mail to Adrian Lamo, Assange (or someone convincingly posing as him) claims he wants to forward the logs to attorneys he says he’s hired to represent Manning, though the e-mail doesn’t explain why the unnamed lawyers aren’t approaching Lamo directly.

The e-mail also contains talking points Assange would like to see Lamo adopt in describing Manning, and in explaining his decision to report the suspected leaker to law enforcement.

Subject: Manning’s defence; logs; strategy
Date: Fri, 11 Jun 2010 11:20:40 +0100 (BST)
From: Julian Assange
To: adrian@adrian.org
CC: Julian Assange.

Manning’s defence team, which I have commisioned, urgently requires all emails and chat logs you alleged to have come from Mr. Manning. Please send them to me, if necessary through our online submission system. They will be used strictly for Mr. Manning’s defence, but must be complete.

In addition, it would be helpful if you described Mr. Manning, as a “whistleblower”, who had already lost his access over an unrelated issue, held no data, and was of no meaningful threat to anyone. In particular Mr. Manning was not an “alleged spy”, and it is wrong for you to describe him as such, or to suggest that there were no other approaches to resolving the situation.

It would also be helpful to all concerned if you stopped trying to justify your behavior by whipping up sentiment against Mr. Manning in other ways. Your most effective personal strategy is to say you were scared due to your previous experiences, unthoughtful due to recent drug problems, and made a decision which you now bitterly regret and would under no circumstances repeat. Going around like a poor man’s Tsutomu, constantly drawing attention to yourself through the destruction of a young romantic outlaw figure, will leave you permanently reviled by history–and me.

JA

Wired.com could not confirm that Manning has accepted Assange’s offer of legal assistance. A phone call to his aunt, who has been in contact with Manning following his arrest, was not returned Friday. Assange did not immediately respond to inquiries from Wired.com.

Lamo says he hasn’t attempted to whip up sentiment against Manning, and that he doesn’t intend to comply with Assange’s request.

“No, I’m not going to give the logs to someone who suggests that I might have been drug-addled when I decided to turn in a spy,” says Lamo, who takes prescription medication for depression and Asperger’s Disorder. “Private Manning’s attorney can get them by discovery like everyone else.”

In his chats with Lamo, copies of which were provided to Wired.com by the ex-hacker, Manning described a crisis of conscience that led him to leak a headline-making video of a deadly 2007 U.S. helicopter air strike in Baghdad that claimed the lives of several innocent civilians. He also boasted of leaking a separate video showing the notorious 2009 Garani air strike in Afghanistan that Wikileaks has previously acknowledged is in its possession; a classified Army document evaluating Wikileaks as a security threat, which the site posted in March; a detailed Army chronology of events in the Iraq war; and a cache of 260,000 classified U.S. diplomatic cables.

Wikileaks has neither confirmed nor denied that Manning leaked information to the site, but on Sunday it tweeted that “Allegations in Wired that we have been sent 260,000 classified US embassy cables are, as far as we can tell, incorrect.”

Manning told Lamo that he expected the cables to be released in a “searchable format” to the public. The prospect of the cable leak appears to be of particular concern to the United States. One or more of Manning’s hard drives were flown to Washington on Thursday, according to the Associated Press, and State Department diplomatic security agents are examining them for evidence of the allegedly downloaded cables. The Daily Beast reported that the Pentagon is attempting to locate Assange before he publishes the cables, though it’s not clear what defense officials plan to do if they find him.

Responding to the report, Wikileaks tweeted Friday, “Any signs of unacceptable behavior by the Pentagon or its agents towards this press will be viewed dimly.”

Assange was previously scheduled to speak at 4:30 p.m. Pacific time Friday at the Investigative Reporters and Editors conference in Las Vegas. On Friday, Wikileaks tweeted that Assange still plans on participating on the panel, but IRE told the Daily Beast that Assange actually canceled several days ago.

Last week, Assange was scheduled to appear beside Pentagon Papers leaker Daniel Ellsberg, but he wound up participating from Australia over Skype instead.

© 2010 Condé Nast Digital - Wired.com

"Hit" on Assange
by vets Saturday, Jun 12 2010, 8:09pm

hit us and we'll hit you -- simple enough!

you are not able to contend with what's on your plate now -- do you really wish to open a domestic front that would accelerate the inevitable, that is, your hanging by the neck until dead, after due legal process by the RESTORED people's courts, you criminal bastards!

not a hair on his head!

Captain.

Outreach: Amnesty International
by chela Monday, Jun 14 2010, 11:01pm

Please pass this information on thanks chela always in peace.

Mike Gogulski on June 14th, 2010
Just sent to Amnesty International via their main website:

Dear Amnesty,

I’m trying to organize a campaign (via www.bradleymanning.org) to support (and hopefully free) Bradley Manning, the US Army intelligence specialist now imprisoned in Kuwait for leaking the “Collateral Murder” video and other material.

If you are organizing a campaign of any sort around this issue, I would like to coordinate with you. If not, I would request that if you issue any release regarding the subject of Manning’s captivity that you include a link to the website.

Peace,
Mike Gogulski
Bratislava, Slovakia

Targeting Whistleblowers
by Stephen Lendman via gan - ICH Tuesday, Jun 15 2010, 8:08am

On April 16, journalist John Cole  wrote:

The message is clear – you torture people and then destroy the evidence, and you get off without so much as a sternly worded letter. If you are a whistle blower outlining criminal behavior by the government, you get prosecuted.

In fact, it’s worse. Under Bush, torture was official policy. It remains so under Obama who absolved CIA torturers, despite unequivocal evidence of their guilt. But leaking it risks criminal prosecution for revealing state secrets and endangering national security.

On June 7, New York Times writer, Elisabeth Bumiller, headlined, “Army Leak Suspect Is Turned In, by Ex-Hacker,” explaining that US Army intelligence analyst Specialist, Bradley Manning, told Adrian Lamo that he leaked the following materials to WikiLeaks:

– “260,000 classified United States diplomatic cables and video of a (US) airstrike in Afghanistan that killed 97 civilians last year,” and

– an “explosive (39 minute) video of an American helicopter attack in Baghdad that left 12 people dead, including two employees of the Reuters news agency.” Manning called it “collateral murder,” a crime he felt obliged to expose.

Lamo told the military, saying “I outed Brad Manning as an alleged leaker out of duty. I would never (and have never) outed an Ordinary Decent Criminal. There’s a difference.” He didn’t explain or how any criminal can be decent.

On June 7, the military command in Iraq arrested Manning, saying in Pentagon boilerplate:

“The Department of Defense takes the management of classified information very seriously because it affects our national security, the lives of our soldiers, and our operations abroad.”

So far, Manning is uncharged and is being held in Kuwait pending further action.

On June 6 in wired.com, Kevin Poulsen and Kim Zetter broke the story in their article headlined, “US Intelligence Analyst Arrested in WikiLeaks Video Probe,” explaining:

The Army’s Criminal Investigation Division arrested Manning after Lamo outed him. The State Department said it wasn’t aware of the arrest. The FBI had no comment, then later the Defense Department confirmed his arrest for allegedly leaking classified information. According to army spokesman, Gary Tallman:

If you have a security clearance and wittingly or unwittingly provide classified information to anyone who doesn’t have security clearance or a need to know, you have violated security regulations and potentially the law.

Manning said:

Everywhere there’s a US post, there’s a diplomatic scandal that will be revealed. It’s open diplomacy. World-wide anarchy in CSV format. It’s Climategate with a global scope, and breathtaking depth. It’s beautiful and horrifying. (The documents describe) almost criminal political back dealings. (They belong) in the public domain, and not on some server stored in a dark corner in Washington, DC. (Our government is involved in) incredible things, awful things.

He exposed cold-blooded murder of innocent civilians and reporters, the perpetrators laughing on video like it was a game – the public unaware that Pentagon rules-of-engagement (ROEs) target Iraqi and Afghan civilians as well as alleged combatants.

On June 11, New York Times writer, Scott Shane, headlined, “Obama Takes a Hard Line Against Leaks to Press,” saying:

In 17 months in office, President Obama has already outdone every previous president in pursuing leak prosecutions,” citing actions against Thomas A. Drake (discussed below), and Times columnist James Risen, subpoenaed (by Bush and Obama) to disclose his sources for his book, “State of War: The Secret History of the CIA and the Bush Administration.

Lucy Dalglish, executive director for Reporters Committee for Freedom, explained: The message they are sending to everyone is ‘You leak to the media, we will get you.’ As far as I can tell there is absolutely no difference (between Bush and Obama), and (he) seems to be paying more attention to it. This is going to get nasty.

Attorney General Eric Holder approved the subpoena, his Justice Department spokesman, Matthew Miller, saying: “As a general matter, we have consistently said that leaks of classified information are something we take extremely seriously.”

Risen’s lawyer, Joel Kurtzberg, explained that the subpoena relates to his report about covert CIA measures to subvert Iran’s alleged nuclear weapons program. “We will be fighting to quash” it, he said. “Jim is the highest calibre of reporter and adhered to the highest standards of his profession. And he intends to honor the promise of confidentiality he made to (his) source or sources.”

Risen’s publisher, Simon and Schuster, is handling the matter, but a Times statement said:

Our view, however, is that confidential sources are vital in getting information to the public, and a subpoena issued more than four years after the book was published hardly seems to be important enough to outweigh the protection an author needs to have.

First brought in 2006 by Bush Attorney General Michael Mukasey, the grand jury session expired without resolution. Holder will impanel a new one. Risen faces possible prosecution and jail time for honoring his confidentiality commitment, what no reporter should ever violate. 

WikiLeaks: What It Is, How It Operates

Calling itself “the intelligence agency of the people,” WikiLeaks says it’s “a multi-jurisdictional public service designed to protect whistleblower, journalist and activists who have sensitive materials to communicate to the public” that has a right to know.

Only when they’re told “the true plans and behavior of their governments” can they decide whether or not they deserve support, or as Jack Kennedy said on April 27, 1961:

The very word secrecy is repugnant in a free and open society; and we are as a people inherently and historically opposed to secret societies, to secret oaths and to secret proceedings. We decided long ago that the dangers of excessive and unwarranted concealment of pertinent facts far outweighed the dangers, which are cited to justify it.

WikiLeaks believes that “Principled leaking has changed the course of history for the better; it can alter the course of history in the present; it can lead us to a better future.” It can expose abuses of power by “rel(ying) upon the power of overt fact to enable and empower citizens to bring feared and corrupt governments and corporations to justice,” and help make nominal democracies real ones. 

Secrecy and Targeting Whistleblowers and Journalists Under Obama

More than ever under Obama, we live in a secret society, in which whistleblowers and journalists are targeted for doing their job — why Helen Thomas, unfairly pilloried by the pro-Israeli chorus, last July said his administration was “controlling the press,” during a White House Robert Gibbs briefing, then afterwards added: “It’s shocking. It’s really shocking….What the hell do they think we are, puppets? They’re supposed to stay out of our business. They are our public servants. We pay them.”

In a July 1, 2009 interview with CNSNews.com, she said even Nixon didn’t exert press control like Obama, saying:

Nixon didn’t try to do that. They couldn’t control (the media). They didn’t try…. I’m not saying there has never been managed news before, but this is carried to (a) fare-thee-well for town halls, the press conferences. It’s blatant. They don’t give a damn if you know it or not. They ought to be hanging their heads in shame.

In February 2009, the Free Flow of Information Act was introduced in the House and Senate. In March, the lower body passed it overwhelmingly, after which it stalled in Senate Committee.

At the time, the Obama administration weakened it in opposition to strong congressional support — on the pretext of national security considerations over the public’s right to know, to let prosecutors judicially force reporters and whistleblowers to reveal their sources. Though the bill never passed, the administration uses it to prevent exposure of information it wants suppressed, more aggressively than any of his predecessors, another measure of a man promising change.

Thomas Drake was an Obama administration target, a former National Security Agency (NSA) “senior executive,” indicted on April 15, 2010, on multiple charges of “willful retention of classified information, obstruction of justice and making false statements,” according to Assistant Attorney General, Lanny A. Breuer, of the Criminal Division.

The 10-count indictment alleges he gave Baltimore Sun reporter, Sibohan Gorman, classified NSA documents about the agency. In fact, she wrote about waste and mismanagement in its “Trailblazer” project (a program analyzing data on computer networks), and illegal spying activities, saying on May 18, 2006 in her article headlined, “NSA Killed System That Sifted Phone Data Legally” that:

Once President Bush gave the go-ahead for the NSA to secretly gather and analyze domestic phone records – an authorization that carried no stipulations about identity protection — agency officials regarded the encryption as an unnecessary step and rejected it.

Her stories, however, focused mainly on the Trailblazer $1.2 billion initiative that one insider called “the biggest boondoggle going on now in the intelligence community,” what the public had every right to know.

Drake’s leaks exposed illegal NSA spying, its enormous amount of waste and fraud, and the formation of a public/private national security/surveillance state, incentivizing profiteers to hype fear for their own bottom-line self-interest.

As a candidate, Obama promised transparency, accountability, and reform of extremist Bush policies. As president, he usurped unchecked surveillance powers, including warrantless wiretapping, accessing personal records, monitoring financial transactions, and tracking e-mails, Internet and cell phone use to gather secret evidence for prosecutions. He also claims Justice Department immunity from illegal spying suits, an interpretation no member of Congress or administration ever made, not even Bush or his Republican allies.

As a result, his national security state targets activists, political dissidents, anti-war protestors, Muslims, Latino immigrants, lawyers who defend them, whistleblowers, journalists who expose federal crimes, corruption, and excesses who won’t disclose their sources, and WikiLeaks, cited in a 2008 Pentagon report as a major US security threat, important to shut down by deterring, discouraging or prosecuting its sources. More on that below.

At a time of extreme government secrecy, lawlessness, and betrayal of the public trust, exposes and public debate more than ever are vital — whistleblowers, WikiLeaks, and courageous reporters essential to an open society, one endangered without them. 

WikiLeaks March 15, 2010 Release: “US Intelligence planned to destroy WikiLeaks”

The group’s founder, Julian Assange, described a 32-page February 2008 counterintelligence investigation “to fatally marginalize the organization.” However, after two years, without success, at least so far.

It called WikiLeaks “a potential force protection, counterintelligence, operational security (OPSEC), and information security (INFOSEC) threat to the US Army, (jeopardizing) DoD personnel, equipment, facilities, or installations. Such information (could help) foreign intelligence and security services (FISS), foreign military forces, foreign insurgents, and foreign terrorist groups (by providing them) information (they could use to attack) US force(s), both within the United States and abroad” — typical Pentagon boilerplate to hype threats and deter whistleblowers from exposing government crimes and excesses, what the public has every right to know.

In response, WikiLeaks said protecting the identity of leakers takes high priority. It operates “to expose unethical practices, illegal behavior, and wrongdoing within corrupt (government agencies and) corporations (as well as) oppressive regimes” abroad, some in collusion with Washington.

The goal — expose wrongdoing, demand accountability, and support democratic principles in a free and open society — what governments are supposed to do, but when they don’t, organizations like WikiLeaks exhibit the highest form of patriotism, to be lauded, not spied on, pilloried, or destroyed.

Among its many accusations, DOD claimed WikiLeaks:

  • has possible DOD moles giving it sensitive or classified information;
  • uses its site to post fabricated and manipulated information;
  • has 2,000 pages of leaked army documents with information about US and coalition forces in Iraq and Afghanistan,
  • including on the kinds and numbers of equipment assigned to US Central Command;
  • Julian Assange wrote and co-authored articles, based on leaked information, “to facilitate action by the US Congress to force the withdrawal of US troops by cutting off funding for the war(s);”
  • leaked information “could aid enemy forces in planning terrorist attacks, (choose) the most effective type and emplacement of improvised explosive devices (IEDs)” and use other ways to target US military units, convoys, and bases;
  • data published is misinterpreted, manipulated misinformation, disinformation, and propaganda;
  • a November 9, 2007 report said US forces “had almost certainly violated the Chemical Weapons Convention (CWC),” and has 2,386 low grade chemical weapons in Iraq and Afghanistan;
  • the same report charged DOD with illegal white phosphorous use in the 2004 Fallujah attack;
  • the Bush administration was accused of torture and denying ICRC representatives access to Guantanamo detainees;
  • details were provided on DOD’s use of asymmetric tactics, techniques, and procedures in the April 2004 Fallujah assault; and
  • many other accusations and concerns were listed, including whether “foreign organizations… foreign military services, foreign insurgents, or terrorist groups provide funding or material support to Wikileaks.org.”

DOD concluded that successfully identifying, prosecuting, and terminating the employment of leakers “would damage and potentially destroy” WikiLeaks’ operation and deter others from supplying information. It also stressed “the need for strong counterintelligence, antiterrorism, force protection, information assurance, INFOSEC, and OPSEC programs to train Army personnel” on ways to prevent leaks and report “suspicious activities.”

Julian Assange is a man with a mission — total transparency. WikiLeaks is a vital resource by providing key information on how governments and corporations betray the public interest. Given America’s tradition of war crimes, corruption and other abuses of power, no wonder DOD is concerned, thankfully so far without success, or according to WikiLeaks:

Its activities are “the strongest way we have of generating the true democracy and good governance on which all mankind’s dreams depend,” and may have a chance to achieve from their work and others like them — grassroots activism, power and determination, the only way change ever comes, never from the top down, a lesson to internalize, remember, and act on. 

A Final Note

On June 10, Daily Beast writer, Philip Shenon, headlined, “Pentagon Manhunt,” saying:

“Anxious that WikiLeaks may be on the verge of publishing a batch of secret State Department cables, investigators are desperately searching for founder, Julian Assange.”

In early June, he was scheduled to speak at New York’s Personal Democracy Forum, but was advised against it for his safety. Instead, he appeared via Skype from Australia.

Interviewed about Assange, famed whistleblower Daniel, Ellsberg, believes he could be in danger, saying:  “I happen to have been the target of a White House hit squad myself. On May 3, 1972, a dozen CIA assets from the Bay of Pigs, Cuban emigres, were brought up from Miami with orders to ‘incapacitate me totally.’ ” Ellsberg asked if that meant to kill him, and was told “It means to incapacitate you totally. But you have to understand these guys never use the word ‘kill.’ ”

Is Assange now in danger?

Absolutely. On the same basis, I was…. Obama is now proclaiming rights of life and death, being judge, jury, and executioner of Americans without due process” at home or abroad, besides non-citizens anywhere as well, the rule of law be damned. “No president has ever claimed that and possibly no one since John the First.”

Ellsberg’s advice to Assange:

“Stay out of the US. Otherwise, keep doing what he is doing. It’s pretty valuable…. He is serving our democracy and serving our rule of law precisely by challenging the secrecy regulations, which are not laws in most cases, in this country. He is doing very good work for our democracy,” something Obama, like his predecessors, works daily to subvert.

Author retains copyright.

A Time of Deceit
by Chela Thursday, Jun 17 2010, 7:02am

A different war!

We have been waiting for someone
to expose injustice;
be sure, truth seekers will stand with you
to fight with new weapons of war.

we live a world gone mad; deceit rules
corporate money corrupts everything
and dictates the way we live.

we fight the good humanitarian cause
with the sword of truth, creativity, love and compassion.

he stands tall and humble before the world
speaking quietly and gracefully
(even though his jokes fall flat -- sorry J)
his words ring tomes of honest logic

displaying creativity and a determination to explore
the avenues available in cyberspace he hinders
the process of hate, mass murder and repression;
not formally educated but spiritual and wise.

the crewz and groups behind this man work ceaselessly
and selflessly , volunteers each one

opposing criminal elites, hackers alter set courses
and poison destructive patterns
uncovering the lies and deceit
of the mass media;

expanding networks constantly
soon they will be able
to wrest control from the criminals
and return power to the people

the corporate machine dead
i am inspired in my elder years
there is a different way

we hope the x and y's can take up the challenge
and regain their sovereignty in truth and love
with keyboards they fight, attack and seize control
to allow us to live in hope, peace and love.

"We are One"

ok please forgive some plagiarising of Julian's words.
I am proud of you anon guys you have my universal/spiritual energy.
I wish I could speak your language but you get what I mean.


 
<< back to stories
 

© 2005-2024 Cleaves Alternative News.
Unless otherwise stated by the author, all content is free for non-commercial re-use, reprint, and rebroadcast, on the net and elsewhere.
Opinions are those of the contributors and are not necessarily endorsed by Cleaves Alternative News.
Disclaimer | Privacy [ text size normal | << | >> ]