h1

Justice Charges ex-NSA Official with Leaking to Intelligence Reporter Siobhan Gorman

April 18, 2010

Michael Isikoff

The Justice Department often launches investigations to ferret out government leakers, most of which end up going nowhere.

But today, in a move that is likely to alarm journalists and whistleblowers alike, Attorney General Eric Holder’s prosecutors announced they had at long last found an alleged culprit: they charged a former National Security Agency official with disclosing classified information to a newspaper reporter about multibillion-dollar agency computer programs that were fraught with problems.

In a 10-count indictment, former NSA senior executive Thomas A. Drake was charged with exchanging “hundreds” of e-mails with the reporter and helping her research her stories about the agency between February 2006 and November 2007.

The indictment doesn’t identify the journalist, but a senior law-enforcement official confirmed to Declassified that it is Siobhan Gorman, who at the time of the alleged infractions covered intelligence issues for The Baltimore Sun; she now works the same beat at The Wall Street Journal.

Gorman’s stories exposing the NSA’s computer problems—including those in its multibillion-dollar Trailblazer program aimed at identifying electronic data crucial to the nation’s safety—won her a prestigious Sigma Delta Chi award from the Society of Professional Journalists in 2007. (Gorman did not respond to e-mail and phone requests to discuss the case, and a Wall Street Journal spokeswoman declined to comment.)

Among the accusations in the indictment: that between November 2005 and February 2006, Drake set up a special Hushmail e-mail account and (at the request of an unidentified congressional staffer) reached out to Gorman, passing along “classified and unclassified” information from NSA documents. Sometimes, Drake allegedly copied and pasted, or scanned and e-mailed the documents with their classification markings removed.

“As alleged, this defendant used a secret, non-government e-mail account to transmit classified and unclassified information that he was not authorized to possess or disclose,” said Assistant Attorney General Lanny A. Breuer in a press release announcing the charges. “As if those allegations are not serious enough, he also later allegedly shredded documents and lied about his conduct to federal agents in order to obstruct their investigation.”

Drake’s lawyer, James Wyda, a public defender in Baltimore, did not respond to a telephone request seeking comment.

Drake, according to the indictment, served in a number of NSA positions starting in August 2001, when he was hired as the chief of the Change Leadership and Communications Office in the Signals Intelligence Directorate. He later became a Technical Leader in the Directorate of Engineering, where he was responsible for improving efficiency within the agency. In September, 2006, he began teaching at the National Defense University, but he remained a NSA employee until his security clearance was suspended in November 2007.

Although the indictment charges that Drake served as a source for “many” of Gorman’s stories—some of which contained supersensitive signals intelligence or SIGINT information—prosecutors didn’t charge him with violating the Espionage Act, the most serious crime they could have leveled. Instead, they indicted him with willfully retaining classified information that he was not authorized to have, obstruction of justice, and lying to FBI agents about his alleged role as a leaker.

The case against Drake is not without irony: while the Justice Department during the Bush administration frequently decried leaks and announced its determination to find them, it actually brought no cases against government officials for allegedly disclosing classified information to journalists. It did charge two lobbyists for the American Israel Public Affairs Committee with passing to journalists classified information they had allegedly gleaned from senior government officials. But those charges were later dismissed by a federal judge. In the highest-profile leak probe in years, prosecutors indicted and convicted vice president Dick Cheney’s former chief of staff, I. Scooter Libby, for lying about what he knew about the leak of CIA operative Valerie Plame’s identity. But Libby was not charged with the actual leak of information to a journalist.

But now the presumably more press-friendly Justice Department of President Obama (which has publicly, if reluctantly, supported a proposed “shield” law to protect reporters’ confidential sources) has brought what amounts to the first major leak case in years.

“What’s frightening about this is that you can make a case that this guy was doing the public a service, letting them know their tax dollars were being wasted on a program that doesn’t work,” said Lucy Daglish, executive director of the Reporters Committee for Freedom of the Press. “That’s pretty classic public interest reporting.”

But after reading the indictment laying out Drake’s e-mail trail, Daglish said “it sounds like [the leak] wasn’t executed very well. I always tell people, the next time you want to leak, meet on a park bench at the Lincoln Memorial, for God’s sake, and turn over an envelope.”

The indictment states that the first story for which Drake allegedly provided information was on Feb. 27, 2006. This appears actually to have been a Feb. 26, 2006 front-page story by Gorman in The Baltimore Sun reporting that two technology programs at the heart of the NSA’s drive to combat 21st-century threats were “stumbling badly” and hampering the agency’s ability to fight terrorism. One of the programs, the story reported, was Cryptologic Mission Management, a $300 milllion computer-software program. Another was code-named Groundbreaker, a multibillion-dollar computer-systems upgrade that frequently got its wires crossed.

As a result of management and technical problems, Gorman wrote, “agency computers have trouble talking to each other and frequently crash, key bits of data are sometimes lost and vital intelligence can be overlooked.” In the same story, Gorman quoted a former NSA employee, who she said was “speaking to a reporter for the first time” under the condition of anonymity. “What I am fearful of is: because of all this, we will have a 9/11 Part II,” the source was quoted as saying.

A senior Justice Department official rejected the idea that prosecutors were improperly targeting a whistle-blower, who had only the public interest in mind, by bringing a criminal case against Drake. There was, the official said, no indication that the defendant ever first tried to report his concerns to the Justice Department or the NSA’s inspector general before leaking classified information to a journalist. There was no internal debate about whether to bring the case, the official said, nor did the department have to take the sometimes controversial step of subpoenaing Gorman to identify her source.

“This was a straight one,” the official said. “This case would have been brought under any administration.”

http://blog.newsweek.com/blogs/declassified/archive/2010/04/15/justice-charges-ex-nsa-official-with-leaking-to-intelligence-reporter-siobhan-gorman.aspx

Advertisements
h1

Criticism over Wikileaks II

April 18, 2010

A3 writes [ on Cryptome] of the Wikileaks gunship video:
Having looked at all the evidence I can find on this incident it seems clear that the men killed in the video were armed insurgents with the Mahdi Army and that the photographers were embedded with them. The subsequent firing on the van is questionable. However, that one can identify an RPG in the video indicates that Wikileaks misrepresented the video or missed the obvious. Both scenarios are worrying and make this “leak” look like a charity drive for a website who’s operating budget seems incredibly high for what they deliver.

So, my question to you is this. Should Wikileaks simply publish or should they publish and editorialize? I fear they do themselves no favors through misrepresentation or omission, I believe their purpose is best served by presenting material with no additional commentary. I also fear that entering into the political fray will discredit them as an organization eventually and undermine their purpose. One of the best things about cryptome is that items are generally posted with commentary that doesn’t exceed the title of the link. I’ve never seen you post a document with a preface you added, your warnings to not trust you are refreshing.

Anyways, keep keeping on, “loony John Young, of Cryptome.org.”
Cryptome: Wikileaks should continue to do what it believes best, as should others, ignore critics who envy its ingenuity and fear its reverse criticism of lazy-minded, spoiled critics — and comics. There is no single best means to gather and distribute information to the public — nor to tell the truth about it. Variation and diversity and multiplicity is essential to avoid the deadly chokehold of dominant authorities, their complicit

authoritatives and the grammar, rhetoric, graphics and technology they use for heirarchical control. To mimic the information strangulation of dominaters is to lie, deceive, misrepresent, bloviate, exaggerate, op- and pop-advert-editorialize, to manage the flow of information for a particular agenda always wedded to a grab for and protection of greater power and the lucrative revenue and fancy accoutrements it provides.
There is a plaque in the rotunda of a courthouse at 60 Center Street, New York City, which commemorates the 300th anniversary of the trial of John Peter Zenger for seditious libel. He won the trial and laid the foundation for freedom of the press in the US Constitution. There is always a first of a venerable tradition taken for granted. Wikileaks may not be the first but it is certainly a standard bearer for those less known who are challenging conventional wisdom of freedom of the press, now grown into self-satisfied authoritativeness and embedded with authorities. The press (forget the trivializing, gossipy “media”) must be goaded into overcoming its fear of being seditiously libelous, of “going too far.”

Thanks to Wikileaks for demonstrating that the information royalty is cravenly bare-assed, terrified of losing protection against the treaty-mongering avaricious FINCEN (forget trivializing, gossipy toothless NSA, ignore nuclear security theater).
Excuse the bowel moving. Another lying sack of shit (LSOS).

h1

Criticism over Wikileaks I

April 18, 2010

[ Wiki leaks on Twitter : Do we laugh or cry? ex-NSA Wayne Madsen on WikiLeaks ] updated april 1 2010 from Wayne Madsen Report

CIA, Mossad and Soros behind Wikileaks

Suspicions abound that Wikileaks is part of U.S. cyber-warfare operations

WMR has learned from Asian intelligence sources that there is a strong belief in some Asian countries, particularly China and Thailand, that the website Wikileaks, which purports to publish classified and sensitive documents while guaranteeing anonymity to the providers, is linked to U.S. cyber-warfare and computer espionage operations, as well as to Mossad’s own cyber-warfare activities.

Wikileaks claims to have decrypted video footage of a U.S. Predator air strike on civilians in Afghanistan and that covert U.S. State Department agents followed Wikileaks’s editor from Iceland to Norway in a surveillance operation conducted jointly by the United States and Iceland. Iceland’s financially-strapped government recently announced a policy of becoming a haven for websites that fear political oppression and censorship in their home countries.

However, in the case of Wikileaks, countries like China and Thailand are suspicious of the websites’ actual “ownership.”

Wikileaks says it intends to show its video at an April 5 press conference at the National Press Club in Washington, DC but that its presenters may be detained or arrested before that time. WMR’s sources believe the Wikileaks “militancy” in the face of supposed surveillance appears fake.

Our Asian intelligence sources report the following: “Wikileaks is running a disinformation campaign, crying persecution by U.S. intelligence- when it is U.S. intelligence itself. Its [Wikileaks’] activities in Iceland are totally suspect.” Wikileaks claims it is the victim of a new COINTELPRO [Counter Intelligence Program] operation directed by the Pentagon and various U.S. intelligence agencies. WMR’s sources believe that it is Wikileaks that is part and parcel of a cyber-COINTELPRO campaign, such as that proposed by President Obama’s “information czar,” Dr. Cass Sunstein.

In January 2007, John Young, who runs cryptome.org, a site that publishes a wealth of sensitive and classified information, left Wikileaks, claiming the operation was a CIA front. Young also published some 150 email messages sent by Wikileaks activists on cryptome. They include a disparaging comment about this editor by Wikileaks co-founder Dr. Julian Assange of Australia. Assange lists as one of his professions “hacker.” His German co-founder of Wikileaks uses a pseudonym, “Daniel Schmitt.”

Wikileaks claims it is “a multi-jurisdictional organization to protect internal dissidents, whistleblowers, journalists and bloggers who face legal or other threats related to publishing” [whose] primary interest is in exposing oppressive regimes in Asia, the former Soviet bloc, Sub-Saharan Africa and the Middle East, but we are of assistance to people of all nations who wish to reveal unethical behavior in their governments and corporations. We aim for maximum political impact. We have received over 1.2 million documents so far from dissident communities and anonymous sources.”

In China, Wikileaks is suspected of having Mossad connections. It is pointed out that its first “leak” was from an Al Shabbab “insider” in Somalia. Al Shabbab is the Muslim insurgent group that the neocons have linked to “Al Qaeda.”

Asian intelligence sources also point out that Assange’s “PhD” is from Moffett University, an on-line diploma mill and that while he is said to hail from Nairobi, Kenya, he actually in from Australia where his exploits have included computer hacking and software piracy.

WMR has confirmed Young’s contention that Wikileaks is a CIA front operation. Wikileaks is intimately involved in a $20 million CIA operation that U.S.-based Chinese dissidents that hack into computers in China. Some of the Chinese hackers route special hacking program through Chinese computers that then target U.S. government and military computer systems. After this hacking is accomplished, the U.S. government announces through friendly media outlets that U.S. computers have been subjected to a Chinese cyber-attack. The “threat” increases an already-bloated cyber-defense and offense budget and plays into the fears of the American public and businesses that heavily rely on information technology.

It is also pointed out that on Wikileaks advisory board is Ben Laurie, a one-time programmer and Internet security expert for Google, which recently signed a cooperative agreement with the U.S. National Security Agency (NSA) and has been charged by China with being part of a U.S. cyber-espionage campaign against China. Other Wikileaks advisory members are leading Chinese dissidents, including Wan Dan, who won the 1998 National Endowment for Democracy (NED) Democracy Award; Wang Youcai, founder of the Chinese Democracy Party; Xiao Qiang, the director of the China Internet Project at the University of California at Berkeley, member of the advisory board of the International Campaign for Tibet, and commentator on the George Soros-affiliated Radio Free Asia; and Tibetan exile and activist Tashi Namgyal Khamsitsang.

Our sources in Asia believe that Wikileaks ran afoul of their CIA paymasters after it was discovered that some of Wikileaks’s “take” was being diverted to Mossad instead of to their benefactors at Langley. After a CIA cur-off in funding, “Daniel Schmitt” took over and moved the Wikileaks operation to Belgium and Sweden with hopes of making a more secure base in Iceland.

There are strong suspicions that Wikileaks is yet another Soros-funded “false flag” operation on the left side of the political spectrum. WMR has learned that after former Senator Norm Coleman (R-MN) decided to oppose Soros’s choice of UN Secretary General Kofi Annan’s deputy Mark Malloch Brown as President of the World Bank, succedding the disgraced Paul Wolfowitz, Soros put the Wikileaks operation into high gear. “Daniel Schmitt” hacked into Coleman’s supporters list, stealing credit card info, addresses, and publishing the “take” on Wikileaks. Democrat Al Franken, who was strongly backed by Soros, defeated Coleman in a legally-contested and very close election.

It is also believed by informed sources that Soros is behind the operation to move Wikileaks to Iceland. By becoming a power in Iceland, Soros can prevent Icelanders from paying back the British and Dutch investors in Icelandic online Ponzi scheme banking and continue his all-out war against British Prime Minister Gordon Brown, who has, in turn, targeted Soros for betting against pound sterling.

Iceland is classic prey for Soros. The Icelandic krona has been decimated as a currency and has no where to go but up in value, especially if the British pound and the euro depreciate. Soros is currently talking down the euro, planning its fall and shorting it, just like he did versus the pound in London in the 1980s. After the UK’s and Europe’s currencies are devalued, Soros will buy every euro note in sight, thus making trillions.
Soros and his Wikileaks friends have in Iceland a practically unregulated banking system desperate for an influx of capital — money that will come from the exiled Russian tycoons in Israel, London and the United States. Israeli investors like Bank Leumi, and awash in siphoned-off Bernard Madoff cash, will do their bit for this smash-and-grab operation by Soros’s Quantum-linked hedge funds.

With Wikileaks firmly ensconced in Iceland, the “brave” and much-heralded information leakers will run an international blackmail operation against Soros’s foes and launch computer break-ins against Soros’s business rivals and non-Quantum banks. Wikileaks will be used as the info-hitmen against President Obama’s and Rahm Emanuel’s enemies in the 2012 re-election campaign.

From Iceland, Soros will be well-positioned to gain control over the massive mineral resources under the melting ice sheet of Greenland. Under the ice are the only major rare-earth deposits outside of China and with such minerals at his disposal, Soros can control the world’s electronics industries. This past week’s volcanic activity in Iceland could, however, disrupt or destroy Soros’s plans to establish and control a North American-European gateway in Iceland.
The following are some of the emails Young revealed in his exposure of Wikileaks’s CIA connections (as well as to the Russian “phishing” Mafia, an operation run by Russian-Israeli Jews using Israel as a base) [Note: in the second email, “JYA” is a reference to John Young Associates]:

To: John Young
From: Wikileaks
Subject: martha stuart pgp
Date: Sun, 7 Jan 2007 12:20:25 -0500

—–BEGIN PGP MESSAGE—–
Version: None

J. We are going to fuck them all. Chinese mostly, but not entirely a feint. Invention
abounds. Lies, twists and distorts everywhere needed for protection. Hackers monitor
chinese and other intel as they burrow into their targets, when they pull, so do we.
Inxhaustible supply of material. Near 100,000 documents/emails a day. We’re going to crack the world open and let it flower into something new. If fleecing the CIA will assist us, then fleece we will. We have pullbacks from NED, CFR, Freedomhouse and other CIA teats. We have all of pre 2005 afghanistan. Almost all of india fed. Half
a dozen foreign ministries. Dozens of political parties and consulates, worldbank,
apec, UN sections, trade groups, tibet and fulan dafa associations and… russian
phishing mafia who pull data everywhere. We’re drowing. We don’t even know a tenth
of what we have or who it belongs to. We stopped storing it at 1Tb.
——————————————-
From: Julian Assange
Date: Mon, 8 Jan 2007 13:40:14 +0000
To: funtimesahead[a t]lists.riseup.net
Subject: [WL] cryptome disclosure

[This is a restricted internal development mailinglist for w-i-k-i-l-e-a-k-s-.-o-r-g.
Please do not mention that word directly in these discussions; refer instead to ‘WL’.
This list is housed at riseup.net, an activist collective in Seattle with an established lawyer
and plenty of backbone.]

No idea what JYA was saying!

It’s clear to me however, that he was not trying to protect people’s
identities with his xxxxx’ing, but rather trying to increase the
sexiness of the document. Perhaps he feels WL is a threat to the
central status mechanism in his life? I think he just likes the
controversy.

He may have done us a great favor. There’s a lot of movement in that
document. It’s a little anarchist, but I think it generally reads
well and sounds like people doing something they care about.

Btw, I suggest we be careful with Wayne Madsen too. He seems to be
another case of someone who was fantastic a few years ago, but
recently has started to see conspiracies everywhere. Both cases
possibly age related.

I am not spending any more thought on it. Next week is going to be
busy. The weeks earlier stories will be already done and that’ll set
the agenda for the rest of the week, not jya’s attention seeker.

I’m willing to handle calls for .au, although my background may make
S a better bet.
————————–

One of WMR’s sources had the following thoughts about Assange’s comments about this editor:
Careful: Madsen is up to no good concerning secrets concerning WikiLeaks.
Another Case of Someone: The writer has spent time in psychiatric institution.
Was Fantastic: Formerly On Our Side, Now becoming an Enemy.
Conspiracies Everywhere: the George Soros conspiracy in which WikiLeaks is a cog.
Both Cases: Here it is again, he’s been in an institution.
Age Related: In 2007, the editor was 52 years old but with possible early senility setting in.

http://www.waynemadsenreport.com/articles/20100326

March 26-28, 2010

Wikileaks and Iceland media law are stalking horses for Soros
Following up on WMR’s March 25, 2010 report on Wikileaks’s ties to U.S. intelligence, Mossad, and George Soros, WMR has received additional information that points to the Icelandic media law that would turn the economically-battered country into an information safe haven for websites like Wikileaks as being a contrivance of George Soros’s Open Society Institute (OSI).

WMR has learned that OSI’s Mark Thompson spoke at the May 2009 First Council of Europe Conference of Ministers responsible for Media and New Communications Services. Present at the conference was Katrin Jakobsdóttir, Iceland’s Minister of Culture, Education, and Science and members of the Icelandic parliament, the Althing. It was after this conference that the Icelandic Modern Media Initiative was introduced with much fanfare from Wikileaks and its co-founder Julian Assange. Thompson has a background that includes propagandizing for the western incursion into the Balkans, including directing the Media Analysis Unit for the UN mission in Yugoslavia, UNPROFOR; the Organization for Security and Cooperation in Europe, and Soros’s OSI.

Wikileaks claims it is the first website dedicated to revealing sensitive and classified information. This is false. In fact, Cryptome, founded by New York City architect John Young, was the first and Wikileaks is a mere poor facsimile. John Young once proudly proclaimed to this editor that he would likely become America’s “first political prisoner” from the Internet. Young’s Cryptome has gone far beyond Wikileaks by publishing a list of British MI-6 agents, Microsoft’s manual on how it conducts surveillance for U.S. law enforcement, photos of Guantanamo and a list of the detainees imprisoned there, and even overhead photos of Dick Cheney’s home in McLean, Virginia while it was under construction.

And Wikileaks appears to have climbed on to the previous work of others. In 2008, Wikileaks claimed to have obtained, through “hacking,” the credit card records of the Norm Coleman Senate campaign in Minnesota. In fact, WMR has been informed that the credit card files, along with the campaign’s backup material, was stored by the webmaster in an unprotected folder. It was this file that was downloaded. The “hack” was heralded by MinnesotaIndependent.com, a Soros-funded operation. The illegal operation was never acted upon by law enforcement. In addition, the website PoliticsInMinnesota.com reported on the leak of the files several weeks before the Coleman data appeared on Wikileaks.

It is Young’s Cryptome that has been harassed by the U.S. government and Internet Service Providers. Meanwhile, Wikileaks has come up with a fanciful tale of its activists being tailed in Iceland by shadowy Icelandic and American gumshoes and fears that they will be “taken out” before they can air a video at the National Press Club in Washington, DC on April 5 showing a U.S. missile attack on Afghan civilians. There is also a specious claim that the military’s encryption codes were somehow broken to obtain the video. If that is true, the real story is that the United States suffered a major compromise of its cryptographic keys, something that has only rarely occurred in the past.

When John Young pulled out of the Wikileaks operation in 2007, suspecting it was a CIA front, there were also early allegations that Wikileaks was funded by Soros. Soros fronts for the CIA by running the operations of Radio Free Europe, Radio Liberty, and Radio Free Asia. In fact, one of Wikileaks’s advisory board members, Chinese dissident Xiao Qiang, is a commentator for Radio Free Asia.

Soros has been heavily involved in Iceland since 1998 and it is Soros who helped found the small Democracy Movement. The website Reykjavik Grapevine took the Democracy Movement to task last October 22 when it wrote, “A speculative column appearing on Vísir.is points out that billionaire George Soros has enough money to buy Iceland . . . Foreign investment – or foreign exploitation – of Iceland has been on the minds of a lot of Icelanders lately, especially as more companies from abroad express an interest in Iceland’s natural resources . . . And look at this, Obama’s OMB director Peter Orszag (the name is Jewish from Hungarian-Romanian Transylvania like fellow vampire Soros) and his connection to Iceland: “In 1998, after serving in the Clinton administration, Orszag co-founded an economic consulting group company with his brother and Joseph Stiglitz called Sebago Associates, where he served as president through 2007. The firm’s clients have included the World Bank, the Nordic Council of Ministers, and most notably, the Central Bank of Iceland. The once prosperous economy of Iceland has been devastated by the current economic crisis, which its citizens say was carried out by a gang of financial criminals who followed disastrous policies and advice – provided by Peter Orszag and Company.”

Soros appears to have been partly behind the collapse of the Icelandic economy and now his minions in Reykjavik and his contrivance, Wikileaks, wants to transform Iceland into an information technology safe harbor from he and his NGO network can engage in massive propaganda campaigns and destabilization efforts around the world without the fear of legal ramifications.

WMR’s sources report that the Soros Private Equity group (since renamed TowerBrook Capital Partners) invested $10 million in TradeDoubler, a Swedish online provider and platform, in cooperation with the Icelandic venture firm Arctic Ventures. TradeDoubler handles online financial payments and transactions but mainly online advertising, and is big in online betting throughout Europe. The downfall of Iceland’s banks was enabled by online banking and investment. Ragnar Thorisson, an Icelander, worked at VBS Securities before founding Arctic Ventures (where he invested in E-Trade Nordic). He then invested in Argnor, a wireless service provider. Ordinary members of the TradeDoubler Board of Directors include Niclas Gabrán and Ramez Sousou of Soros Private Equity group, now TowerBrook Capital Partners. Thorisson reportedly sold his shares in TradeDoubler.

It is also noteworthy that TowerBrook is heavily invested in healthcare services and pharmaceuticals and stands to reap huge profits from President Obama’s health care program.

Although Soros claims he is for freedom of information, going as far as promoting Iceland as a freedom of information paradise, criticism of Soros’s operations don’t appear to be covered by the former Hungarian Nazi collaborator’s largess as seen in the following RT program when this editor criticized Soros’s operations. Iceland’s Soros-prompted media reform bill also contains a provision for an Icelandic Freedom of Expression Award, a typical Soros construct. Soros’s NGO network provides for a number of awards that are used to pad the resumes of a number of dubious bad actors.
http://www.waynemadsenreport.com/articles/20100328_1
http://arthurzbygniew.blogspot.com/2010/03/pentagon-adds-wikileaks-to-list-of.html
March 29, 2010
Soros’s game plan for Iceland and its “freedom of information” zone was hatched years ago

More details have emerged from WMR’s sources about the Wikileaks claim that it is subject to intense surveillance by U.S. and Icelandic authorities.

Wikileaks, a website that claims to publish explosive sensitive documents from government agencies around the world, claims to have been the subject of surveillance because it plans to release a video of a missile attack by American forces of Afghan villagers. The site also claims to have broken top secret U.S. military encryption codes to obtain the video, which it plans to release at a press conference at the National Press Club in Washington, DC on April 5.
Wikileaks has been party to a proposed media bill in the Icelandic legislature that would establish a “freedom of information” zone in Iceland benefiting journalists, human rights campaigners, and whistleblowers.
WMR’s sources claim the entire Wikileaks episode in Iceland and its claims are a fraud inspired by George Soros, a frontman for the CIA and the Rothschild banking family in Britain.

Iceland appears to be getting wise to the Wikileaks caper. According to IceNews, Iceland’s Ministry of Justice has distanced itself from Wikileaks’s alleagtions of Icelandic surveillance and Fridrik Smari Bjorgvinsson, chief of the Reykjavik police, said the only link to the Wikileaks charges was the arrest of 17 year-old in Kopavogur on March 22 for breaking into a business. Wikileaks claims the individual was questioned about how the U.S. military video was obtained. However, according to the Icelandic government, Wikileaks is creating a fantasy issue over the arrest of a young person for breaking and entering in a country where such crimes are rare.

John Young, who runs the bona fide sensitive document exposure website, Cryptome.org, left the Wikileaks board in 2007, charging that it was a CIA front. In a leaked January 8, 2007, e-mail, Wikileaks’s co-editor wrote that WMR’s editor “see[s] conspiracies everywhere” and that the condition was “possibly age related.” This editor was 52 years old as of the date of the e-mail.

WMR has learned from knowledgeable sources that Wikileaks’s claims that it protects the identity of whistleblowers and leakers are rife with problems. Wikileaks uses the program “TOR” for file downloads. WMR has been informed by one source that TOR, the German word for “gate,” “gives away email accounts, user names, and passwords on a user’s computer, meaning the CIA can trace any whistleblower dumb enough to believe Wikileaks’s hype and everyone who is downloading.” From an unrestricted information zone in Iceland, Wikileaks would be free to collect such sensitive user information to pass on to Langley and Soros’s operatives — working under non-governmental organization (NGO) cover, around the world.

Last year, Wikileaks leaked its own confidential donor list on its website. Wikileaks released a statement that the list was leaked “possibly to test the project’s principles of complete impartiality when dealing with whistleblowers.” One was a convicted hacker who had broken into Worldcom’s intranet and obtained Social Security Numbers, bank account information, and direct deposit details for over 80,000 WorldCom employees.

Soros has long preyed on Iceland’s economy. WMR’s sources reveal that during the winter of 2007-2008, Soros hedge funds were shorting the Icelandic krona. There are reports that the U.S. Justice Department is now investigating Soros’s SAC Capital for shorting the euro and the British pound.

The collapse of the Icelandic economy, aided and abetted by Soros and Rorthschild financial interests in Britain and the Netherlands, set the stage for Soros to make the approach to financially-broke Iceland to become a global information “safe harbor.”

Wikileaks critics also point out that the website has produced information that had previously been available elsewhere, including such “exposés” as U.S. detainee abuse, use of chemical weapons in Iraq and Afghanistan, and U.S. military propaganda operations. The recent revelation of a 2008 U.S. Army Counterintelligence Center report citing Wikileaks as a threat to national security is a red herring. The document proposes to identify those who leak to Wikileaks to “damage and potentially destroy” the Wikileaks “center of gravity.” According to WMR’s sources, Wikileaks’s use of TOR has already exposed the leakers. At the least, the U.S. Army’s fears about the Wikileaks site is an extreme over-reaction. At the most, the Army was attempting to boost the website’s bona fides as part of a cyber-psychological warfare campaign.
http://www.waynemadsenreport.com/articles/20100401

April 1-4, 2010
How Wikileaks and Soros conspired to bring down Swiss bank

WMR’s financial intelligence sources report that the unauthorized disclosure of a compact disk to Wikileaks that contained financial details of the clients of the secretive and usually highly-secure Zurich-based independent money management Julius Baer Group was designed to destroy the firm’s standing with its customers and make it ripe for a hostile takeover by interests associated with multi-billionaire vulture capitalist George Soros, including Goldman Sachs. Julius Baer was founded in the 19th century.
In December 2007, the former chief of Baer’s Cayman Islands unit, Rudolf Elmer, leaked information about surveillance of him and his family to Wikileaks. In June 2005, the Swiss newspaper “Cash” and the Wall Street Journal reported on the receipt of a CD containing clients’ transactions, including every deposit made, from Baer’s Cayman unit that dealt with anonymous trusts. The CD data covered the time frame 1997 to 2002. Elmer had been suspected of the leak and was fired by Baer in 2003. In January 2008, Wikileaks began publishing details of Baer’s clients — who were accused of tax evasion and money laundering. The clients resided in the United States, Hong Kong, Germany, Switzerland, Greece, Spain, and Peru. Elmer was jailed briefly in 2005 by Swiss authorities for violation of Swiss financial privacy laws. Elmer eventually turned over Baer documents to Manhattan District Attorney Robert Morgenthau, the US Internal Revenue Service, and the Senate Senate subcommittee on investigations headed by Senator Carl Levin (D-MI).

For Europeans and others who had no financial or other connections to the United States, the fact that they were placed under an investigation by the United States represented a huge jurisdictional leap by the United States in applying U.S. laws where they had no force. In April 2007, some Baer documents were also leaked to the German tax authorities.

For example, the Hong Kong resident on the leaked Baer documents is Lord Kadoorie, who died in 1993. The Kadoorie family, originally Iraqi Jews from Baghdad, migrated to Hogn Kong via Mumbai. The Kadoories, however, were not involved in tax evasion’ since using offshore accounts is completely legal in Hong Kong.
Elmer worked for Baer for 16 years, first bas a senior auditor and then from 1994 to 2003 as the chief of the bank’s unit in the Cayman Islands. Elmer is represented by former Senate Foreign Relations Committee investigator Jack Blum, now with the Lobel Novins Lamont law firm in Washington, DC. After being fired by Baer in 2003, Elmer went to work for Noble Investments of Zurich, a hedge fund consultancy. Elmer began leaking information about Noble, as well, including its use of a Bermuda shell corporation to avoid Swiss taxes.

Blum helped investigate bribery violations of the Foreign Corrupt Practices Act in the 1970s by Lockheed Corporation. The Lockheed bribery scandal helped bring down Japanese Prime Minister Kakuei Tanaka, who was later convicted and imprisoned in Japan for accepting bribes from Lockheed. However, WMR has learned that Blum and the Senate committee was very selective in who they investigated for laundering money from foreign bribes. While Tanaka was singled out, Chilean dictator General Augusto Pinochet, who overthrew and assassinated democratically-elected Chilean President Salvador Allende with the help of Henry Kissinger and the CIA, was allowed to launder his ill-gotten gains through Riggs Bank in Washington, DC. WMR has learned that Tanaka despised both Richard Nixon and Kissinger and he was thus targeted selectively by the Nixon Justice and Treasury Departments.

On December 4, 2008, Alex Widmer, 52, the CEO of Julius Baer and a widower with three children, was found dead from an apparent suicide. Widmer had expanded Baer’s presence in Moscow and Indonesia and he previously served as the chief of private banking for Credit Suisse. WMR has learned that Widmer was assassinated after he discovered the links between the bank’s leaks of client information to the media and Wikileaks and Israeli intelligence and the Soros network. Only the New York Times reported that Widmer’s death was from suicide and an autopsy report was never released but bank employees were told that Widmer died from an “unexpected illness.”

After Julius Baer Group was rocked by the leaks by Elmer through Wikileaks, Baer became the target of a takeover bid by Goldman Sachs. As hedge funds began withdrawing from Baer, the firm’s share values dropped by 60 percent making it vulnerable to a hostile takeover. The hedge fund withdrawals lasted for ten months during which time Goldman Sachs was behind the attack on Lehman Brothers and Soros was shorting the Icelandic krona.
There is also another interesting wrinkle to the Baer story. The leaks of Baer’s client data began in 2002. Wikileaks was not founded until 2006. In the interim, there were other operatives involved in leaking the firm’s data to the media. The suspicions are that they worked for Soros’s Quantum, which is a front for Rothschild interests, as well as for Goldman Sachs. WMR has learned that suspicions about the pre-Wikileaks leakers is focused on Mossad agents. The Julius Baer operations in the Cayman Islands would have involved the financial holdings of Latin Americans involved in drug money laundering. The involvement of Mossad in exposing the Cayman accounts likely had repercussions for Israelis who were also involved in cocaine smuggling in Latin America. It is pointed out that in March 2007, as Baer information was continuing to leak, Tsuriel Raphael, Israel’s ambassador to El Salvador, was found in the garden of his home drunk, naked, and tied up with a rubber ball in his mouth and a sex toy inserted in his anus. Raphael was recalled to Israel. A few months earlier, in January, the body of David Dahan, the chief of Israel’s Defense Ministry Mission to Europe, was found floating in the Seine near Rouen, France. Police ruled out foul play and said the death was a suicide.

Post-9/11 anti-terrorist financing legislation permitted Goldman Sachs’s and Soros’s operatives within the Treasury Department to target any bank where it was even suggested that people associated with Osama bin Laden may have had accounts. However, for Soros, Goldman Sachs, and the Mossad, the attack on Julius Baer represented some “score settling” over Swiss financial holdings from victims of the Holocaust.

To summarize succinctly what occurred with Baer and Wikileaks, WMR received the following real-world explanation: “The Bush administration investigators find few accounts actually linked to terrorism, but a lot of accounts of rich Arabs, who get pissed at being misidentified and who then complain to Bush. So then, the neocons go after middle-tier billionaires and millionaires for ‘tax evasion’ and ‘corruption’ – which are NOT part of the USA Patriot Act, but are still a good source of easy money, since the victims don’t have room to complain. When the robbed do complain, they are threatened with exposure to the media, and when the media hesitates to publish, there’s a standoff. The banks have to protect their clients since the “prosecution” targets, in some cases, are intelligence agents. The Soros hedge funds and Goldman dump shares in the Euro banks, but to no avail. They hire stooges like Rudolf Elmer, a disgruntled manager fired from the Caribbean division of Julius Baer. All he’s got is tax evasion, not even proof of drug money, because he’s not stupid enough to cross the cartel. Elmer then moves to Mauritius. So without any handles on Baer and other Swiss banks, the U.S. government leaks customer lists (confiscated from scared employees by the Treasury and CIA agents) to Wikileaks, conveniently created by the Soros-Goldman Sachs-Mossad construct for blackmail purposes.”

http://www.waynemadsenreport.com/articles/20100328_1
http://arthurzbygniew.blogspot.com/2010/03/pentagon-adds-wikileaks-to-list-of.html
March 29, 2010
Soros’s game plan for Iceland and its “freedom of information” zone was hatched years ago

More details have emerged from WMR’s sources about the Wikileaks claim that it is subject to intense surveillance by U.S. and Icelandic authorities.

Wikileaks, a website that claims to publish explosive sensitive documents from government agencies around the world, claims to have been the subject of surveillance because it plans to release a video of a missile attack by American forces of Afghan villagers. The site also claims to have broken top secret U.S. military encryption codes to obtain the video, which it plans to release at a press conference at the National Press Club in Washington, DC on April 5.
Wikileaks has been party to a proposed media bill in the Icelandic legislature that would establish a “freedom of information” zone in Iceland benefiting journalists, human rights campaigners, and whistleblowers.
WMR’s sources claim the entire Wikileaks episode in Iceland and its claims are a fraud inspired by George Soros, a frontman for the CIA and the Rothschild banking family in Britain.

Iceland appears to be getting wise to the Wikileaks caper. According to IceNews, Iceland’s Ministry of Justice has distanced itself from Wikileaks’s alleagtions of Icelandic surveillance and Fridrik Smari Bjorgvinsson, chief of the Reykjavik police, said the only link to the Wikileaks charges was the arrest of 17 year-old in Kopavogur on March 22 for breaking into a business. Wikileaks claims the individual was questioned about how the U.S. military video was obtained. However, according to the Icelandic government, Wikileaks is creating a fantasy issue over the arrest of a young person for breaking and entering in a country where such crimes are rare.

John Young, who runs the bona fide sensitive document exposure website, Cryptome.org, left the Wikileaks board in 2007, charging that it was a CIA front. In a leaked January 8, 2007, e-mail, Wikileaks’s co-editor wrote that WMR’s editor “see[s] conspiracies everywhere” and that the condition was “possibly age related.” This editor was 52 years old as of the date of the e-mail.

WMR has learned from knowledgeable sources that Wikileaks’s claims that it protects the identity of whistleblowers and leakers are rife with problems. Wikileaks uses the program “TOR” for file downloads. WMR has been informed by one source that TOR, the German word for “gate,” “gives away email accounts, user names, and passwords on a user’s computer, meaning the CIA can trace any whistleblower dumb enough to believe Wikileaks’s hype and everyone who is downloading.” From an unrestricted information zone in Iceland, Wikileaks would be free to collect such sensitive user information to pass on to Langley and Soros’s operatives — working under non-governmental organization (NGO) cover, around the world.

Last year, Wikileaks leaked its own confidential donor list on its website. Wikileaks released a statement that the list was leaked “possibly to test the project’s principles of complete impartiality when dealing with whistleblowers.” One was a convicted hacker who had broken into Worldcom’s intranet and obtained Social Security Numbers, bank account information, and direct deposit details for over 80,000 WorldCom employees.

Soros has long preyed on Iceland’s economy. WMR’s sources reveal that during the winter of 2007-2008, Soros hedge funds were shorting the Icelandic krona. There are reports that the U.S. Justice Department is now investigating Soros’s SAC Capital for shorting the euro and the British pound.

The collapse of the Icelandic economy, aided and abetted by Soros and Rorthschild financial interests in Britain and the Netherlands, set the stage for Soros to make the approach to financially-broke Iceland to become a global information “safe harbor.”

Wikileaks critics also point out that the website has produced information that had previously been available elsewhere, including such “exposés” as U.S. detainee abuse, use of chemical weapons in Iraq and Afghanistan, and U.S. military propaganda operations. The recent revelation of a 2008 U.S. Army Counterintelligence Center report citing Wikileaks as a threat to national security is a red herring. The document proposes to identify those who leak to Wikileaks to “damage and potentially destroy” the Wikileaks “center of gravity.” According to WMR’s sources, Wikileaks’s use of TOR has already exposed the leakers. At the least, the U.S. Army’s fears about the Wikileaks site is an extreme over-reaction. At the most, the Army was attempting to boost the website’s bona fides as part of a cyber-psychological warfare campaign.
http://www.waynemadsenreport.com/articles/20100401

April 1-4, 2010
How Wikileaks and Soros conspired to bring down Swiss bank

WMR’s financial intelligence sources report that the unauthorized disclosure of a compact disk to Wikileaks that contained financial details of the clients of the secretive and usually highly-secure Zurich-based independent money management Julius Baer Group was designed to destroy the firm’s standing with its customers and make it ripe for a hostile takeover by interests associated with multi-billionaire vulture capitalist George Soros, including Goldman Sachs. Julius Baer was founded in the 19th century.
In December 2007, the former chief of Baer’s Cayman Islands unit, Rudolf Elmer, leaked information about surveillance of him and his family to Wikileaks. In June 2005, the Swiss newspaper “Cash” and the Wall Street Journal reported on the receipt of a CD containing clients’ transactions, including every deposit made, from Baer’s Cayman unit that dealt with anonymous trusts. The CD data covered the time frame 1997 to 2002. Elmer had been suspected of the leak and was fired by Baer in 2003. In January 2008, Wikileaks began publishing details of Baer’s clients — who were accused of tax evasion and money laundering. The clients resided in the United States, Hong Kong, Germany, Switzerland, Greece, Spain, and Peru. Elmer was jailed briefly in 2005 by Swiss authorities for violation of Swiss financial privacy laws. Elmer eventually turned over Baer documents to Manhattan District Attorney Robert Morgenthau, the US Internal Revenue Service, and the Senate Senate subcommittee on investigations headed by Senator Carl Levin (D-MI).

For Europeans and others who had no financial or other connections to the United States, the fact that they were placed under an investigation by the United States represented a huge jurisdictional leap by the United States in applying U.S. laws where they had no force. In April 2007, some Baer documents were also leaked to the German tax authorities.

For example, the Hong Kong resident on the leaked Baer documents is Lord Kadoorie, who died in 1993. The Kadoorie family, originally Iraqi Jews from Baghdad, migrated to Hogn Kong via Mumbai. The Kadoories, however, were not involved in tax evasion’ since using offshore accounts is completely legal in Hong Kong.
Elmer worked for Baer for 16 years, first bas a senior auditor and then from 1994 to 2003 as the chief of the bank’s unit in the Cayman Islands. Elmer is represented by former Senate Foreign Relations Committee investigator Jack Blum, now with the Lobel Novins Lamont law firm in Washington, DC. After being fired by Baer in 2003, Elmer went to work for Noble Investments of Zurich, a hedge fund consultancy. Elmer began leaking information about Noble, as well, including its use of a Bermuda shell corporation to avoid Swiss taxes.

Blum helped investigate bribery violations of the Foreign Corrupt Practices Act in the 1970s by Lockheed Corporation. The Lockheed bribery scandal helped bring down Japanese Prime Minister Kakuei Tanaka, who was later convicted and imprisoned in Japan for accepting bribes from Lockheed. However, WMR has learned that Blum and the Senate committee was very selective in who they investigated for laundering money from foreign bribes. While Tanaka was singled out, Chilean dictator General Augusto Pinochet, who overthrew and assassinated democratically-elected Chilean President Salvador Allende with the help of Henry Kissinger and the CIA, was allowed to launder his ill-gotten gains through Riggs Bank in Washington, DC. WMR has learned that Tanaka despised both Richard Nixon and Kissinger and he was thus targeted selectively by the Nixon Justice and Treasury Departments.

On December 4, 2008, Alex Widmer, 52, the CEO of Julius Baer and a widower with three children, was found dead from an apparent suicide. Widmer had expanded Baer’s presence in Moscow and Indonesia and he previously served as the chief of private banking for Credit Suisse. WMR has learned that Widmer was assassinated after he discovered the links between the bank’s leaks of client information to the media and Wikileaks and Israeli intelligence and the Soros network. Only the New York Times reported that Widmer’s death was from suicide and an autopsy report was never released but bank employees were told that Widmer died from an “unexpected illness.”

After Julius Baer Group was rocked by the leaks by Elmer through Wikileaks, Baer became the target of a takeover bid by Goldman Sachs. As hedge funds began withdrawing from Baer, the firm’s share values dropped by 60 percent making it vulnerable to a hostile takeover. The hedge fund withdrawals lasted for ten months during which time Goldman Sachs was behind the attack on Lehman Brothers and Soros was shorting the Icelandic krona.
There is also another interesting wrinkle to the Baer story. The leaks of Baer’s client data began in 2002. Wikileaks was not founded until 2006. In the interim, there were other operatives involved in leaking the firm’s data to the media. The suspicions are that they worked for Soros’s Quantum, which is a front for Rothschild interests, as well as for Goldman Sachs. WMR has learned that suspicions about the pre-Wikileaks leakers is focused on Mossad agents. The Julius Baer operations in the Cayman Islands would have involved the financial holdings of Latin Americans involved in drug money laundering. The involvement of Mossad in exposing the Cayman accounts likely had repercussions for Israelis who were also involved in cocaine smuggling in Latin America. It is pointed out that in March 2007, as Baer information was continuing to leak, Tsuriel Raphael, Israel’s ambassador to El Salvador, was found in the garden of his home drunk, naked, and tied up with a rubber ball in his mouth and a sex toy inserted in his anus. Raphael was recalled to Israel. A few months earlier, in January, the body of David Dahan, the chief of Israel’s Defense Ministry Mission to Europe, was found floating in the Seine near Rouen, France. Police ruled out foul play and said the death was a suicide.

Post-9/11 anti-terrorist financing legislation permitted Goldman Sachs’s and Soros’s operatives within the Treasury Department to target any bank where it was even suggested that people associated with Osama bin Laden may have had accounts. However, for Soros, Goldman Sachs, and the Mossad, the attack on Julius Baer represented some “score settling” over Swiss financial holdings from victims of the Holocaust.

To summarize succinctly what occurred with Baer and Wikileaks, WMR received the following real-world explanation: “The Bush administration investigators find few accounts actually linked to terrorism, but a lot of accounts of rich Arabs, who get pissed at being misidentified and who then complain to Bush. So then, the neocons go after middle-tier billionaires and millionaires for ‘tax evasion’ and ‘corruption’ – which are NOT part of the USA Patriot Act, but are still a good source of easy money, since the victims don’t have room to complain. When the robbed do complain, they are threatened with exposure to the media, and when the media hesitates to publish, there’s a standoff. The banks have to protect their clients since the “prosecution” targets, in some cases, are intelligence agents. The Soros hedge funds and Goldman dump shares in the Euro banks, but to no avail. They hire stooges like Rudolf Elmer, a disgruntled manager fired from the Caribbean division of Julius Baer. All he’s got is tax evasion, not even proof of drug money, because he’s not stupid enough to cross the cartel. Elmer then moves to Mauritius. So without any handles on Baer and other Swiss banks, the U.S. government leaks customer lists (confiscated from scared employees by the Treasury and CIA agents) to Wikileaks, conveniently created by the Soros-Goldman Sachs-Mossad construct for blackmail purposes.”

http://www.waynemadsenreport.com/articles/20100328_1
http://arthurzbygniew.blogspot.com/2010/03/pentagon-adds-wikileaks-to-list-of.html
March 29, 2010
Soros’s game plan for Iceland and its “freedom of information” zone was hatched years ago

More details have emerged from WMR’s sources about the Wikileaks claim that it is subject to intense surveillance by U.S. and Icelandic authorities.

Wikileaks, a website that claims to publish explosive sensitive documents from government agencies around the world, claims to have been the subject of surveillance because it plans to release a video of a missile attack by American forces of Afghan villagers. The site also claims to have broken top secret U.S. military encryption codes to obtain the video, which it plans to release at a press conference at the National Press Club in Washington, DC on April 5.
Wikileaks has been party to a proposed media bill in the Icelandic legislature that would establish a “freedom of information” zone in Iceland benefiting journalists, human rights campaigners, and whistleblowers.
WMR’s sources claim the entire Wikileaks episode in Iceland and its claims are a fraud inspired by George Soros, a frontman for the CIA and the Rothschild banking family in Britain.

Iceland appears to be getting wise to the Wikileaks caper. According to IceNews, Iceland’s Ministry of Justice has distanced itself from Wikileaks’s alleagtions of Icelandic surveillance and Fridrik Smari Bjorgvinsson, chief of the Reykjavik police, said the only link to the Wikileaks charges was the arrest of 17 year-old in Kopavogur on March 22 for breaking into a business. Wikileaks claims the individual was questioned about how the U.S. military video was obtained. However, according to the Icelandic government, Wikileaks is creating a fantasy issue over the arrest of a young person for breaking and entering in a country where such crimes are rare.

John Young, who runs the bona fide sensitive document exposure website, Cryptome.org, left the Wikileaks board in 2007, charging that it was a CIA front. In a leaked January 8, 2007, e-mail, Wikileaks’s co-editor wrote that WMR’s editor “see[s] conspiracies everywhere” and that the condition was “possibly age related.” This editor was 52 years old as of the date of the e-mail.

WMR has learned from knowledgeable sources that Wikileaks’s claims that it protects the identity of whistleblowers and leakers are rife with problems. Wikileaks uses the program “TOR” for file downloads. WMR has been informed by one source that TOR, the German word for “gate,” “gives away email accounts, user names, and passwords on a user’s computer, meaning the CIA can trace any whistleblower dumb enough to believe Wikileaks’s hype and everyone who is downloading.” From an unrestricted information zone in Iceland, Wikileaks would be free to collect such sensitive user information to pass on to Langley and Soros’s operatives — working under non-governmental organization (NGO) cover, around the world.

Last year, Wikileaks leaked its own confidential donor list on its website. Wikileaks released a statement that the list was leaked “possibly to test the project’s principles of complete impartiality when dealing with whistleblowers.” One was a convicted hacker who had broken into Worldcom’s intranet and obtained Social Security Numbers, bank account information, and direct deposit details for over 80,000 WorldCom employees.

Soros has long preyed on Iceland’s economy. WMR’s sources reveal that during the winter of 2007-2008, Soros hedge funds were shorting the Icelandic krona. There are reports that the U.S. Justice Department is now investigating Soros’s SAC Capital for shorting the euro and the British pound.

The collapse of the Icelandic economy, aided and abetted by Soros and Rorthschild financial interests in Britain and the Netherlands, set the stage for Soros to make the approach to financially-broke Iceland to become a global information “safe harbor.”

Wikileaks critics also point out that the website has produced information that had previously been available elsewhere, including such “exposés” as U.S. detainee abuse, use of chemical weapons in Iraq and Afghanistan, and U.S. military propaganda operations. The recent revelation of a 2008 U.S. Army Counterintelligence Center report citing Wikileaks as a threat to national security is a red herring. The document proposes to identify those who leak to Wikileaks to “damage and potentially destroy” the Wikileaks “center of gravity.” According to WMR’s sources, Wikileaks’s use of TOR has already exposed the leakers. At the least, the U.S. Army’s fears about the Wikileaks site is an extreme over-reaction. At the most, the Army was attempting to boost the website’s bona fides as part of a cyber-psychological warfare campaign.
http://www.waynemadsenreport.com/articles/20100401

April 1-4, 2010
How Wikileaks and Soros conspired to bring down Swiss bank

WMR’s financial intelligence sources report that the unauthorized disclosure of a compact disk to Wikileaks that contained financial details of the clients of the secretive and usually highly-secure Zurich-based independent money management Julius Baer Group was designed to destroy the firm’s standing with its customers and make it ripe for a hostile takeover by interests associated with multi-billionaire vulture capitalist George Soros, including Goldman Sachs. Julius Baer was founded in the 19th century.
In December 2007, the former chief of Baer’s Cayman Islands unit, Rudolf Elmer, leaked information about surveillance of him and his family to Wikileaks. In June 2005, the Swiss newspaper “Cash” and the Wall Street Journal reported on the receipt of a CD containing clients’ transactions, including every deposit made, from Baer’s Cayman unit that dealt with anonymous trusts. The CD data covered the time frame 1997 to 2002. Elmer had been suspected of the leak and was fired by Baer in 2003. In January 2008, Wikileaks began publishing details of Baer’s clients — who were accused of tax evasion and money laundering. The clients resided in the United States, Hong Kong, Germany, Switzerland, Greece, Spain, and Peru. Elmer was jailed briefly in 2005 by Swiss authorities for violation of Swiss financial privacy laws. Elmer eventually turned over Baer documents to Manhattan District Attorney Robert Morgenthau, the US Internal Revenue Service, and the Senate Senate subcommittee on investigations headed by Senator Carl Levin (D-MI).

For Europeans and others who had no financial or other connections to the United States, the fact that they were placed under an investigation by the United States represented a huge jurisdictional leap by the United States in applying U.S. laws where they had no force. In April 2007, some Baer documents were also leaked to the German tax authorities.

For example, the Hong Kong resident on the leaked Baer documents is Lord Kadoorie, who died in 1993. The Kadoorie family, originally Iraqi Jews from Baghdad, migrated to Hogn Kong via Mumbai. The Kadoories, however, were not involved in tax evasion’ since using offshore accounts is completely legal in Hong Kong.
Elmer worked for Baer for 16 years, first bas a senior auditor and then from 1994 to 2003 as the chief of the bank’s unit in the Cayman Islands. Elmer is represented by former Senate Foreign Relations Committee investigator Jack Blum, now with the Lobel Novins Lamont law firm in Washington, DC. After being fired by Baer in 2003, Elmer went to work for Noble Investments of Zurich, a hedge fund consultancy. Elmer began leaking information about Noble, as well, including its use of a Bermuda shell corporation to avoid Swiss taxes.

Blum helped investigate bribery violations of the Foreign Corrupt Practices Act in the 1970s by Lockheed Corporation. The Lockheed bribery scandal helped bring down Japanese Prime Minister Kakuei Tanaka, who was later convicted and imprisoned in Japan for accepting bribes from Lockheed. However, WMR has learned that Blum and the Senate committee was very selective in who they investigated for laundering money from foreign bribes. While Tanaka was singled out, Chilean dictator General Augusto Pinochet, who overthrew and assassinated democratically-elected Chilean President Salvador Allende with the help of Henry Kissinger and the CIA, was allowed to launder his ill-gotten gains through Riggs Bank in Washington, DC. WMR has learned that Tanaka despised both Richard Nixon and Kissinger and he was thus targeted selectively by the Nixon Justice and Treasury Departments.

On December 4, 2008, Alex Widmer, 52, the CEO of Julius Baer and a widower with three children, was found dead from an apparent suicide. Widmer had expanded Baer’s presence in Moscow and Indonesia and he previously served as the chief of private banking for Credit Suisse. WMR has learned that Widmer was assassinated after he discovered the links between the bank’s leaks of client information to the media and Wikileaks and Israeli intelligence and the Soros network. Only the New York Times reported that Widmer’s death was from suicide and an autopsy report was never released but bank employees were told that Widmer died from an “unexpected illness.”

After Julius Baer Group was rocked by the leaks by Elmer through Wikileaks, Baer became the target of a takeover bid by Goldman Sachs. As hedge funds began withdrawing from Baer, the firm’s share values dropped by 60 percent making it vulnerable to a hostile takeover. The hedge fund withdrawals lasted for ten months during which time Goldman Sachs was behind the attack on Lehman Brothers and Soros was shorting the Icelandic krona.
There is also another interesting wrinkle to the Baer story. The leaks of Baer’s client data began in 2002. Wikileaks was not founded until 2006. In the interim, there were other operatives involved in leaking the firm’s data to the media. The suspicions are that they worked for Soros’s Quantum, which is a front for Rothschild interests, as well as for Goldman Sachs. WMR has learned that suspicions about the pre-Wikileaks leakers is focused on Mossad agents. The Julius Baer operations in the Cayman Islands would have involved the financial holdings of Latin Americans involved in drug money laundering. The involvement of Mossad in exposing the Cayman accounts likely had repercussions for Israelis who were also involved in cocaine smuggling in Latin America. It is pointed out that in March 2007, as Baer information was continuing to leak, Tsuriel Raphael, Israel’s ambassador to El Salvador, was found in the garden of his home drunk, naked, and tied up with a rubber ball in his mouth and a sex toy inserted in his anus. Raphael was recalled to Israel. A few months earlier, in January, the body of David Dahan, the chief of Israel’s Defense Ministry Mission to Europe, was found floating in the Seine near Rouen, France. Police ruled out foul play and said the death was a suicide.

Post-9/11 anti-terrorist financing legislation permitted Goldman Sachs’s and Soros’s operatives within the Treasury Department to target any bank where it was even suggested that people associated with Osama bin Laden may have had accounts. However, for Soros, Goldman Sachs, and the Mossad, the attack on Julius Baer represented some “score settling” over Swiss financial holdings from victims of the Holocaust.

To summarize succinctly what occurred with Baer and Wikileaks, WMR received the following real-world explanation: “The Bush administration investigators find few accounts actually linked to terrorism, but a lot of accounts of rich Arabs, who get pissed at being misidentified and who then complain to Bush. So then, the neocons go after middle-tier billionaires and millionaires for ‘tax evasion’ and ‘corruption’ – which are NOT part of the USA Patriot Act, but are still a good source of easy money, since the victims don’t have room to complain. When the robbed do complain, they are threatened with exposure to the media, and when the media hesitates to publish, there’s a standoff. The banks have to protect their clients since the “prosecution” targets, in some cases, are intelligence agents. The Soros hedge funds and Goldman dump shares in the Euro banks, but to no avail. They hire stooges like Rudolf Elmer, a disgruntled manager fired from the Caribbean division of Julius Baer. All he’s got is tax evasion, not even proof of drug money, because he’s not stupid enough to cross the cartel. Elmer then moves to Mauritius. So without any handles on Baer and other Swiss banks, the U.S. government leaks customer lists (confiscated from scared employees by the Treasury and CIA agents) to Wikileaks, conveniently created by the Soros-Goldman Sachs-Mossad construct for blackmail purposes.”

http://www.waynemadsenreport.com/articles/20100328_1

http://arthurzbygniew.blogspot.com/2010/03/pentagon-adds-wikileaks-to-list-of.html

March 29, 2010
Soros’s game plan for Iceland and its “freedom of information” zone was hatched years ago

More details have emerged from WMR’s sources about the Wikileaks claim that it is subject to intense surveillance by U.S. and Icelandic authorities.

Wikileaks, a website that claims to publish explosive sensitive documents from government agencies around the world, claims to have been the subject of surveillance because it plans to release a video of a missile attack by American forces of Afghan villagers. The site also claims to have broken top secret U.S. military encryption codes to obtain the video, which it plans to release at a press conference at the National Press Club in Washington, DC on April 5.
Wikileaks has been party to a proposed media bill in the Icelandic legislature that would establish a “freedom of information” zone in Iceland benefiting journalists, human rights campaigners, and whistleblowers.
WMR’s sources claim the entire Wikileaks episode in Iceland and its claims are a fraud inspired by George Soros, a frontman for the CIA and the Rothschild banking family in Britain.

Iceland appears to be getting wise to the Wikileaks caper. According to IceNews, Iceland’s Ministry of Justice has distanced itself from Wikileaks’s alleagtions of Icelandic surveillance and Fridrik Smari Bjorgvinsson, chief of the Reykjavik police, said the only link to the Wikileaks charges was the arrest of 17 year-old in Kopavogur on March 22 for breaking into a business. Wikileaks claims the individual was questioned about how the U.S. military video was obtained. However, according to the Icelandic government, Wikileaks is creating a fantasy issue over the arrest of a young person for breaking and entering in a country where such crimes are rare.

John Young, who runs the bona fide sensitive document exposure website, Cryptome.org, left the Wikileaks board in 2007, charging that it was a CIA front. In a leaked January 8, 2007, e-mail, Wikileaks’s co-editor wrote that WMR’s editor “see[s] conspiracies everywhere” and that the condition was “possibly age related.” This editor was 52 years old as of the date of the e-mail.

WMR has learned from knowledgeable sources that Wikileaks’s claims that it protects the identity of whistleblowers and leakers are rife with problems. Wikileaks uses the program “TOR” for file downloads. WMR has been informed by one source that TOR, the German word for “gate,” “gives away email accounts, user names, and passwords on a user’s computer, meaning the CIA can trace any whistleblower dumb enough to believe Wikileaks’s hype and everyone who is downloading.” From an unrestricted information zone in Iceland, Wikileaks would be free to collect such sensitive user information to pass on to Langley and Soros’s operatives — working under non-governmental organization (NGO) cover, around the world.

Last year, Wikileaks leaked its own confidential donor list on its website. Wikileaks released a statement that the list was leaked “possibly to test the project’s principles of complete impartiality when dealing with whistleblowers.” One was a convicted hacker who had broken into Worldcom’s intranet and obtained Social Security Numbers, bank account information, and direct deposit details for over 80,000 WorldCom employees.

Soros has long preyed on Iceland’s economy. WMR’s sources reveal that during the winter of 2007-2008, Soros hedge funds were shorting the Icelandic krona. There are reports that the U.S. Justice Department is now investigating Soros’s SAC Capital for shorting the euro and the British pound.

The collapse of the Icelandic economy, aided and abetted by Soros and Rorthschild financial interests in Britain and the Netherlands, set the stage for Soros to make the approach to financially-broke Iceland to become a global information “safe harbor.”

Wikileaks critics also point out that the website has produced information that had previously been available elsewhere, including such “exposés” as U.S. detainee abuse, use of chemical weapons in Iraq and Afghanistan, and U.S. military propaganda operations. The recent revelation of a 2008 U.S. Army Counterintelligence Center report citing Wikileaks as a threat to national security is a red herring. The document proposes to identify those who leak to Wikileaks to “damage and potentially destroy” the Wikileaks “center of gravity.” According to WMR’s sources, Wikileaks’s use of TOR has already exposed the leakers. At the least, the U.S. Army’s fears about the Wikileaks site is an extreme over-reaction. At the most, the Army was attempting to boost the website’s bona fides as part of a cyber-psychological warfare campaign.
http://www.waynemadsenreport.com/articles/20100401

h1

Wikileaks: More background material on Iraq massacre leak

April 12, 2010

An update on that video released earlier by Wikileaks, which shows US occupying forces shooting and killing civilians—including two Reuters journalists—in Baghdad.

Wikileaks has released additional photographs and video that provide more background. These include interviews with survivors of the attack: a widow and her two children. And the last two photos taken by war photographer Namir Noor-Eldeen before he was shot by American airmen during the 2007 incident.

Video: New background material from Iraq (YouTube / Sunshine Press)

h1

The war on WikiLeaks and why it matters

April 9, 2010

By Glenn Greenwald

A newly leaked CIA report prepared earlier this month (.pdf) analyzes how the U.S. Government can best manipulate public opinion in Germany and France — in order to ensure that those countries continue to fight in Afghanistan. The Report celebrates the fact that the governments of those two nations continue to fight the war in defiance of overwhelming public opinion which opposes it — so much for all the recent veneration of “consent of the governed” — and it notes that this is possible due to lack of interest among their citizenry: “Public Apathy Enables Leaders to Ignore Voters,” proclaims the title of one section.

But the Report also cites the “fall of the Dutch Government over its troop commitment to Afghanistan” and worries that — particularly if the “bloody summer in Afghanistan” that many predict takes place — what happened to the Dutch will spread as a result of the “fragility of European support” for the war. As the truly creepy Report title puts it, the CIA’s concern is: “Why Counting on Apathy May Not Be Enough”:

The Report seeks to provide a back-up plan for “counting on apathy,” and provides ways that the U.S. Government can manipulate public opinion in these foreign countries. It explains that French sympathy for Afghan refugees means that exploiting Afghan women as pro-war messengers would be effective, while Germans would be more vulnerable to a fear-mongering campaign (failure in Afghanistan means the Terrorists will get you). The Report highlights the unique ability of Barack Obama to sell war to European populations:

It’s both interesting and revealing that the CIA sees Obama as a valuable asset in putting a pretty face on our wars in the eyes of foreign populations. It is odious — though, of course, completely unsurprising — that the CIA plots ways to manipulate public opinion in foreign countries in order to sustain support for our wars. Now that this is a Democratic administration doing this and a Democratic war at issue, I doubt many people will object to any of this. But what is worth noting is how and why this classified Report was made publicly available: because it was leaked to and then posted by WikiLeaks.org, the site run by the non-profit group Sunshine Press, that is devoted to exposing suppressed government and corporate corruption by publicizing many of their most closely guarded secrets.

* * * * *

I spoke this morning at length with Julian Assange, the Australian citizen who is WikiLeaks’ Editor, regarding the increasingly aggressive war being waged against WikiLeaks by numerous government agencies, including the Pentagon. Over the past several years, WikiLeaks — which aptly calls itself “the intelligence agency of the people” — has obtained and then published a wide array of secret, incriminating documents (similar to this CIA Report) that expose the activities of numerous governments and corporations. Among many others, they posted the Standard Operating Manual for Guantanamo, documents showing how corrupt offshore loans precipitated the economic collapse in Iceland, the notorious emails between climate scientists, documents showing toxic dumping off the coast of Africa, and many others. They have recently come into possession of classified videos relating to civilian causalities under the command of Gen. David Petraeus, as well as documentation relating to civilian-slaughtering airstrikes in Afghanistan which the U.S. military had agreed to release, only to change their mind.

All of this has made WikiLeaks an increasingly hated target of numerous government and economic elites around the world, including the U.S. Government. As The New York Times put it last week: “To the list of the enemies threatening the security of the United States, the Pentagon has added WikiLeaks.org, a tiny online source of information and documents that governments and corporations around the world would prefer to keep secret.” In 2008, the U.S. Army Counterintelligence Center prepared a secret report — obtained and posted by WikiLeaks — devoted to this website and detailing, in a section entitled “Is it Free Speech or Illegal Speech?”, ways it would seek to destroy the organization. It discusses the possibility that, for some governments, not merely contributing to WikiLeaks, but “even accessing the website itself is a crime,” and outlines its proposal for WikiLeaks’ destruction as follows:

As the Pentagon report put it: “the governments of China, Israel, North Korea, Russia, Vietnam and Zimbabwe” have all sought to block access to or otherwise impede the operations of WikiLeaks, and the U.S. Government now joins that illustrious list of transparency-loving countries in targeting them.

It’s not difficult to understand why the Pentagon wants to destroy WikiLeaks. Here’s how the Pentagon’s report describes some of the disclosures for which they are responsible:

The Pentagon report also claims that WikiLeaks has disclosed documents that could expose U.S. military plans in Afghanistan and Iraq and endanger the military mission, though its discussion is purely hypothetical and no specifics are provided. Instead, the bulk of the Pentagon report focuses on documents which embarrass the U.S. Government: information which, as they put it, “could be manipulated to provide biased news reports or be used for conducting propaganda, disinformation, misinformation, perception management, or influence operations against the U.S. Army by a variety of domestic and foreign actors.” In other words, the Pentagon is furious that this exposing of its secrets might enable others to engage in exactly the type of “perception management” which the aforementioned CIA Report proposes the U.S. do with regard to the citizenry of our allied countries.

All of this is based in the same rationale invoked by President Obama and the Democratic Congress when they re-wrote the Freedom of Information Act last year in order to suppress America’s torture photos. It’s the same rationale used by all governments to conceal evidence of their wrongdoing: we need to suppress our activities for your own good. WikiLeaks is devoted to subverting that mentality and, relatively speaking, has been quite successful in doing so.

For that reason, numerous governments and private groups would like to see them destroyed. Corporations have sued to have the site shut down. And in addition to this 2008 Pentagon report, WikiLeaks has acquired, though not yet posted, other U.S. Government classified reports on its activities, including a U.S. Marine Intelligence Report and an analysis prepared by the U.S. military base in Germany, both of which speak of WikiLeaks as a threat. Moreover, the FBI has refused to provide any information about its investigations and other activities aimed at WikiLeaks, citing, in response to FOIA requests, national security and other excuses for concealing it.

* * * * *

In my interview this morning with Assange, he described multiple incidents that clearly signal a recent escalation of surveillance and other forms of harassment directed at WikiLeaks. Many of those events are detailed in an Editorial they just published, which, he explained, was part of an effort to publicize what is being done to them in order to provide some safety and buffer. A good summary of those events is provided by Gawker. As but one disturbing incident: a volunteer, a minor, who works with WikiLeaks was detained in Iceland last week and questioned extensively about an incriminating video WikiLeaks possesses relating to the actions of the U.S. military. During the course of the interrogation, the WikiLeaks volunteer was not only asked questions about the video based on non-public knowledge about its contents (i.e., information which only the U.S. military would have), but was also shown surveillance photos of Assange exiting a recent WikiLeaks meeting regarding the imminent posting of documents concerning the Pentagon.

That WikiLeaks is being targeted by the U.S. Government for surveillance and disruption is beyond doubt. And it underscores how vital their work is and why it’s such a threat.

WikiLeaks editors, including Assagne, have spent substantial time of late in Iceland because there is a pending bill in that country’s Parliament that would provide meaningful whistle blower protection for what they do, far greater than exists anywhere else. Why is Iceland a leading candidate to do that? Because, last year, that nation suffered full-scale economic collapse. It was then revealed that numerous nefarious causes (corrupt loans, off-shore transactions, concealed warning signs) were hidden completely from the public and even from policy-makers, preventing detection and avoidance. Worse, most of Iceland’s institutions — from its media to its legislative and regulatory bodies — completely failed to penetrate this wall of secrecy, allowing this corruption to fester until it brought about full-scale financial ruin. As a result, Iceland has become very receptive to the fact that the type of investigative exposure provided by WikiLeaks is a vital national good, and there is real political will to provide it with substantial protections.

If that doesn’t sound familiar to Americans, it should. At exactly the time when U.S. government secrecy is at an all-time high, the institutions ostensibly responsible for investigation, oversight and exposure have failed. The American media are largely co-opted, and their few remaining vestiges of real investigative journalism are crippled by financial constraints. The U.S. Congress is almost entirely impotent at providing meaningful oversight and is, in any event, controlled by the factions that maintain virtually complete secrecy. As I’ve documented before, some alternative means of investigative journalism have arisen — such as the ACLU’s tenacious FOIA litigations to pry documents showing “War on Terror” abuses and the reams of bloggers who sort through, analyze and publicize them — but that’s no match for the vast secrecy powers of the government and private corporations.

The need for independent leaks and whistle-blowing exposures is particularly acute now because, at exactly the same time that investigative journalism has collapsed, public and private efforts to manipulate public opinion have proliferated. This is exemplified by the type of public opinion management campaign detailed by the above-referenced CIA Report, the Pentagon’s TV propaganda program exposed in 2008, and the ways in which private interests covertly pay and control supposedly “independent political commentators” to participate in our public debates and shape public opinion.

Last month, I was on a panel at the New School’s Conference on how information is controlled in a democracy, and also on the panel were Daniel Ellsberg, who risked his liberty to leak the Pentagon Papers, and The New York Times’ David Barstow, who won the Pulitzer Prize for exposing the Pentagon’s propaganda program. Ellsberg described how massive is the apparatus of secrecy in the National Security State, and Barstow made the vital point — which I summarized in the clip below when speaking later that day at NYU Law School — that the public and private means for manipulating public opinion are rapidly increasing at exactly the same time that checks on secrecy (such as investigative journalism) are vanishing:

Aside from the handful of organizations (the ACLU, the NYT) with the resources and will to engage in protracted FOIA litigations against the government, one of the last avenues to uncover government and other elite secrets are whistle blowers and organizations that enable them. WikiLeaks is one of the world’s most effective such groups, and it’s thus no surprise that they’re under such sustained attacks.

This is how Assange put it to me this morning in explaining why he believes his organization’s activities are so vital and why he’s willing to make himself a target in order to do it:

This information has reform potential. And the information which is concealed or suppressed is concealed or suppressed because the people who know it best understand that it has the ability to reform. So they engage in work to prevent that reform . . . .

There are reasons I do it that have to do with wanting to reform civilization, and selectively targeting information will do that — understanding that quality information is what every decision is based on, and all the decisions taken together is what “civilization” is, so if you want to improve civilization, you have to remove some of the basic constraints, which is the quality of information that civilization has at its disposal to make decisions. Of course, there’s a personal psychology to it, that I enjoy crushing bastards, I like a good challenge, so do a lot of the other people involved in WikiLeaks. We like the challenge.

The public and private organizations most eager to maintain complete secrecy around what they do — including numerous U.S. military and intelligence agencies — are obviously threatened by WikiLeaks’ activities, which is why they seek to harass and cripple them. There are numerous ways one can support WikiLeaks — donations, volunteer work, research, legal and technical assistance — and that can be done through their site. There aren’t many groups more besieged, or doing more important work, than they.

Permalink

h1

Al Jazeera Interview With The Editor WikiLeaks

April 8, 2010
h1

Wikileaks and Iraq’s Casual Massacres

April 7, 2010

Massacre Caught on Tape: US Military Confirms Authenticity of
Their Own Chilling Video Showing Killing of Journalists

by DemocracyNow!

The US military has confirmed the authenticity of newly released video showing US forces indiscriminately firing on Iraqi civilians. On Monday, the website WikiLeaks.org posted footage taken from a US military helicopter in July 2007 as it killed twelve people and wounded two children.

The dead included two employees of the Reuters news agency, photographer Namir Noor-Eldeen and driver Saeed Chmagh. We speak with WikiLeaks co-founder Julian Assange and Salon.com blogger Glenn Greenwald. [includes rush transcript]

http://www.democracynow.org/2010/4/6/massacre_caught_on_tape_us_military

Guests:

Julian Assange, co-founder of WikiLeaks

Glenn Greenwald, constitutional law attorney and political and legal blogger for Salon.com
Rush Transcript
This transcript is available free of charge. However, donations help us provide closed captioning for the deaf and hard of hearing on our TV broadcast. Thank you for your generous contribution.
Donate – $25, $50, $100, More…

Related Links
CollateralMurder.com
WikiLeaks releases video of slaughter in Iraq

AMY GOODMAN: The US military has confirmed the authenticity of newly released video showing US forces indiscriminately firing on Iraqi civilians. On Monday, the website WikiLeaks.org posted footage taken from a US military helicopter in July 2007 as it killed twelve people and wounded two children.

The voices on the tape appear to believe their targets are carrying weapons, but the footage unmistakably shows some of the victims holding camera equipment. The dead included two employees of the Reuters news agency, photographer Namir Noor-Eldeen and driver Saeed Chmagh.

The Pentagon has never publicly released the footage and has previously cleared those involved of wrongdoing. WikiLeaks says it managed to de-encrypt the tape after receiving it from a confidential source inside the military who wanted the story to be known.

In a moment, we’re going to hear from WikiLeaks co-founder Julian Assange, who oversaw the video’s release. But first we turn to the footage itself. For our television audiences, some may find these images disturbing. This clip captures the moments leading up to when US forces first opened fire.

US SOLDIER 1: See all those people standing down there?

US SOLDIER 2: Stay firm. And open the courtyard.

US SOLDIER 1: Yeah, roger. I just estimate there’s probably about twenty of them. There’s one, yeah.

US SOLDIER 2: Oh, yeah.

US SOLDIER 1: I don’t know if that’s—

US SOLDIER 3: Hey Bushmaster element, Copperhead one-six.

US SOLDIER 2: That’s a weapon.

US SOLDIER 1: Yeah. Hotel two-six, Crazy Horse one-eight .

US SOLDIER 4: Copperhead one-six, Bushmaster six-Romeo. Roger.

US SOLDIER 1: Have individuals with weapons. Yep, he’s got a weapon, too. Hotel two-six, Crazy Horse one-eight. Have five to six individuals with AK-47s. Request permission to engage .

US SOLDIER 5: Roger that. We have no personnel east of our position. So you are free to engage. Over.

US SOLDIER 2: All right, we’ll be engaging.

US SOLDIER 1: Roger, go ahead. I’m gonna—I cant get ‘em now, because they’re behind that building.

US SOLDIER 3: Hey Bushmaster element, Copperhead one-six.

US SOLDIER 1: He’s got an RPG!

US SOLDIER 2: Alright, we got a guy with an RPG.

US SOLDIER 1: I’m gonna fire. OK.

US SOLDIER 2: No, hold on. Let’s come around.

US SOLDIER 1: Behind building right now from our point of view.

US SOLDIER 2: OK, we’re going to come around.

US SOLDIER 1: Hotel two-six, I have eyes on individual with RPG, getting ready to fire. We won’t—yeah, we got a guy shooting, and now he’s behind the building. God damn it!

US SOLDIER 5: Uh, negative. He was right in front of the Brad, about there, one o’clock. Haven’t seen anything since then.

US SOLDIER 2: Just [expletive]. Once you get on, just open up.

US SOLDIER 1: I am.

US SOLDIER 4: I see your element, got about four Humvees, out along this—

US SOLDIER 2: You’re clear.

US SOLDIER 1: Alright, firing.

US SOLDIER 4: Let me know when you’ve got them.

US SOLDIER 2: Let’s shoot. Light ‘em all up.

US SOLDIER 1: Come on, fire!

US SOLDIER 2: Keep shootin’. Keep shootin’. Keep shootin’. Keep shootin’.

US SOLDIER 6: Hotel, Bushmaster two-six, Bushmaster two-six, we need to move, time now!

US SOLDIER 2: Alright, we just engaged all eight individuals.

AMY GOODMAN: The video now shows around eight Iraqis lying on the ground, dead or badly wounded. The soldiers again claim the victims have weapons and now laugh about the shooting.

US SOLDIER 1: We saw two birds. We’re still firing.

US SOLDIER 2: Roger.

US SOLDIER 1: I got ‘em.

US SOLDIER 3: Two-six, this is two-six, we’re mobile.

US SOLDIER 2: Oops, I’m sorry. What was going on?

US SOLDIER 1: God damn it, Kyle.

US SOLDIER 2: Sorry, hahaha, I hit ‘em—Roger. Currently engaging approximately eight individuals, KIA, RPGs and AK-47s. Hotel two-six, Crazy Horse one-eight.

US SOLDIER 1: Oh, yeah, look at those dead bastards.

US SOLDIER 2: Nice. Good shootin’.

US SOLDIER 1: Thank you.

AMY GOODMAN: Reuters driver Saeed Chmagh survived the initial attack. Here he’s seen trying to crawl away as the helicopter flies overhead. A voice from the cockpit hopes that Saeed brandishes a weapon to justify more shooting.

US SOLDIER 2: One individual appears to be wounded, trying to crawl away.

US SOLDIER 3: Roger, we’re going to move down there.

US SOLDIER 2: Roger, we’ll cease fire.

US SOLDIER 1: Yeah, we won’t shoot anymore. He’s getting up.

US SOLDIER 2: If he has a weapon, though, in his hand?

US SOLDIER 1: No, I haven’t seen one yet. I see you guys got that guy crawling right now on the curb. Yeah, I got him. I put two rounds near him, and you guys were shooting over there, too, so we’ll see.

US SOLDIER 3: Yeah, roger that.

US SOLDIER 4: Bushmaster three-six Element, this is Hotel two-seven. Over.

US SOLDIER 3: Hotel Two-Seven, Bushmaster Seven. Go ahead.

US SOLDIER 4: Roger. I’m just trying to make sure that you guys have my turf. Over.

US SOLDIER 3: Roger, we got your turf.

US SOLDIER 2: Come on, buddy. All you gotta do is pick up a weapon.

AMY GOODMAN: The US forces notice a van pulling up to evacuate the wounded. They again open fire, killing several more people and wounding two children inside the van.

US SOLDIER 1: Where’s that van at?

US SOLDIER 2: Right down there by the bodies.

US SOLDIER 1: OK, yeah.

US SOLDIER 2: Bushmaster, Crazy Horse. We have individuals going to the scene, looks like possibly picking up bodies and weapons.

US SOLDIER 1: Let me engage. Can I shoot?

US SOLDIER 2: Roger. Break. Crazy Horse one-eight, request permission to engage.

US SOLDIER 3: Picking up the wounded?

US SOLDIER 1: Yeah, we’re trying to get permission to engage. Come on, let us shoot!

US SOLDIER 2: Bushmaster, Crazy Horse one-eight.

US SOLDIER 1: They’re taking him.

US SOLDIER 2: Bushmaster, Crazy Horse one-eight.

US SOLDIER 4: This is Bushmaster seven, go ahead.

US SOLDIER 2: Roger. We have a black SUV—or Bongo truck picking up the bodies. Request permission to engage.

US SOLDIER 4: Bushmaster seven, roger. This is Bushmaster seven, roger. Engage.

US SOLDIER 2: One-eight, engage. Clear.

US SOLDIER 1: Come on!

US SOLDIER 2: Clear. Clear.

US SOLDIER 1: We’re engaging.

US SOLDIER 2: Coming around. Clear.

US SOLDIER 1: Roger. Trying to—

US SOLDIER 2: Clear.

US SOLDIER 1: I hear ‘em—I lost ’em in the dust.

US SOLDIER 3: I got ’em.

US SOLDIER 2: Should have a van in the middle of the road with about twelve to fifteen bodies.

US SOLDIER 1: Oh yeah, look at that. Right through the windshield! Ha ha!

AMY GOODMAN: Video footage from a July 2007 attack on Iraqi civilians by US troops, released Monday by the website WikiLeaks.org.

Well, we’re joined now by two guests. Julian Assange is the co-founder of WikiLeaks.org, oversaw the release of this top-secret US military footage. He’s joining us from Washington, DC. And by video stream from Brazil, we’re joined by Glenn Greenwald, the constitutional law attorney and blogger for Salon.com. We called the Pentagon and the US Army, but they didn’t respond to our request for them to be on the broadcast.

Julian Assange, tell us how you got this footage.

JULIAN ASSANGE: We got this footage sometime last year. We don’t disclose precise times for reasons of source protection. When we first got it, we were told that it was important and that it showed the killing of journalists, but we didn’t have any other context, and we spent quite some months after breaking the decryption looking closely into this. And the more we looked, the more disturbing it became.

This is a sequence which has a lot of detail and, I think, in some ways covers most of the bad aspects of the aerial war in Iraq and what we must be able to infer is going on in Afghanistan. So we see not only this initial opening shot on a crowd, which is clearly mostly unarmed. There may be some confusion as to whether two people are armed or whether there’s a camera or arm, but it’s clear that the majority of the people are in fact unarmed. And as it later turns out, two of those people are simply holding cameras. But we go on from there into seeing the shooting of people rescuing a wounded man, and none of those people are armed.

What’s important to remember is that every step that the Apache takes in opening fire is authorized. It does pause before shooting. It explains the situation, sometimes exaggerating a little to its commanders, and gets authorized permission.

These are not bad apples. This is standard practice. You can hear it from the tones of the voices of the pilots that this is in fact another day at the office. These pilots have evidently and gunners have evidently become so corrupted, morally corrupted, by the war that they are looking for excuses to kill. That is why you hear this segment, “Come on, buddy! Just pick up a weapon,” when Saeed, one of the Reuters employees, is crawling on the curb. They don’t want him for intelligence value to understand the situation. The man is clearly of no threat whatsoever. He’s prostate on the ground. Everyone else has been killed. They just want an excuse to kill. And it’s some kind of—appears to me to be some kind of video game mentality where they just want to get a high score, get their kill count up. And later on you’ll hear them proudly proclaiming how they killed twelve to fifteen people.

AMY GOODMAN: Julian, how has the Pentagon responded to this footage?

JULIAN ASSANGE: It’s very interesting. So yesterday, the Pentagon stated that the original investigation that it did into whether the acts broke the rules of engagement, the rules that soldiers must obey before shooting, they came to the conclusion then that there was no violation of those rules, that all the pilots, in fact, acted properly, and gunners. They reiterated that last night, that in fact it was their view that that original investigation came to the right conclusion and that they would not be reopening the investigation. However, we hear that that may be about to change. That hasn’t been confirmed yet, but our sources in CENTCOM say that there may be a change.

Also, late last night, the Pentagon suddenly decided it liked the Freedom of Information Act, after all. Reuters put in the Freedom of Information request for this video in August 2007 and did not receive any response whatsoever for over a year and never has received, to our knowledge, the video. But yesterday, the Pentagon released on the CENTCOM website six files relating to this event. There is one that is the most important, which is the investigative report into whether this action broke the rules of engagement, really quite a telling report. So the tone and language is all about trying to find an excuse for the activity. I mean, this as if your own lawyer wrote a report for you to submit to the court. It’s very clear that that is the approach, to try and find any mechanism to excuse the behavior, and that is what ended up happening.

Something that has been missed in some of the press reportage about this is that there is a third attack, just twenty minutes later, by the same crew, involving three Hellfire missiles fired onto an apartment complex where the roof was still under construction. We have fresh evidence from Baghdad that there were three families living in that apartment complex, many of whom were killed, including women. And we sent a team down there to collect that evidence. So that is in the full video we released, not in the shortened one, because we didn’t yet have that additional evidence. Innocent bystanders walking down the street are also killed in that attack.

AMY GOODMAN: Do you know who these Apache helicopter teams—what this unit is?

JULIAN ASSANGE: We don’t have the names of the teams. However, we have details about the unit, and there was a chapter, or half-chapter, in a book called The Good Soldiers by a Washington Post reporter released late last year that does cover the ground unit that moved in to collect the bodies and was the unit who also called in the Apaches to that area.

Important thing that we know from classified documentation is that there were reports of small arms fire in the general vicinity. This was not an ongoing battle. The Pentagon released statements implying that this was a firefight and the Apaches were called in, into the middle of a firefight, and the journalists walked into this firefight. That is simply a lie. At 9:50 a.m. Baghdad time, Pentagon—sorry, US military documentation states that there was small arms fire in the general vicinity, in the suburb somewhere of New Baghdad, and that there was no PID, there was no positive identification of who the shooter was. So, in other words, some bullets were received in a general area, no US troops were killed, or they were heard, could have even been cars backfiring. There was no positive identification of where those shots were coming from. And the Apaches were sent up to scout out the general region, and they saw this group of men milling around in a square, showing the Reuters photographer something interesting to photograph. So the claim that this was a battle and the Reuters guys were sort of caught in the crossfire, or it was some kind of active attack that it needed an immediate response by the Apaches, is simply a lie.

AMY GOODMAN: We’re going to come back to this discussion and, well, what’s happening to WikiLeaks.org, not only as a result of releasing this, but other sensitive documents. Julian Assange is our guest, co-founder of WikiLeaks. Also Glenn Greenwald will join us, who has been writing about this. This is Democracy Now!, democracynow.org. Back in a minute.

[break]

AMY GOODMAN: Our guest Julian Assange, co-founder of WikiLeaks, has just posted on WikiLeaks.org this 2007 footage from the helicopter gunships that opened fire on Iraqi civilians in Baghdad.

I want to play another clip, this the voices of the cockpit laughing as a Bradley tank drives over the dead body of one of the Iraqi victims.

US SOLDIER 1: I think they just drove over a body.

US SOLDIER 2: Did he?

US SOLDIER 1: Yeah!

AMY GOODMAN: And here the cockpit learns from soldiers on the ground that the victims include children. One voice says, “Well, it’s their fault for bringing their kids to battle.”

US SOLDIER 3: I’ve got eleven Iraqi KIAs . One small child wounded. Over.

US SOLDIER 1: Roger. Ah, damn. Oh, well.

US SOLDIER 3: Roger, we need—we need a—to evac this child. She’s got a wound to the belly. I can’t do anything here. She needs to get evaced. Over.

US SOLDIER 1: Well, it’s their fault for bringing their kids into a battle.

US SOLDIER 2: That’s right.

AMY GOODMAN: After discovering the wounded children, a soldier on the ground says they should be taken to a nearby US military hospital, but an order comes in to instead first hand the children over to Iraqi police, possibly delaying their treatment.

US SOLDIER 3: Negative on evac of the two civilian kids to Rusty. They’re going to have the IPs link up with us over here. Break. IPs will take them up to a local hospital. Over.

AMY GOODMAN: Julian Assange, co-founder of WikiLeaks, explain what happened to the children, the children that you show in the video footage by circling their heads, that they are in the van.

JULIAN ASSANGE: Yeah, something important to remember is that the video we obtained and released is of substantially lower quality than what the pilots saw. This is because it was converted through many stages to digital. But even so, we can just see that there are in fact two children sitting in the front seat of that van. And subsequent witness reports also confirm that.

So those children were extremely lucky to survive. The Apache helicopter was firing thirty-millimeter shells. That’s shells this wide, normally used for armor piercing, and they shoot straight through buildings.

Those children—the medic on the scene wanted to evacuate those children to the US military base at Rustamiyah, approximately eight kilometers away from the scene. The base has excellent medical facilities. Higher command denied that. We don’t know the reason. Perhaps there was a legitimate reason, but it seems like the medic would be the person best placed to know what to do. Instead, he is told to meet up and hand the children over to local police.

We don’t know what happens then. But our team that was in Baghdad, we partnered with the Icelandic state broadcasting service, RÚV, found the children over the weekend, this weekend, and interviewed them and took their hospital records, and we have photographs of the scars of the stomach wounds and the chest wounds and arm wounds for those children. The boy, in particular, was extremely lucky to survive. He had a wound that came from the top of his body down his stomach, so very, very, very lucky.

The mother says that she has been offered no compensation for the death of her husband, who was the driver of that van, and no assistance with the medical expenses of her children. And she says that there are ongoing medical expenses related to the daughter.

AMY GOODMAN: Julian Assange, what is happening now to WikiLeaks.org? What kind of response have you gotten? Can you talk about surveillance or possibly attempting to shut you down?

JULIAN ASSANGE: Well, a few weeks ago, we released a 2008 counterintelligence report from the United States Army, thirty-two pages, that assessed quite a few articles that I had written and some of the other material we had released—so that includes the main manuals for Guantánamo Bay, which revealed falsification of records there and deliberate hiding of people from the Red Cross, a breach of the Geneva Conventions, and psychological torture, many other things, and a report we released on the battle of Fallujah, once again a classified US military report into what happened there—and clearly concerned that we were causing embarrassment to the US military by exposing human rights abuses and some concern—doesn’t seem to be legitimate, but some concerns that the fine details of some material that we were releasing could, in theory, when combined with other detail, pose a threat to soldiers if insurgents got hold of that information. So that report sort of looks at different ways to destroy WikiLeaks.org or fatally marginalize it.

And because our primary asset is the trust, that sources have enough—we have a reputation for having never had a source publicly exposed, and as far as I know, that reputation is true—it looks to see whether they can publicly expose some of our sources, prosecute US military whistleblowers—and, in fact, it uses the phrase “whistleblowers,” not people who are leaking indiscriminately—but prosecute US military whistleblowers in order to destabilize us and destroy what it calls our “center of gravity,” the trust that the public and sources have in us.

It also looks at some other methods—again, it’s careful to fine-tune the language, but says that perhaps we could be hacked into and destabilized that way, or perhaps we could be fed information that was fraudulent, and therefore our reputation for integrity could be destroyed. The report is careful on these last two to suggest that maybe other governments could do this. It seems like it’s some kind of license for their claims. They speak about how Iran has blocked us on the internet and China has blocked us on the internet and other governments of a similar type have condemned us, and it lists Israel. And it also lists the case that we had against a Swiss bank in San Francisco in February 2008, a case which we conclusively won.

But in the production of this video in Iceland, where most of the team was over the last month, we did get a number of very unusual surveillance events. So we—I personally had people filming me covertly in cafes, who, when confronted, run off so scared that they even drop their cash, and not Icelanders, outsiders, although there also was some surveillance from Iceland.

Our feeling is now that that surveillance may not have been related to this video. It may more likely have been related to leaks from the US embassy in Iceland that we released. We’re not sure of that. But there was—appears to have been a following of me on an Icelandic air flight out of Iceland to an investigative journalism conference in Norway. We’re not sure that—there are records of two State Department employees on that plane with no luggage. Our suspicion is these are probably the Diplomatic Security Service investigating a leak at the embassy.

We did have a volunteer arrested for some other reason and asked questions in Iceland about WikiLeaks, but there are now two sides to this story. So our volunteer says that they asked questions about WikiLeaks, and the police say that they asked questions about WikiLeaks, but the police say this was because of a sticker on a laptop. Volunteer says that this wasn’t true. And at the moment, we’re unable to confirm whether the police had inside information about the video or whether the volunteer is not telling the truth.

AMY GOODMAN: We’re also joined, Julian Assange, by Glenn Greenwald, blogger for Salon.com. He’s a constitutional lawyer. Glenn, the significance of what this videotape is showing, from the helicopter gunship, of the helicopter gunship opening fire on Iraqi civilians?

GLENN GREENWALD: I think, in one sense, that WikiLeaks has done an extraordinarily valuable service, because it has exposed what it is that war actually is, what we’re actually doing in Afghanistan and Iraq on a day-to-day basis.

My concern with the discussions that have been triggered, though, is that there seems to be the suggestion, in many circles—not, of course, by Julian—that this is some sort of extreme event, or this is some sort of aberration, and that’s the reason why we’re all talking about it and are horrified about it. In fact, it’s anything but rare. The only thing that’s rare about this is that we happen to know about it and are seeing it take place on video. This is something that takes place on a virtually daily basis in Iraq and Afghanistan and other places where we invade and bomb and occupy. And the reason why there are hundreds of thousands of dead in Iraq and thousands of dead in Afghanistan is because this is what happens constantly when we are engaged in warfare in those countries.

And you see that, as Julian said, in the fact that every step of the way they got formal approval for what they wanted to do. And if you read the Defense Department investigations, which cleared the individuals involved, in every sense, and said that they acted complete [no audio]—

AMY GOODMAN: We may have just lost—

GLENN GREENWALD: —operating procedure.

AMY GOODMAN: There it is. Go ahead.

GLENN GREENWALD: And you see that this is standard operating procedure. The military was not at all concerned about what took place. They didn’t even think there were remedial steps needed to prevent a future reoccurrence. They concluded definitively that the members of the military involved did exactly the right thing.

This is what war is. This is what the United States does in these countries. And that, I think, is the crucial point to note, along with the fact that the military fought tooth and nail to prevent this video from surfacing, precisely because they knew that it would shed light on what their actual behavior is during war, and instead of the propaganda to which we’re typically subjected.

AMY GOODMAN: And then the attacks on WikiLeaks, the surveillance of WikiLeaks, Glenn?

GLENN GREENWALD: Well, the problem, of course, is that there are very few entities left that actually provide any meaningful checks or oversight on what the military and intelligence communities do. The media has fallen down almost completely. There’s occasional investigative reports and journalism that expose what they do, but media outlets, for a variety of reasons, including resource constraints, are hardly ever able to perform these kind of functions, even when they’re willing. Congress, of course, which has principal oversight responsibility to ensure things like this don’t happen, and that they see the light of day when they do, is almost completely impotent, by virtue of their own choices and desires and as well as by a whole variety of constraints, institutional and otherwise.

And so, there are very few mechanisms left for figuring out and understanding as citizens what it is that our government and our military and our intelligence community do. And unauthorized leaks and whistleblowing is one of the very few outlets left, and WikiLeaks is providing a safe haven for people who want to expose serious corruption and wrongdoing. And so, of course the Pentagon and the CIA sees them as an enemy and something to be targeted and shut down, because it’s one of the few avenues that we have left for meaningful accountability and disclosure.

AMY GOODMAN: Julian Assange, you have video of Afghanistan that you have yet to release?

JULIAN ASSANGE: Yes, that’s correct. We have a video of a May 2009 attack which killed ninety-seven in Afghanistan. We are still analyzing and assessing that information. We—

AMY GOODMAN: Last comments, Julian? Go ahead.

JULIAN ASSANGE: Yes. I must agree with Glenn, and I’d also like to speak a little bit about the media focus on this. We have seen some straw manning in relation to this event. So quite a few people have simply focused on the initial attack on Namir, the Reuters photographer, and Saeed, the other one, this initial crowd scene, and gone, “Well, you know, camera, RPG, it can look a bit similar. And there do appear to be two other—two people in that crowd having weapons. A heat-of-the-moment situation. Even if the descriptions were false previously, maybe there’s some excuse for this. I mean, it’s bad, but maybe there’s some excuse.” This is clearly a straw man. We can see, over these three events—the initial attack on the crowd; the attack on the people rescuing a completely unarmed man, themselves completely unarmed; to the Hellfire missile attack on an apartment complex, which killed families—all in the course of one hour, that something is wrong.

And the tone of the pilots is another day at the office. This is not, as Glenn said, an extraordinary event. This outlines that this is an everyday event. It’s another day at the office. They get clearance for everything that they do from higher command before they do it.

There was an investigative report in response to Reuters, so it’s not a minor incident. There was pressure from Reuters to produce an investigative report. There was an investigative report. It cleared everyone of wrongdoing. You can read that report that was released. It is clearly designed to come to a particular conclusion, the suppression of the FOI material, non-response to Reuters. And now we hear yesterday from the Pentagon an attempt to keep the same line, that everything was done correctly.

I don’t think that can hold, but I think it gives important lessons as to what you can believe. Even the number—everyone was described initially as insurgents, except for the two wounded children. A blanket description. It was only from pressure from the press that changed that number to there being civilians amongst the crowd. But we also see that the total death count is wrong. There were people killed in the buildings next to this event who were just there living in their houses. There were additional bystanders killed in the Hellfire missile attack, and those people weren’t even counted, let alone counted as insurgents. So you cannot believe these statements from the military about number of people who were killed, whether people are insurgents, whether an investigation into rules of engagement was correct. They simply cannot be believed and cannot be trusted.

AMY GOODMAN: Well, after the footage was released, Nabil Noor-Eldeen, the brother of the slain Reuters cameraman Namir Noor-Eldeen, spoke out in an interview with Al Jazeera.

NABIL NOOR-ELDEEN: Is this the democracy and freedom that they claim have brought to Iraq? What Namir was doing was a patriotic work. He was trying to cover the violations of the Americans against the Iraqi people. He was only twenty-one years old. Other innocent colleagues and other innocent people, who were just standing out of curiosity when they see a journalist in a scene, and they were all killed. This is another crime that should be added to the record of American crimes in Iraq and the world. Is the pilot that stupid, he cannot distinguish between an RPG and a camera? They claim he was carrying an RPG. When was the RPG this small, small as a camera? He was carrying a small camera. An RPG is more than one meter long. Yes, it was an RPG because it shows the acts against Iraq and its people that still suffer from their crimes. We demand the international organizations to help us sue those people responsible for the killings of our sons and our people.

AMY GOODMAN: Nabil Noor-Eldeen is the brother of the photographer Namir Noor-Eldeen—and his driver Saeed Chmagh, they both worked for Reuters news agency. The overwhelmingly sad tributes to them online are very important. I want to thank Julian Assange, co-founder of WikiLeaks.org. Glenn Greenwald, stay with us, because we want to go quickly to that story on Afghanistan, which we will also talk about tomorrow.

This is Democracy Now!, democracynow.org, the War and Peace Report. And we’ll talk about the worst mining disaster in twenty-five years, in West Virginia. Stay with us.