The Wikileaks Question

Moderators: Elvis, DrVolin, Jeff

Re: The Wikileaks Question

Postby vanlose kid » Fri Dec 03, 2010 4:39 pm

MacCruiskeen wrote:
vanlose kid wrote:re the cables, what i like about them is that they spell out the business-as-usual mundanity of "manifest destiny" US politics.

it rings true: the "triviality".

*


The banality of evil. Or the sheer boredom of day-to-day service to what Alasdair Gray called "The Creature".


yes. also, "like" isn't the word i was looking for, the one i was looking for i couldn't find. maybe it was a sentence. oh well.

*
"Teach them to think. Work against the government." – Wittgenstein.
User avatar
vanlose kid
 
Posts: 3182
Joined: Wed Oct 17, 2007 7:44 pm
Blog: View Blog (0)

Re: The Wikileaks Question

Postby MacCruiskeen » Fri Dec 03, 2010 4:41 pm

Has this link been posted here already? Two very good, very short essays by Assange at Cryptome (pdf) - this extract is from Dec. 3, 2006:

Conspiracy as governance in authoritarian regimes

Where details are known as to the inner workings of authoritarian regimes, we see conspiratorial interactions among the political elite, not merely for preferment or favor within the regime, but as the primary planning methodology behind maintaining or strengthening authoritarian power.

Authoritarian regimes create forces which oppose them by pushing against a people’s will to truth, love and self-realization. Plans which assist authoritarian rule, once discovered, induce further resistance. Hence such schemes are concealed by successful authoritarian powers until resistance is futile or outweighed by the efficiencies of naked power. This collaborative secrecy, working to the detriment of a population, is enough to define their behavior as conspiratorial. [...]

http://cryptome.org/0002/ja-conspiracies.pdf
"Ich kann gar nicht so viel fressen, wie ich kotzen möchte." - Max Liebermann,, Berlin, 1933

"Science is the belief in the ignorance of experts." - Richard Feynman, NYC, 1966

TESTDEMIC ➝ "CASE"DEMIC
User avatar
MacCruiskeen
 
Posts: 10558
Joined: Thu Nov 16, 2006 6:47 pm
Blog: View Blog (0)

Re: The Wikileaks Question

Postby JackRiddler » Fri Dec 03, 2010 4:51 pm

vanlose kid wrote:
JackRiddler wrote:Damn, vanlose, we cross-posted the same thing. And we both did the work of formatting it.

Just keep scrolling, people!


oops. happens, eh? things are moving fast. sorry.


No, no sir, you were faster, so it is I if anyone who should be sorry. I should delete, but I hate that I put in all those tags!!!

.
We meet at the borders of our being, we dream something of each others reality. - Harvey of R.I.

To Justice my maker from on high did incline:
I am by virtue of its might divine,
The highest Wisdom and the first Love.

TopSecret WallSt. Iraq & more
User avatar
JackRiddler
 
Posts: 16007
Joined: Wed Jan 02, 2008 2:59 pm
Location: New York City
Blog: View Blog (0)

Re: The Wikileaks Question

Postby JackRiddler » Fri Dec 03, 2010 5:01 pm

Thanks to lupercal on other thread:

lupercal wrote:
An Interview With WikiLeaks’ Julian Assange
FORBES - Nov. 29 2010 - 5:02 pm

FORBES: I wanted to ask you about [Peiter Zatko, a legendary hacker and security researcher who also goes by] “Mudge.”

Assange: Yeah, I know Mudge. He’s a very sharp guy.

FORBES: Mudge is now leading a project at the Pentagon’s Defense Advanced Research Projects Agency to find a technology that can stop leaks, which seems pretty relative to your organization. Can you tell me about your past relationship with Mudge?

Assange: Well, I…no comment.


FORBES: Were you part of the same scene of hackers? When you were a computer hacker, you must have known him well.

Assange: We were in the same milieu. I spoke with everyone in that milieu.

FORBES: What do you think of his current work to prevent digital leaks inside of organizations, a project called Cyber Insider Threat or Cinder?

{snip}

Assange: New formats and new ways of communicating are constantly cropping up. Stopping leaks is a new form of censorship. And in the same manner that very significant resources spent on China’s firewall, the result is that anyone who’s motivated can work around it. Not just the small fraction of users, but anyone who really wants to can work around it.

Censorship circumvention tools [like the program Tor] also focus on leaks. They facilitate leaking.

Airgapped networks are different. Where there’s literally no connection between the network and the internet. You may need a human being to carry something. But they don’t have to intentionally carry it. It could be a virus on a USB stick, as the Stuxnet worm showed, though it went in the other direction. You could pass the information out via someone who doesn’t know they’re a mule.

FORBES: Back to Mudge and Cinder: Do you think, knowing his intelligence personally, that he can solve the problem of leaks?

Assange: No, but that doesn’t mean that the difficulty can’t be increased. But I think it’s a very difficult case, and the reason I suggest it’s an impossible case to solve completely is that most people do not leak. And the various threats and penalties already mean they have to be highly motivated to deal with those threats and penalties. These are highly motivated people. Censoring might work for the average person, but not for highly motivated people. And our people are highly motivated.

Mudge is a clever guy, and he’s also highly ethical. I suspect he would have concerns about creating a system to conceal genuine abuses.


FORBES: But his goal of preventing leaks doesn’t differentiate among different types of content. It would stop whistleblowers just as much as it stops exfiltration of data by foreign hackers.

Assange: I’m sure he’ll tell you China spies on the U.S., Russia, France. There are genuine concerns about those powers exfiltrating data. And it’s possibly ethical to combat that process. But spying is also stabilizing to relationships. Your fears about where a country is or is not are always worse than the reality. If you only have a black box, you can put all your fears into it, particularly opportunists in government or private industry who want to address a problem that may not exist. If you know what a government is doing, that can reduce tensions.

http://blogs.forbes.com/andygreenberg/2 ... assange/7/

....................................................................
Could "wikileaks" be a DARPA-funded pinata for "Mudge" and his fellow DARPA hacker pals to whack at, with other useful benefits like poking Obama's State dept. in the eye and ginning up wars?

Hacker 'Mudge' gets DARPA Job
Gets Job as Program Manager at Defense Department

Image
Peiter Zatko, also known as "Mudge" (CBS)

(CNET) Peiter Zatko--a respected hacker known as "Mudge"--has been tapped to be a program manager at DARPA, where he will be in charge of funding research designed to help give the U.S. government tools needed to protect against cyberattacks, CNET has learned.

Zatko will become a program manager in mid-March within the Strategic Technologies Office at DARPA (Defense Advanced Research Projects Agency), which is the research and development office for the Department of Defense. His focus will be cybersecurity, he said in an interview with CNET on Tuesday.

One of his main goals will be to fund researchers at hacker spaces, start-ups, and boutiques who are most likely to develop technologies that can leapfrog what comes out of large corporations. "I want revolutionary changes. I don't want evolutionary ones," he said.

He's also hoping that giving a big push to research and development will do more to advance the progress of cybersecurity than public policy decisions have been able to do over the past few decades.

"Not much has changed" with regard to strengthening the U.S. cybersecurity position, he said. "As a society, we have a larger dependence on being wired in, yet the government only focuses on particular areas."

The connectedness of commercial, government, and military networks makes the situation even more dire, he said. "I'm going to argue that they're all pretty much intertwined now and we've seen how vulnerable some of those sectors are now. That's unacceptable," Zatko said. "I aim to fix that."

{snip}

He started the corporate information security group at BBN Technologies in the 1990s, was chief executive at L0pht Heavy Industries when the hacker space decided to incorporate, and founded security consultancy @Stake, which was later acquired by Symantec. Since 2004, he's been back at BBN, working as division scientist and technical director for the company's National Intelligence Research and Applications department.

Zatko has also done his fair share of work for the government. He was appointed to the Information Assurance sub-committee out of the Executive Office of the President, named as a subcommittee member to the Partnership for Critical Infrastructure Protection and testified several times before Congressional committees. The main hacker character in the book Breakpoint by former U.S. cybersecurity guru Richard Clarke is believed to be based on him.

"I don't want people to be putting out virus signatures after a virus has come out. I want an active defense. I want to be at the sharp pointy end of the stick."

He's not the only self-described hacker to embrace public service. Jeff Moss, founder of the Black Hat and Defcon conferences, joined the Homeland Security Advisory Council last summer.

One of the reasons Zatko decided to take the job is that the new DARPA director, Regina Dugan, is entrepreneurial and is looking to engage more with academics, following years of DARPA being closed to nongovernmental researchers for national security reasons, he said. "Now they are running more programs out of DARPA that are not classified beyond what they need to be, so it will enable more people to have visibility into them," he added.

Another lure of the job was the budget he will have. Zatko said he doesn't know exactly how much of the $3.5 billion a year DARPA spends to fund research he will oversee but said it's likely to be a "good chunk."

From his many years doing penetration testing and working to break security systems, he understands what it takes to try to defend networks and how to come up with innovative solutions to break through barriers and get around obstructions.

http://www.cbsnews.com/stories/2010/02/ ... 4372.shtml

............

the plot thickens..


lupercal wrote:Could "wikileaks" be a DARPA-funded pinata for "Mudge" and his fellow DARPA hacker pals to whack at, with other useful benefits like poking Obama's State dept. in the eye and ginning up wars?


Everything could, but these articles suggest something a lot more complicated and nuanced. Such as that Assange is being uncharacteristically polite in the process of calling his old friend Mudge a new tool for the Man.

.
We meet at the borders of our being, we dream something of each others reality. - Harvey of R.I.

To Justice my maker from on high did incline:
I am by virtue of its might divine,
The highest Wisdom and the first Love.

TopSecret WallSt. Iraq & more
User avatar
JackRiddler
 
Posts: 16007
Joined: Wed Jan 02, 2008 2:59 pm
Location: New York City
Blog: View Blog (0)

Re: The Wikileaks Question

Postby vanlose kid » Fri Dec 03, 2010 5:11 pm

MacCruiskeen wrote:Has this link been posted here already? Two very good, very short essays by Assange at Cryptome (pdf) - this extract is from Dec. 3, 2006:

Conspiracy as governance in authoritarian regimes

Where details are known as to the inner workings of authoritarian regimes, we see conspiratorial interactions among the political elite, not merely for preferment or favor within the regime, but as the primary planning methodology behind maintaining or strengthening authoritarian power.

Authoritarian regimes create forces which oppose them by pushing against a people’s will to truth, love and self-realization. Plans which assist authoritarian rule, once discovered, induce further resistance. Hence such schemes are concealed by successful authoritarian powers until resistance is futile or outweighed by the efficiencies of naked power. This collaborative secrecy, working to the detriment of a population, is enough to define their behavior as conspiratorial. [...]

http://cryptome.org/0002/ja-conspiracies.pdf


an analysis of that (and a good one):

Julian Assange and the Computer Conspiracy; “To destroy this invisible government”

Posted by zunguzungu on November 29, 2010


“To radically shift regime behavior we must think clearly and boldly for if we have learned anything, it is that regimes do not want to be changed. We must think beyond those who have gone before us, and discover technological changes that embolden us with ways to act in which our forebears could not. Firstly we must understand what aspect of government or neocorporatist behavior we wish to change or remove. Secondly we must develop a way of thinking about this behavior that is strong enough carry us through the mire of politically distorted language, and into a position of clarity. Finally must use these insights to inspire within us and others a course of ennobling, and effective action.”

Julian Assange, “State and Terrorist Conspiracies”


The piece of writing (via) which that quote introduces is intellectually substantial, but not all that difficult to read, so you might as well take a look at it yourself. Most of the news media seems to be losing their minds over Wikileaks without actually reading these essays, even though he describes the function and aims of an organization like Wikileaks in pretty straightforward terms. But, to summarize, he begins by describing a state like the US as essentially an authoritarian conspiracy, and then reasons that the practical strategy for combating that conspiracy is to degrade its ability to conspire, to hinder its ability to “think” as a conspiratorial mind. The metaphor of a computing network is mostly implicit, but utterly crucial: he seeks to oppose the power of the state by treating it like a computer and tossing sand in its diodes.

He begins by positing that conspiracy and authoritarianism go hand in hand, arguing that since authoritarianism produces resistance to itself — to the extent that its authoritarianism becomes generally known — it can only continue to exist and function by preventing its intentions (the authorship of its authority?) from being generally known. It inevitably becomes, he argues, a conspiracy:

Authoritarian regimes give rise to forces which oppose them by pushing against the individual and collective will to freedom, truth and self realization. Plans which assist authoritarian rule, once discovered, induce resistance. Hence these plans are concealed by successful authoritarian powers. This is enough to define their behavior as conspiratorial.

The problem this creates for the government conspiracy then becomes the organizational problem it must solve: if the conspiracy must operate in secrecy, how is it to communicate, plan, make decisions, discipline itself, and transform itself to meet new challenges? The answer is: by controlling information flows. After all, if the organization has goals that can be articulated, articulating them openly exposes them to resistance. But at the same time, failing to articulate those goals to itself deprives the organization of its ability to process and advance them. Somewhere in the middle, for the authoritarian conspiracy, is the right balance of authority and conspiracy.

His model for imagining the conspiracy, then, is not at all the cliché that people mean when they sneer at someone for being a “conspiracy theorist.” After all, most the “conspiracies” we’re familiar with are pure fantasies, and because the “Elders of Zion” or James Bond’s SPECTRE have never existed, their nonexistence becomes a cudgel for beating on people that would ever use the term or the concept. For Assange, by contrast, a conspiracy is something fairly banal, simply any network of associates who act in concert by hiding their concerted association from outsiders, an authority that proceeds by preventing its activities from being visible enough to provoke counter-reaction. It might be something as dramatic as a loose coalition of conspirators working to start a war with Iraq/n, or it might simply be the banal, everyday deceptions and conspiracies of normal diplomatic procedure.

He illustrates this theoretical model by the analogy of a board with nails hammered into it and then tied together with twine:

First take some nails (“conspirators”) and hammer them into a board at random. Then take twine (“communication”) and loop it from nail to nail without breaking. Call the twine connecting two nails a link. Unbroken twine means it is possible to travel from any nail to any other nail via twine and intermediary nails…Information flows from conspirator to conspirator. Not every conspirator trusts or knows every other conspirator even though all are connected. Some are on the fringe of the conspiracy, others are central and communicate with many conspirators and others still may know only two conspirators but be a bridge between important sections or groupings of the conspiracy…

Conspirators are often discerning, for some trust and depend each other, while others say little. Important information flows frequently through some links, trivial information through others. So we expand our simple connected graph model to include not only links, but their “importance.”

Return to our board-and-nails analogy. Imagine a thick heavy cord between some nails and fine light thread between others. Call the importance, thickness or heaviness of a link its weight. Between conspirators that never communicate the weight is zero. The “importance” of communication passing through a link is difficult to evaluate apriori, since its true value depends on the outcome of the conspiracy. We simply say that the “importance” of communication contributes to the weight of a link in the most obvious way; the weight of a link is proportional to the amount of important communication flowing across it. Questions about conspiracies in general won’t require us to know the weight of any link, since that changes from conspiracy to conspiracy.


Such a network will not be organized by a flow chart, nor would it ever produce a single coherent map of itself (without thereby hastening its own collapse). It is probably fairly acephalous, as a matter of course: if it had a single head (or a singular organizing mind which could survey and map the entirety), then every conspirator would be one step from the boss and a short two steps away from every other member of the conspiracy. A certain amount of centralization is necessary, in other words (otherwise there is no conspiracy), but too much centralization makes the system vulnerable.

To use The Wire as a ready-to-hand example, imagine if Avon Barksdale was communicating directly with Bodie. All you would ever have to do is turn one person — any person — and you would be one step away from the boss, whose direct connection to everyone else in the conspiracy would allow you to sweep them all up at once. Obviously, no effective conspiracy would ever function this way. Remember Stringer Bell’s“is you taking notes on a criminal fucking conspiracy?” To function effectively, the primary authority has to be disassociated from all other members of the conspiracy, layers of mediation which have to be as opaque as possible to everyone concerned (which a paper trail unhelpfully clarifies). But while the complexity of these linkages shield the directing authority from exposure, they also limit Avon Barksdale’s ability to control what’s going on around him. Businesses run on their paperwork! And the more walls you build around him, the less he might be able to trust his lieutenants, and the less they’ll require (or tolerate) him.

This, Assange reasons, is a way to turn a feature into a bug. And his underlying insight is simple and, I think, compelling: while an organization structured by direct and open lines of communication will be much more vulnerable to outside penetration, the more opaque it becomes to itself (as a defense against the outside gaze), the less able it will be to “think” as a system, to communicate with itself. The more conspiratorial it becomes, in a certain sense, the less effective it will be as a conspiracy. The more closed the network is to outside intrusion, the less able it is to engage with that which is outside itself (true hacker theorizing).

His thinking is not quite as abstract as all that, of course; as he quite explicitly notes, he is also understanding the functioning of the US state by analogy with successful terrorist organizations. If you’ve seen The Battle of Algiers, for example, think of how the French counter-terrorist people work to produce an organizational flow chart of the Algerian resistance movement: since they had overwhelming military superiority, their inability to crush the FLN resided in their inability to find it, an inability which the FLN strategically works to impede by decentralizing itself. Cutting off one leg of the octopus, the FLN realized, wouldn’t degrade the system as a whole if the legs all operated independently. The links between the units were the vulnerable spots for the system as a whole, so those were most closely and carefully guarded and most hotly pursued by the French. And while the French won the battle of Algiers, they lost the war, because they adopted the tactics Assange briefly mentions only to put aside:

How can we reduce the ability of a conspiracy to act?…We can split the conspiracy, reduce or eliminating important communication between a few high weight links or many low weight links. Traditional attacks on conspiratorial power groupings, such as assassination, have cut high weight links by killing, kidnapping, blackmailing or otherwise marginalizing or isolating some of the conspirators they were connected to.

This is the US’s counterterrorism strategy — find the men in charge and get ’em — but it’s not what Assange wants to do: such a program would isolate a specific version of the conspiracy and attempt to destroy the form of it that already exists, which he argues will have two important limitations. For one thing, by the time such a conspiracy has a form which can be targeted, its ability to function will be quite advanced. As he notes:

“A man in chains knows he should have acted sooner for his ability to influence the actions of the state is near its end. To deal with powerful conspiratorial actions we must think ahead and attack the process that leads to them since the actions themselves can not be dealt with.”

By the time a cancer has metastasized, in other words, antioxidents are no longer effective, and even violent chemotherapy is difficult. It’s better, then, to think about how conspiracies come into existence so as to prevent them from forming in the first place (whereas if you isolate the carcinogen early enough, you don’t need to remove the tumor after the fact). Instead, he wants to address the aggregative process itself, by impeding the principle of its reproduction: rather than trying to expose and cut particular links between particular conspirators (which does little to prevent new links from forming and may not disturb the actual functioning of the system as a whole), he wants to attack the “total conspiratorial power” of the entire system by figuring out how to reduce its total ability to share and exchange information among itself, in effect, to slow down its processing power. As he puts it:

Conspiracies are cognitive devices. They are able to outthink the same group of individuals acting alone Conspiracies take information about the world in which they operate (the conspiratorial environment), pass through the conspirators and then act on the result. We can see conspiracies as a type of device that has inputs (information about the environment), a computational network (the conspirators and their links to each other) and outputs (actions intending to change or maintain the environment).

Because he thinks of the conspiracy as a computational network, he notes in an aside that one way to weaken its cognitive ability would be to degrade the quality of its information:

Since a conspiracy is a type of cognitive device that acts on information acquired from its environment, distorting or restricting these inputs means acts based on them are likely to be misplaced. Programmers call this effect garbage in, garbage out. Usually the effect runs the other way; it is conspiracy that is the agent of deception and information restriction. In the US, the programmer’s aphorism is sometimes called “the Fox News effect”.

I’m not sure this is what he means, but it’s worth reflecting that the conspiracy’s ability to deceive others through propaganda can also be the conspiracy’s tendency to deceive itself by its own propaganda. So many people genuinely drink the Kool-Aid, after all. Would our super-spies in Afghanistan ever have been so taken in by the imposter Taliban guy if they didn’t, basically, believe their own line of propaganda, if they didn’t convince themselves — even provisionally — that we actually are winning the war against Talibothra? The same is true of WMD; while no one in possession of the facts could rationally conclude that Saddam Hussein then (or Iran now) are actually, positively in pursuit of WMD’s, this doesn’t mean that the people talking about ticking time bombs don’t actually believe that they are. It just means they are operating with bad information about the environment. Sometimes this works in their favor, but sometimes it does not: if Obama thinks Afghanistan is winnable, it may sink his presidency, for example, while the belief of his advisors that the economy would recover if the government rescued only the banks almost certainly lost the midterm elections for the Democrats (and was the death-knell for so many of the Blue Dogs who were driving that particular policy choice). Whether this actually hurts the conspiracy is unclear; those Blue Dogs might have lost their seats, but most of them will retire from public service to cushy jobs supported by the sectors they supported while they were in public service. And lots of successful politicians do nothing but fail.

This is however, not where Assange’s reasoning leads him. He decides, instead, that the most effective way to attack this kind of organization would be to make “leaks” a fundamental part of the conspiracy’s information environment. Which is why the point is not that particular leaks are specifically effective. Wikileaks does not leak something like the “Collateral Murder” video as a way of putting an end to that particular military tactic; that would be to target a specific leg of the hydra even as it grows two more. Instead, the idea is that increasing the porousness of the conspiracy’s information system will impede its functioning, that the conspiracy will turn against itself in self-defense, clamping down on its own information flows in ways that will then impede its own cognitive function. You destroy the conspiracy, in other words, by making it so paranoid of itself that it can no longer conspire:

The more secretive or unjust an organization is, the more leaks induce fear and paranoia in its leadership and planning coterie. This must result in minimization of efficient internal communications mechanisms (an increase in cognitive “secrecy tax”) and consequent system-wide cognitive decline resulting in decreased ability to hold onto power as the environment demands adaption. Hence in a world where leaking is easy, secretive or unjust systems are nonlinearly hit relative to open, just systems. Since unjust systems, by their nature induce opponents, and in many places barely have the upper hand, mass leaking leaves them exquisitely vulnerable to those who seek to replace them with more open forms of governance.

The leak, in other words, is only the catalyst for the desired counter-overreaction; Wikileaks wants to provoke the conspiracy into turning off its own brain in response to the threat. As it tries to plug its own holes and find the leakers, he reasons, its component elements will de-synchronize from and turn against each other, de-link from the central processing network, and come undone. Even if all the elements of the conspiracy still exist, in this sense, depriving themselves of a vigorous flow of information to connect them all together as a conspiracy prevents them from acting as a conspiracy. As he puts it:

If total conspiratorial power is zero, then clearly there is no information flow between the conspirators and hence no conspiracy. A substantial increase or decrease in total conspiratorial power almost always means what we expect it to mean; an increase or decrease in the ability of the conspiracy to think, act and adapt…An authoritarian conspiracy that cannot think is powerless to preserve itself against the opponents it induces.

In this sense, most of the media commentary on the latest round of leaks has totally missed the point. After all, why are diplomatic cables being leaked? These leaks are not specifically about the war(s) at all, and most seem to simply be a broad swath of the everyday normal secrets that a security state keeps from all but its most trusted hundreds of thousands of people who have the right clearance. Which is the point: Assange is completely right that our government has conspiratorial functions. What else would you call the fact that a small percentage of our governing class governs and acts in our name according to information which is freely shared amongst them but which cannot be shared amongst their constituency? And we all probably knew that this was more or less the case; anyone who was surprised that our embassies are doing dirty, secretive, and disingenuous political work as a matter of course is naïve. But Assange is not trying to produce a journalistic scandal which will then provoke red-faced government reforms or something, precisely because no one is all that scandalized by such things any more. Instead, he is trying to strangle the links that make the conspiracy possible, to expose the necessary porousness of the American state’s conspiratorial network in hopes that the security state will then try to shrink its computational network in response, thereby making itself dumber and slower and smaller.

Early responses seem to indicate that Wikileaks is well on its way to accomplishing some of its goals. As Simon Jenkins put it (in a great piece in its own right) “The leaks have blown a hole in the framework by which states guard their secrets.” And if the diplomats quoted by Le Monde are right that, “we will never again be able to practice diplomacy like before,” this is exactly what Wikileaks was trying to do. It’s sort of pathetic hearing diplomats and government shills lament that the normal work of “diplomacy” will now be impossible, like complaining that that the guy boxing you out is making it hard to get rebounds. Poor dears. If Assange is right to point out that his organization has accomplished more state scrutiny than the entire rest of the journalistic apparatus combined, he’s right but he’s also deflecting the issue: if Wikileaks does some of the things that journalists do, it also does some very different things. Assange, as his introductory remarks indicate quite clearly, is in the business of “radically shift[ing] regime behavior.”

If Wikileaks is a different kind of organization than anything we’ve ever seen before, it’s interesting to see him put himself in line with more conventional progressivism. Assange isn’t off base, after all, when he quotes Theodore Roosevelt’s words from his 1912 Progressive party presidential platform as the epigraph to the first essay; Roosevelt realized a hundred years ago that “Behind the ostensible government sits enthroned an invisible government owing no allegiance and acknowledging no responsibility to the people,” and it was true, then too, that “To destroy this invisible government, to befoul this unholy alliance between corrupt business and corrupt politics is the first task of statesmanship.” Assange is trying to shit all over this unholy alliance in ways that the later and more radical Roosevelt would likely have commended.

It’s worth closing, then, by recalling that Roosevelt also coined the term “muckraker,” and that he did so as a term of disparagement. Quoting from Pilgrim’s Progress, he cited the example of the “Muck-Raker” who could only look down, whose perspective was so totally limited to the “muck” that it was his job to rake, he had lost all ability to see anything higher. Roosevelt, as always, is worth quoting:

In Bunyan’s Pilgrim’s Progress you may recall the description of the Man with the Muck-rake, the man who could look no way but downward, with the muckrake in his hand; who was offered a celestial crown for his muck-rake, but who would neither look up nor regard the crown he was offered, but continued to rake to himself the filth of the floor…the Man with the Muck-rake is set forth as the example of him whose vision is fixed on carnal instead of on spiritual things. Yet he also typifies the man who in this life consistently refuses to see aught that is lofty, and fixes his eyes with solemn intentness only on that which is vile and debasing. Now, it is very necessary that we should not flinch from seeing what is s vile and debasing. There is filth on the floor, and it must be scraped up with the muck-rake; and there are times and places where this service is the most needed of all the services that can be performed. But the man who never does anything else, who never thinks or speaks or writes save of his feats with the muck-rake, speedily becomes, not a help to society, not an incitement to good, but one of the most potent forces for evil. There are, in the body politic, economic, and social, many and grave evils, and there is urgent necessity for the sternest war upon them. There should be relentless exposure of and attack upon every evil man, whether politician or business man, every evil practice, whether in politics, in business, or in social life. I hail as a benefactor every writer or speaker, every man who, on the platform, or in book, magazine, or newspaper, with merciless severity makes such attack, provided always that he in his turn remembers that the attack is of use only if it is absolutely truthful…

Roosevelt was many things when he uttered those words, but he was not wrong. There is a certain vicious amorality about the Mark Zuckerberg-ian philosophy that all transparency is always and everywhere a good thing, particularly when it’s uttered by the guy who’s busily monetizing your radical transparency. And the way most journalists “expose” secrets as a professional practice — to the extent that they do — is just as narrowly selfish: because they publicize privacy only when there is profit to be made in doing so, they keep their eyes on the valuable muck they are raking, and learn to pledge their future professional existence on a continuing and steady flow of it. In muck they trust.

According to his essay, Julian Assange is trying to do something else. Because we all basically know that the US state — like all states — is basically doing a lot of basically shady things basically all the time, simply revealing the specific ways they are doing these shady things will not be, in and of itself, a necessarily good thing. In some cases, it may be a bad thing, and in many cases, the provisional good it may do will be limited in scope. The question for an ethical human being — and Assange always emphasizes his ethics — has to be the question of what exposing secrets will actually accomplish, what good it will do, what better state of affairs it will bring about. And whether you buy his argument or not, Assange has a clearly articulated vision for how Wikileaks’ activities will “carry us through the mire of politically distorted language, and into a position of clarity,” a strategy for how exposing secrets will ultimately impede the production of future secrets. The point of Wikileaks — as Assange argues — is simply to make Wikileaks unnecessary.

http://zunguzungu.wordpress.com/2010/11 ... onspiracy-“to-destroy-this-invisible-government”/


that last paragraph, mac -- nagel, kopf, und so weiter.

*
"Teach them to think. Work against the government." – Wittgenstein.
User avatar
vanlose kid
 
Posts: 3182
Joined: Wed Oct 17, 2007 7:44 pm
Blog: View Blog (0)

Re: The Wikileaks Question

Postby JackRiddler » Fri Dec 03, 2010 6:11 pm

Damn that Cockburn, but when he hits, he hits long:

Weekend Edition
December 3 -5, 2010
CounterPunch Diary
Julian Assange: Wanted by the Empire, Dead or Alive

By ALEXANDER COCKBURN

The American airwaves quiver with the screams of parlor assassins howling for Julian Assange's head. Jonah Goldberg, contributor to the National Review, asks in his syndicated column, "Why wasn't Assange garroted in his hotel room years ago?" Sarah Palin wants him hunted down and brought to justice, saying: "He is an anti-American operative with blood on his hands."

Assange can survive these theatrical blusters. A tougher question is how he will fare at the hands of the US government, which is hopping mad. The US attorney general, Eric Holder, has announced that the Justice Department and Pentagon are conducting "an active, ongoing criminal investigation" into the latest Assange-facilitated leak under Washington's Espionage Act.

Asked how the US could prosecute Assange, a non-US citizen, Holder said, "Let me be clear. This is not saber-rattling," and vowed "to swiftly close the gaps in current US legislation…"

In other words the espionage statute is being rewritten to target Assange,


-- which is impossible without outlawing press freedom and voiding all limits to jurisdiction --

and in short order, if not already, President Obama – who as a candidate pledged "transparency" in government - will sign an order okaying the seizing of Assange and his transport into the US jurisdiction. Render first, fight the habeas corpus lawsuits later.


Though I can't imagine the US wants Assange in a US court. Think about it.

Interpol, the investigative arm of the International Criminal Court at The Hague, has issued a fugitive notice for Assange. He's wanted in Sweden for questioning in two alleged sexual assaults, one of which seems to boil down to a charge of unsafe sex and failure to phone his date the following day.

This prime accuser, Anna Ardin has, according to Israel Shamir, writing on this CounterPunch site, "ties to the US-financed anti-Castro and anti-communist groups. She published her anti-Castro diatribes in the Swedish-language publication Revista de Asignaturas Cubanas put out by Misceláneas de Cuba…Note that Ardin was deported from Cuba for subversive activities."

It's certainly not conspiracism to suspect that the CIA has been at work in fomenting these Swedish accusations. As Shamir reports, "The moment Julian sought the protection of Swedish media law, the CIA immediately threatened to discontinue intelligence sharing with SEPO, the Swedish Secret Service."

The CIA has no doubt also pondered the possibility of pushing Assange off a bridge or through a high window (a mode of assassination favored by the Agency from the earliest days) and has sadly concluded that it's too late for this sort of executive solution.

The irony is that the thousands of diplomatic communications released by WikiLeaks contain no earth-shaking disclosures that undermine the security of the American empire. The bulk of them merely illustrate the well-known fact that in every capital city round the world there is a building known as the U.S. Embassy inhabited by people whose prime function is to vanquish informed assessment of local conditions with swaddling cloths of ignorance and prejudice instilled in them by what passes for higher education in the United States, whose governing elites are now more ignorant of what is really happening in the outside world that at any time in the nation’s history.

The reports in the official press invite us to be stunned at the news that the King of Saudi Arabia wishes Iran was wiped off the map, that the US uses diplomats as spies, that Afghanistan is corrupt, also that corruption is not unknown in Russia! These press reports foster the illusion that U.S. embassies are inhabited by intelligent observers zealously remitting useful information to their superiors in Washington DC . To the contrary, diplomats – assuming they have the slightest capacity for intelligent observation and analysis -- soon learn to advance their careers by sending reports to Foggy Bottom carefully tuned to the prejudices of the top State Department and White House brass, powerful members of Congress and major players throughout the bureaucracies. Remember that as the Soviet Union slid towards extinction, the US Embassy in Moscow was doggedly supplying quavering reports of a puissant Empire of Evil still meditating whether to invade Western Europe!

This is not to downplay the great importance of this latest batch of WikiLeaks. Millions in America and around the world have been given a quick introductory course in international relations and the true arts of diplomacy – not least the third-rate, gossipy prose with which the diplomats rehearse the arch romans à clef they will write when they head into retirement.

Years ago Rebecca West wrote in her novel The Thinking Reed of a British diplomat who, "even when he was peering down a woman's dress at her breasts managed to look as though he was thinking about India." In the updated version, given Hillary Clinton's orders to the State Department, the US envoy, pretending to admire the figure of the charming French cultural attaché, would actually be thinking how to steal her credit card information, obtain a retinal scan, her email passwords and frequent flier number.

There are also genuine disclosures of great interest, some of them far from creditable to the establishment US press. On our CounterPunch site last week Gareth Porter identified a diplomatic cable from last February released by WikiLeaks which provides a detailed account of how Russian specialists on the Iranian ballistic missile program refuted the US suggestion that Iran has missiles that could target European capitals or that Iran intends to develop such a capability. Porter points out that:

"Readers of the two leading US newspapers never learned those key facts about the document. The New York Times and Washington Post reported only that the United States believed Iran had acquired such missiles - supposedly called the BM-25 - from North Korea. Neither newspaper reported the detailed Russian refutation of the US view on the issue or the lack of hard evidence for the BM-25 from the US side.

"The Times, which had obtained the diplomatic cables not from WikiLeaks but from the Guardian, according to a Washington Post story Monday, did not publish the text of the cable. The Times story said the newspaper had made the decision not to publish 'at the request of the Obama administration'. That meant that its readers could not compare the highly distorted account of the document in the Times story against the original document without searching the Wikileaks website."


Distaste among the "official" US press for WikiLeaks has been abundantly apparent from the first of the two big releases of documents pertaining to the wars in Iraq and Afghanistan. The New York Times managed the ungainly feat of publishing some of the leaks while simultaneously affecting to hold its nose, and while publishing a mean-spirited hatchet job on Assange by its reporter John F Burns, a man with a well burnished record in touting the various agendas of the US government.

There have been cheers for Assange and WikiLeaks from such famed leakers as Daniel Ellsberg, but to turn on one's television is to eavesdrop on the sort of fury that Lord Haw-Haw – aka the Irishman William Joyce, doing propaganda broadcasts from Berlin -- used to provoke in Britain in World War II. As Glenn Greenwald wrote in his column on the Salon site:

"On CNN, Wolf Blitzer was beside himself with rage over the fact that the US government had failed to keep all these things secret from him... Then - like the Good Journalist he is - Blitzer demanded assurances that the Government has taken the necessary steps to prevent him, the media generally and the citizenry from finding out any more secrets: 'Do we know yet if they've [done] that fix? In other words, somebody right now who has top secret or secret security clearance can no longer download information onto a CD or a thumb drive? Has that been fixed already?' The central concern of Blitzer - one of our nation's most honored 'journalists' - is making sure that nobody learns what the US Government is up to."


These latest WikiLeaks files contains some 261,000,000 words - about 3,000 books. They display the entrails of the American Empire. As Israel Shamir wrote here last week, "The files show US political infiltration of nearly every country, even supposedly neutral states such as Sweden and Switzerland. US embassies keep a close watch on their hosts. They have penetrated the media, the arms business, oil, intelligence, and they lobby to put US companies at the head of the line."

Will this vivid record of imperial outreach in the early 21st century soon be forgotten? Not if some competent writer offers a readable and politically vivacious redaction.

But a warning: in November 1979 Iranian students seized an entire archive of the State Department, the CIA and the Defense Intelligence Agency (DIA) at the American embassy in Tehran. Many papers that were shredded were laboriously reassembled. These secrets concerned far more than Iran. The Tehran embassy, which served as a regional base for the CIA, held records involving secret operations in many countries, notably Israel, the Soviet Union, Turkey, Pakistan, Saudi Arabia, Kuwait, Iraq and Afghanistan.

Beginning in 1982, the Iranians published some 60 volumes of these CIA reports and other US government documents from the Tehran archive, collectively entitled Documents From the US Espionage Den. As Edward Jay Epstein, a historian of US intelligence agencies, wrote years ago, "Without a doubt, these captured records represent the most extensive loss of secret data that any superpower has suffered since the end of the Second World War."

In fact the Tehran archive truly was a devastating blow to US national security. It contained vivid portraits of intelligence operations and techniques, the complicity of US journalists with US government agencies, the intricacies of oil diplomacy. The volumes are in some university libraries here. Are they read? By a handful of specialists. The inconvenient truths were swiftly buried – and perhaps the WikiLeaks files will soon be fade from memory too, joining the inspiring historical archive of intelligence coups of the left.


I should honor here “Spies for Peace” – the group of direct-action British anarchists and kindred radicals associated with the Campaign for Nuclear Disarmament and Bertrand Russell’s Committee of 100 who, in 1963, broke into a secret government bunker, Regional Seat of Government Number 6 (RSG-6) at Warren Row, near Reading, where they photographed and copied documents, showing secret government preparations for rule after a nuclear war. They distributed a pamphlet along with copies of relevant documents to the press, stigmatizing the “small group of people who have accepted thermonuclear war as a probability, and are consciously and carefully planning for it. ... They are quietly waiting for the day the bomb drops, for that will be the day they take over.” There was a big uproar, and then the Conservative government of the day issued a D-notice forbidding any further coverage in the press. The cops and intelligence services hunted long and hard for the spies for peace, and caught nary a one.

And Assange? Hopefully he will have a long reprieve from premature burial. Ecuador offered him sanctuary until the US Embassy in Quito gave the president a swift command and the invitation was rescinded. Switzerland? Istanbul? Hmmm. As noted above, he should, at the least, view with caution women eagerly inviting his embraces and certainly stay away from overpasses, bridges, and open windows.

In 1953 the CIA distributed to its agents and operatives a killer's training manual (made public in 1997) full of hands-on advice:

"The most efficient accident, in simple assassination, is a fall of 75 feet or more onto a hard surface. Elevator shafts, stair wells, unscreened windows and bridges will serve... The act may be executed by sudden, vigorous [excised] of the ankles, tipping the subject over the edge. If the assassin immediately sets up an outcry, playing the 'horrified witness', no alibi or surreptitious withdrawal is necessary."


.

http://www.guardian.co.uk/commentisfree ... ower/print

WikiLeaks is holding US global power to account

The WikiLeaks avalanche has exposed floundering imperial rule to scrutiny – and its reliance on dictatorship and deceit

Seumas Milne
guardian.co.uk, Wednesday 1 December 2010 22.14 GMT


Official America's reaction to the largest leak of confidential government files in history is tipping over towards derangement. What the White House initially denounced as a life-threatening "criminal" act and Hillary Clinton branded an "attack on the international community" has been taken a menacing stage further by the newly emboldened Republican right.

WikiLeaks' release of 250,000 United States embassy cables – shared with the Guardian and other international newspapers – was an act of terrorism, congressman Peter King declared. Sarah Palin called for its founder Julian Assange to be hunted down as an "anti-American operative with blood on his hands", while former presidential candidate Mike Huckabee has demanded that whoever leaked the files should be executed for treason.

Not much truck with freedom of information, then, in the land of the free. In reality, most of the leaked material is fairly low-level diplomatic gossip, which naturally reflects the US government's view of the world, and crucially doesn't include reports with the highest security classification.

When it comes to actual criminality and blood, nothing quite matches WikiLeaks' earlier revelations about the wars in Iraq and Afghanistan, with their chilling records of US collusion with industrial-scale torture and death squads, and killings of Afghan civilians by rampaging Nato troops.

Nor, of course, is what US diplomats write necessarily true. But beyond the dispatches on Prince Andrew's crass follies and Colonel Gaddafi's "weirdness", the leaks do paint a revealing picture of an overstretched imperial system at work, as its emissaries struggle to keep satraps in line and enemies at bay.


Much has been made of the appalling damage supposedly done to the delicate business of diplomacy. No doubt the back channels will survive the shock of daylight. But in any case the United States is the centre of a global empire, a state with a military presence in most countries which arrogates to itself the role of world leader and policeman.

When genuine checks on how it exercises that entirely undemocratic power are so weak at home, let alone in the rest of the world it still dominates, it's both inevitable and right that people everywhere will try to find ways to challenge and hold it to account.

After the Russian revolution, the secret tsarist treaties with Britain and France were published to expose and challenge the colonial carve-ups of the day. In the 1970s, the publication of the Pentagon papers cut the ground from beneath the US case for the Vietnam war. Now technology is allowing such exposures on a far grander scale.

Clinton complained this week that the leaks "tore at the fabric" of government and good relations between states. Far more damaging is her own instruction to ordinary US diplomats to violate the treaties the US government has itself signed and spy on UN officials, along with any other public figure they happen to meet: down to their credit card details, biometric records – and even frequent-flyer account numbers.

Not surprisingly, US allies and client states come out badly from the leaks. The British government is once again shown to kowtow to US demands for no gain, first promising to "put measures in place" to protect American interests in the Iraq war inquiry, and then colluding in a plan to deceive parliament and allow the US to keep banned cluster-bombs in its bases on Diego Garcia (in exchange for which Gordon Brown was firmly rebuffed by the US over the extradition of the British computer hacker Gary McKinnon).

But it is the relentless US mobilisation against Iran that provides the most ominous thread in the leaked despatches. The reports that the king of Saudi Arabia has called on the US to "cut off the head of the snake" and launch what would be a catastrophic attack on Tehran, echoed by his fellow potentates in Jordan, Egypt, the United Arab Emirates, Bahrain – and, of course, most dangerously by Israel – were yesterday hailed by the Times as evidence of a new "international consensus" against Iran.

It is nothing of the sort. It simply underlines the fact that after more than half a century the US still has to rely on laughably unrepresentative autocracies and dictatorships to shore up its domination of the Middle East and its resources. While Arab emirs and election-rigging presidents fear the influence of Iran and only wearily bring themselves to raise the Palestinians with their imperial sponsors, their people regard Israel and the US itself as the threats to their security and strongly support Iran's nuclear programme – as the most recent US-conducted poll in the region demonstrated.

The confirmation in the cables that US military forces are indeed secretly operating on Pakistan's territory and that Yemen's president Abdullah Saleh felt it necessary to tell General Petraeus this year that he would carry on lying about US military operations against jihadists in his country – "we'll continue saying they are our bombs, not yours" – only emphasises how weak and illegitimate US props and allies are across the Muslim world.

But it's those who have helped to expose such lethal campaigns who are now charged with "putting lives at risk". Assange is threatened with ever more dire retribution and Bradley Manning, the 23-year-old US army intelligence analyst accused of leaking the Iraq, Afghanistan and diplomatic cables is already facing up to 52 years in prison. Meanwhile the aircrews of two US Apache helicopters who killed a dozen unarmed civilians in Iraq in 2007 as they laughed and crowed – the video of which Manning is alleged to have leaked – were commended by US central command for their "sound judgment".

Manning is reported to have said that the latest leaks show how "the first world exploits the third". But they also cast a powerful light on how the US empire has begun to flounder as the post-cold war unipolar moment has passed, former dependable client states like Turkey go their own way and independent regional powers such as China start to make their global presence felt.

By making available Washington's own account of its international dealings WikiLeaks has opened some of the institutions of global power to scrutiny and performed a democratic service in the process. Its next target is said to be the leviathan of the banks – bring it on.

guardian.co.uk © Guardian News and Media Limited 2010
We meet at the borders of our being, we dream something of each others reality. - Harvey of R.I.

To Justice my maker from on high did incline:
I am by virtue of its might divine,
The highest Wisdom and the first Love.

TopSecret WallSt. Iraq & more
User avatar
JackRiddler
 
Posts: 16007
Joined: Wed Jan 02, 2008 2:59 pm
Location: New York City
Blog: View Blog (0)

Re: The Wikileaks Question

Postby JackRiddler » Fri Dec 03, 2010 6:31 pm

The Fucking Library of Congress.

http://gawker.com/5705492/library-of-co ... -wikileaks

Library of Congress Is Latest Government Institution to Block Wikileaks

The Library of Congress has blocked access to the Wikileaks site on its staff computers and on the wireless network that visitors use, two sources tell TPM.

The error message reportedly reads:

Ad or Website blocked by LC DNSBH. Advertisements or websites that may be malicious are blocked.

If this message appears in lieu of an advertisement (i.e., on part of the page), the advertisement site may be malicious. However the website is safe to use.

If this message appears on a page by itself, the website is blocked due to potential malicious content.

More information - LC IT Security

A spokesman for the library could not immediately comment, but expects to have a statement shortly.

The library is a governmental institution and serves as the research arm for Congress. It was established in 1800 and, when it was burned down by the British in 1814, Thomas Jefferson donated his own personal library to replace it. (Not for free, though; Congress paid $23,950 for the books.) It has grown ever since and, according to the library, it has "more than 144 million items including more than 33 million cataloged books and other print materials in 460 languages; more than 63 million manuscripts; the largest rare book collection in North America; and the world's largest collection of legal materials, films, maps, sheet music and sound recordings."

The State and Commerce departments have also reportedly told their employees not to look at the Wikileaks cables, while the Department of Education reportedly blocked it entirely.
Republished with permission from TalkingPointsMemo.com. Authored by Rachel Slajda. Photo via Wikipedia user Raul654. TPM provides breaking news, investigating reporting and smart analysis of politics.
We meet at the borders of our being, we dream something of each others reality. - Harvey of R.I.

To Justice my maker from on high did incline:
I am by virtue of its might divine,
The highest Wisdom and the first Love.

TopSecret WallSt. Iraq & more
User avatar
JackRiddler
 
Posts: 16007
Joined: Wed Jan 02, 2008 2:59 pm
Location: New York City
Blog: View Blog (0)

Re: The Wikileaks Question

Postby wintler2 » Sat Dec 04, 2010 6:38 am

Has this been posted elsewhere? Answers the 'where is the old material' question amongst others, and flags Amazon (or its US jurisdiction) as having a .free speech deficit'.

Q&A Assenge with Guardian readers 3 December.


Fwoggie
I'll start the ball rolling with a question. You're an Australian passport holder - would you want return to your own country or is this now out of the question due to potentially being arrested on arrival for releasing cables relating to Australian diplomats and polices?
Julian Assange small

Julian Assange:
I am an Australian citizen and I miss my country a great deal. However, during the last weeks the Australian prime minister, Julia Gillard, and the attorney general, Robert McClelland, have made it clear that not only is my return is impossible but that they are actively working to assist the United States government in its attacks on myself and our people. This brings into question what does it mean to be an Australian citizen - does that mean anything at all? Or are we all to be treated like David Hicks at the first possible opportunity merely so that Australian politicians and diplomats can be invited to the best US embassy cocktail parties.


girish89
How do you think you have changed world affairs?
And if you call all the attention you've been given-credit ... shouldn't the mole or source receive a word of praise from you?

Julian Assange:
For the past four years one of our goals has been to lionise the source who take the real risks in nearly every journalistic disclosure and without whose efforts, journalists would be nothing. If indeed it is the case, as alleged by the Pentagon, that the young soldier - Bradley Manning - is behind some of our recent disclosures, then he is without doubt an unparalleled hero.



Daithi
Have you released, or will you release, cables (either in the last few days or with the Afghan and Iraq war logs) with the names of Afghan informants or anything else like so?
Are you willing to censor (sorry for using the term) any names that you feel might land people in danger from reprisals??
By the way, I think history will absolve you. Well done!!!

Julian Assange:
WikiLeaks has a four-year publishing history. During that time there has been no credible allegation, even by organisations like the Pentagon that even a single person has come to harm as a result of our activities. This is despite much-attempted manipulation and spin trying to lead people to a counter-factual conclusion. We do not expect any change in this regard.



distrot
The State Dept is mulling over the issue of whether you are a journalist or not. Are you a journalist? As far as delivering information that someone [anyone] does not want seen is concerned, does it matter if you are a 'journalist' or not?
Julian Assange small

Julian Assange:
I coauthored my first nonfiction book by the time I was 25. I have been involved in nonfiction documentaries, newspapers, TV and internet since that time. However, it is not necessary to debate whether I am a journalist, or how our people mysteriously are alleged to cease to be journalists when they start writing for our organisaiton. Although I still write, research and investigate my role is primarily that of a publisher and editor-in-chief who organises and directs other journalists.



achanth
Mr Assange,
have there ever been documents forwarded to you which deal with the topic of UFOs or extraterrestrials?

Julian Assange:
Many weirdos email us about UFOs or how they discovered that they were the anti-christ whilst talking with their ex-wife at a garden party over a pot-plant. However, as yet they have not satisfied two of our publishing rules.
1) that the documents not be self-authored;
2) that they be original.
However, it is worth noting that in yet-to-be-published parts of the cablegate archive there are indeed references to UFOs.



gnosticheresy
What happened to all the other documents that were on Wikileaks prior to these series of "megaleaks"? Will you put them back online at some stage ("technical difficulties" permitting)?
Julian Assange small

Julian Assange:
Many of these are still available at mirror.wikileaks.info and the rest will be returning as soon as we can find a moment to do address the engineering complexities. Since April of this year our timetable has not been our own, rather it has been one that has centred on the moves of abusive elements of the United States government against us. But rest assured I am deeply unhappy that the three-and-a-half years of my work and others is not easily available or searchable by the general public.



CrisShutlar
Have you expected this level of impact all over the world? Do you fear for your security?
Julian Assange small

Julian Assange:
I always believed that WikiLeaks as a concept would perform a global role and to some degree it was clear that is was doing that as far back as 2007 when it changed the result of the Kenyan general election. I thought it would take two years instead of four to be recognised by others as having this important role, so we are still a little behind schedule and have much more work to do. The threats against our lives are a matter of public record, however, we are taking the appropriate precautions to the degree that we are able when dealing with a super power.



JAnthony
Julian.
I am a former British diplomat. In the course of my former duties I helped to coordinate multilateral action against a brutal regime in the Balkans, impose sanctions on a renegade state threatening ethnic cleansing, and negotiate a debt relief programme for an impoverished nation. None of this would have been possible without the security and secrecy of diplomatic correspondence, and the protection of that correspondence from publication under the laws of the UK and many other liberal and democratic states. An embassy which cannot securely offer advice or pass messages back to London is an embassy which cannot operate. Diplomacy cannot operate without discretion and the
protection of sources. This applies to the UK and the UN as much as the US.
In publishing this massive volume of correspondence, Wikileaks is not highlighting specific cases of wrongdoing but undermining the entire process of diplomacy. If you can publish US cables then you can publish UK telegrams and UN emails.
My question to you is: why should we not hold you personally responsible when next an international crisis goes unresolved because diplomats cannot function.

Julian Assange:
If you trim the vast editorial letter to the singular question actually asked, I would be happy to give it my attention.



cargun
Mr Assange,
Can you explain the censorship of identities as XXXXX's in the revealed cables? Some critical identities are left as is, whereas some are XXXXX'd. Some cables are partially revealed. Who can make such critical decisons, but the US gov't? As far as we know your request for such help was rejected by the State department. Also is there an order in the release of cable or are they randomly selected?
Thank you.

Julian Assange:
The cables we have release correspond to stories released by our main stream media partners and ourselves. They have been redacted by the journalists working on the stories, as these people must know the material well in order to write about it. The redactions are then reviewed by at least one other journalist or editor, and we review samples supplied by the other organisations to make sure the process is working.


rszopa
Annoying as it may be, the DDoS seems to be good publicity (if anything, it adds to your credibility). So is getting kicked out of AWS. Do you agree with this statement? Were you planning for it?
Thank you for doing what you are doing.

Julian Assange:
Since 2007 we have been deliberately placing some of our servers in jurisdictions that we suspected suffered a free speech deficit inorder to separate rhetoric from reality. Amazon was one of these cases.


abbeherrera
You started something that nobody can stop. The Beginning of a New World. Remember, that community is behind you and support you (from Slovakia).
Do you have leaks on ACTA?

Julian Assange:
Yes, we have leaks on the Anti-Counterfeiting Trade Agreement, a trojan horse trade agreement designed from the very beginning to satisfy big players in the US copyright and patent industries. In fact, it was WikiLeaks that first drew ACTA to the public's attention - with a leak.


people1st
Tom Flanagan, a [former] senior adviser to Canadian Prime Minister recently stated "I think Assange should be assassinated ... I think Obama should put out a contract ... I wouldn't feel unhappy if Assange does disappear."
How do you feel about this?

Julian Assange:
It is correct that Mr. Flanagan and the others seriously making these statements should be charged with incitement to commit murder.


Isopod
Julian, why do you think it was necessary to "give Wikileaks a face"? Don't you think it would be better if the organization was anonymous?
This whole debate has become very personal and reduced on you - "Julian Assange leaked documents", "Julian Assange is a terrorist", "Julian Assange alledgedly raped a woman", "Julian Assange should be assassinated", "Live Q&A qith Julian Assange" etc. Nobody talks about Wikileaks as an organization anymore. Many people don't even realize that there are other people behind Wikileaks, too.
And this, in my opinion, makes Wikileaks vulnerable because this enables your opponents to argue ad hominem. If they convince the public that you're an evil, woman-raping terrorist, then Wikileaks' credibility will be gone. Also, with due respect for all that you've done, I think it's unfair to all the other brave, hard working people behind Wikileaks, that you get so much credit.

Julian Assange:
This is an interesting question. I originally tried hard for the organisation to have no face, because I wanted egos to play no part in our activities. This followed the tradition of the French anonymous pure mathematians, who wrote under the collective allonym, "The Bourbaki". However this quickly led to tremendous distracting curiosity about who and random individuals claiming to represent us. In the end, someone must be responsible to the public and only a leadership that is willing to be publicly courageous can genuinely suggest that sources take risks for the greater good. In that process, I have become the lightening rod. I get undue attacks on every aspect of my life, but then I also get undue credit as some kind of balancing force.

tburgi
Western governments lay claim to moral authority in part from having legal guarantees for a free press.
Threats of legal sanction against Wikileaks and yourself seem to weaken this claim.
(What press needs to be protected except that which is unpopular to the State? If being state-sanctioned is the test for being a media organization, and therefore able to claim rights to press freedom, the situation appears to be the same in authoritarian regimes and the west.)
Do you agree that western governments risk losing moral authority by
attacking Wikileaks?
Do you believe western goverments have any moral authority to begin with?
Thanks,
Tim Burgi
Vancouver, Canada


Julian Assange:
The west has fiscalised its basic power relationships through a web of contracts, loans, shareholdings, bank holdings and so on. In such an environment it is easy for speech to be "free" because a change in political will rarely leads to any change in these basic instruments. Western speech, as something that rarely has any effect on power, is, like badgers and birds, free. In states like China, there is pervasive censorship, because speech still has power and power is scared of it. We should always look at censorship as an economic signal that reveals the potential power of speech in that jurisdiction. The attacks against us by the US point to a great hope, speech powerful enough to break the fiscal blockade.

rajiv1857
Hi,
Is the game that you are caught up in winnable? Technically, can you keep playing hide and seek with the powers that be when services and service providers are directly or indirectly under government control or vulnerable to pressure - like Amazon?
Also, if you get "taken out" - and that could be technical, not necessarily physical - what are the alternatives for your cache of material?
Is there a 'second line' of activists in place that would continue the campaign?
Is your material 'dispersed' so that taking out one cache would not necessarily mean the end of the game?
Julian Assange small

Julian Assange:
The Cable Gate archive has been spread, along with significant material from the US and other countries to over 100,000 people in encrypted form. If something happens to us, the key parts will be released automatically. Further, the Cable Gate archives is in the hands of multiple news organisations. History will win. The world will be elevated to a better place. Will we survive? That depends on you.
logo2


That's it every one, thanks for all your questions and comments. Julian Assange is sorry that he can't answer every question but he has tried to cover as much territory as possible. Thanks for your patience with our earlier technical difficulties.
"Wintler2, you are a disgusting example of a human being, the worst kind in existence on God's Earth. This is not just my personal judgement.." BenD

Research question: are all god botherers authoritarians?
User avatar
wintler2
 
Posts: 2884
Joined: Sun Nov 12, 2006 3:43 am
Location: Inland SE Aus.
Blog: View Blog (0)

Re: The Wikileaks Question

Postby wintler2 » Sat Dec 04, 2010 7:52 am

John Pilger interviewed on ABC radio (mp3). He strongly defends Assenge, wikileaks and the significance of the leaks, cites muzzling of Spanish PM & hobbling of UKs Chilcott inquiry as important to know, pours scorn on craven Oz govt, moots popular campaign of support in Oz with Geoffrey Robertson.
"Wintler2, you are a disgusting example of a human being, the worst kind in existence on God's Earth. This is not just my personal judgement.." BenD

Research question: are all god botherers authoritarians?
User avatar
wintler2
 
Posts: 2884
Joined: Sun Nov 12, 2006 3:43 am
Location: Inland SE Aus.
Blog: View Blog (0)

Re: The Wikileaks Question

Postby seemslikeadream » Sat Dec 04, 2010 9:29 am

wintler2 wrote:John Pilger interviewed on ABC radio (mp3). He strongly defends Assenge, wikileaks and the significance of the leaks, cites muzzling of Spanish PM & hobbling of UKs Chilcott inquiry as important to know, pours scorn on craven Oz govt, moots popular campaign of support in Oz with Geoffrey Robertson.


Thanks wintler, another of my favs endorses Assange, my initial beliefs are verified again.

WikiLeaks Clash: Glenn Greenwald to Critic -- We Must Subvert and Shine Light on Secrecy Regimes That Spawn Evil
A spirited debate over the cause of ending hidden, secretive government.
December 3, 2010 |


JUAN GONZALEZ CO-HOST: WikiLeaks is under attack. The whistelblowing group’s website has effectively been killed just days after Amazon pulled the site from its servers following political pressure. Wikileaks.org went offline this morning for the third time this week in what the Guardian newspaper is calling "the biggest threat to its online presence yet."

A California-based internet hosting provider called EveryDNS dropped WikiLeaks last night, late last night. The company says it did so to prevent its other 500,000 customers from being affected by the intense cyber attacks targeted at WikiLeaks.

This morning, WikiLeaks—and the massive trove of secret diplomatic cables it has been publishing since Sunday—was only accessible online through a string of digits known as a DNS address.

Earlier this week, Joe Lieberman, the chair of the Senate committee on Homeland Security, called for any organization helping to sustain WikiLeaks to immediately terminate its relationship with them.

Meanwhile, the State Department has blocked all its employees from accessing the site and is warning all government workers not to read the cables, even at home.

WikiLeaks founder Julian Assange told The Guardian the developments are an example of the, quote, "privatization of state censorship." Assange said, quote, "These attacks will not stop our mission, but should be setting off alarm bells about the rule of law in the United States."

AMY GOODMAN: Just what is WikiLeaks’ mission? On its website, the group says, quote, "WikiLeaks is a non-profit media organization dedicated to bringing important news and information to the public." The website goes on, "We publish material of ethical, political and historical significance while keeping the identity of our sources anonymous, thus providing a universal way for the revealing of suppressed and censored injustices," unquote.

But not all transparency advocates support what WikiLeaks is doing. Today we’ll host a debate. Steven Aftergood is one of the most prominent critics of WikiLeaks and one of the most prominent transparency advocates. He’s the director of the government secrecy project at the Federation of American Scientists. He runs the Secrecy News project, which routinely posts non-public documents. He is joining us from Washington, D.C. We’re also joined by Glenn Greenwald. He’s a constitutional law attorney and political and legal blogger for Salon.com who’s supportive of WikiLeaks. He’s joining us from Rio de Janeiro in Brazil.

We welcome you both to Democracy Now! Why don’t we begin with Steven Aftergood? You have been a fierce proponent of transparency, yet you are a critic of WikiLeaks. Why?

STEVEN AFTERGOOD: I’m all for the exposure of corruption, including classified corruption. And to the extent that WikiLeaks has done that, I support its actions. The problem is, it has done a lot more than that, much of which is problematic. It has invaded personal privacy. It has published libelous material. It has violated intellectual property rights. And above all, it has launched a sweeping attack not simply on corruption, but on secrecy itself. And I think that’s both a strategic and a tactical error. It’s a strategic error because some secrecy is perfectly legitimate and desirable. It’s a tactical error because it has unleashed a furious response from the U.S. government and other governments that I fear is likely to harm the interests of a lot of other people besides WikiLeaks who are concerned with open government.

JUAN GONZALEZ: And when you say—when you list some of the main errors that the organization has made, could you give some examples of what to you are most troubling, when you talk about the invasion of privacy rights and other—and the others that you’ve listed?

STEVEN AFTERGOOD: Last year, WikiLeaks published a thousand-page raw police investigative file from Belgium, investigating a case of child abuse and murder. And as one would expect, the police file included lots of unsubstantiated allegations that later turned out to be false. But by publishing the raw allegations in their original state, WikiLeaks brought embarrassment and disgrace to people who were in fact innocent. It got to the point where the Belgium government was looking into the possibility of blocking access to WikiLeaks, not as an act of censorship, but as an act of protection against libel.

WikiLeaks has also published what I think is probably the only actual blueprint of a nuclear fission device that has been made available online. It’s not an artist’s concept, but it’s an actual blueprint of a real nuclear weapon that they posted online. I think from a proliferation point of view, that was a terrible mistake.

AMY GOODMAN: Glenn Greenwald, we want to bring you in before the break with a response.

GLENN GREENWALD: Right. Well, it’s interesting because we led off the segment with you, Amy, detailing a whole variety of repressive actions that are being taken against WikiLeaks. And one of the reasons for that is because people like Steven Aftergood have volunteered themselves and thrust themselves into the spotlight to stand up and say, "I’m a transparency advocate, but I think that what WikiLeaks is doing in so many instances is terrible."

If you look at the overall record of WikiLeaks—and let me just stipulate right upfront that WikiLeaks is a four-year-old organization, four years old. They’re operating completely unchartered territory. Have they made some mistakes and taken some missteps? Absolutely. They’re an imperfect organization. But on the whole, the amount of corruption and injustice in the world that WikiLeaks is exposing, not only in the United States, but around the world, in Peru, in Australia, in Kenya and in West Africa and in Iceland, much—incidents that are not very well known in the United States, but where WikiLeaks single-handedly uncovered very pervasive and systematic improprieties that would not have otherwise been uncovered, on top of all of the grave crimes committed by the United States. There is nobody close to that organization in terms of shining light of what the world’s most powerful factions are doing and in subverting the secrecy regime that is used to spawn all sorts of evils.

And I think the big difference between myself and Steven Aftergood is it is true that WikiLeaks is somewhat of a severe response, but that’s because the problem that we’re confronting is quite severe, as well, this pervasive secrecy regime that the world’s powerful factions use to perpetrate all kinds of wrongdoing. And the types of solutions that Mr. Aftergood has been pursuing in his career, while commendable and nice and achieving very isolated successes here and there, is basically the equivalent of putting little nicks and scratches on an enormous monster. And WikiLeaks is really one of the very few, if not the only group, effectively putting fear into the hearts of the world’s most powerful and corrupt people, and that’s why they deserve, I think, enthusiastic support from anyone who truly believes in transparency, notwithstanding what might be valid, though relatively trivial, criticisms that Mr. Aftergood and a couple of others have been voicing.

AMY GOODMAN: [inaudible] to break, and then we’re going to come back to this discussion. We’ve just gotten word from a tweet that the WikiLeaks website is now being hosted in Switzerland, again taken down over the last hours. We are seeing here the WikiLeaks tweet says, "WikiLeaks moves to Switzerland, "http://wikileaks.ch">http://wikileaks.ch." We’ll bring you the latest as we go through this broadcast. We’re speaking with Glenn Greenwald of Salon.com and Steven Aftergood of the Federation of American Scientists. Back with them in a minute.

[break]

AMY GOODMAN: Our guests are Glenn Greenwald of Salon.com—he’s joining us from Rio de Janeiro in Brazil—and Steven Aftergood, the Federation of American Scientists, joining us from Washington, D.C., debating WikiLeaks and the trove of cables they’ve released. It ultimately will be the largest trove of U.S. diplomatic cables ever leaked in U.S. history, following the largest trove of government documents ever released in the Iraq war cables, close to 400,000 of those documents. Juan?

JUAN GONZALEZ: Well, Steven Aftergood, I’d like to get your response to Glenn Greenwald just before our break and this issue of the fundamental challenge that he believes they are providing to elites all around the world.

STEVEN AFTERGOOD: You know, maybe he’s right, but I don’t think so. I think their theory of political action is extremely primitive. It’s basically throw a lot of stuff out there, and then good things will happen to good people and bad things will happen to bad people. They made a tremendous splash with their Apache helicopter video, showing the killing of people in Baghdad in 2007. But did it lead to a change in the rules of engagement that would prevent a similar event from happening in the future? No. Did it lead to compensation for or reparations for the people who were wounded there? No. It made a big splash, and then we went on to the next big splash. And, you know, again, I could easily be wrong; I often am. Maybe WikiLeaks is going to lead to an avalanche of openness and good government. My concern, though, is the opposite, that it’s going to lead to a new clampdown, new restrictions, more secrecy.

AMY GOODMAN: Glenn Greenwald, your response?

GLENN GREENWALD: I mean, I find that standard that he just articulated to be unbelievable and absurd. The idea that WikiLeaks hasn’t single-handedly reformed the United States military’s rule of engagement, and that’s supposed to be some sort of criticism of what it does? I mean, Mr. Aftergood created a big splash back in June after Wikileaks released the Afghanistan war documents, and he made that same argument in response to something I had written when I praised Wikileaks, and he said, "Well, how many wars have WikiLeaks stopped?" How many wars has Mr. Aftergood stopped? How many rules of engagement has he caused to be changed? I mean, it’s not WikiLeaks’s fault or its responsibility that when they show grave injustices to the American people that the citizenry is either indifferent towards those injustices or apathetic towards them. WikiLeaks is devoted to shedding light on what these injustices are, and it’s then our responsibility to go about and do something about them.

Again, they’re a four-year-old organization. And they have led to all sorts of important reforms. I mean, in Iceland, WikiLeaks was basically the single-handed cause of a new law that is designed to protect whistleblowing and whistleblowing sites like WikiLeaks beyond anything else that exists in the world. Their exposure of corruption on the part of a Iceland’s biggest banks, that led to the financial meltdown, led to investigations and prosecutions. The same thing happened to exposure of injustices and corruption on the part of oil magnates in Peru. They exposed the Australian government’s efforts to target websites to be shut down under a program designed to target child pornography, when in reality the sites that were targeted were political sites. And in Spain this week, the headlines are dominated by documents that WikiLeaks released that you, Amy, covered two days ago with Harper’s Scott Horton about the fact of the Spanish government’s succumb to pressure by the American State Department not to investigate the torture of its own citizens and the death of a Spanish photojournalist in Iraq, because WikiLeaks exposed that. And so you see all over the world, in just a short history of four years, immense amounts of reforms and greater awareness of what political and financial elites are doing around the world. I think he’s imposing on them an absurd and unreasonable standard that he, himself, and essentially nobody else is able to meet, either.

AMY GOODMAN: Steven Aftergood, how would you—what would you say the difference is between WikiLeaks and your own newsletter, Secrecy News?

STEVEN AFTERGOOD: I mean, there are several obvious differences in scope and scale and distribution. From my point of view, WikiLeaks is poorly focused in order to achieve its objective. And let me say, of course, I supported the release of the Apache helicopter video. I started out by saying that I favor the unauthorized disclosure of classified information that reveals corruption. It’s very hard, evidently, to say both good and bad things about WikiLeaks. People want you to say only one or the other.

But yesterday, Der Spiegel reported that a member, an official from the Free Democratic Party, had been relieved of his duties after he was identified as one of the persons who provided documents to the U.S. government in one of the WikiLeaks cables. Does that advance the public interest? WikiLeaks might call that a victory for open government, but I think it’s regrettable. I think if it’s multiplied dozens or hundreds of thousands of times over, it does real damage to the conduct of American diplomacy and to the national interest. So, just on principle, I oppose that kind of cavalier approach to disclosure.

JUAN GONZALEZ: Glenn Greenwald, your response?

GLENN GREENWALD: Right. Well, actually, WikiLeaks does not have a cavalier or indiscriminate approach to disclosure, contrary to accusations often made against it. They’ve certainly made mistakes in the past. I criticize them, for instance, for exercising insufficient care in redacting the names of various Afghan citizens who cooperated with the United States military. They accepted responsibility for that, and in subsequent releases, including in the Iraq document disclosures, they were very careful about redacting those names. And in the current diplomatic cable disclosure, thus far on their website, the only documents that have been posted were cables that were already published by their newspaper partners such as The Guardian and the New York Times and Der Spiegel, which included the redactions that those newspapers applied to those documents to protect the names of various people who are innocent and otherwise might be harmed in an inadvertent way. So they are constantly increasing their safeguards and their scrutiny. They’re perfecting their procedures. They acknowledge the responsibility that they have.

But what they—what I think is the crucial point is, is that, again, I mean, you know, what I hear from him speaking, it’s sort of like if you had a surgeon who had a cancer patient riddled with tumors and was removing huge tumors, this complaint, "Well, there was an ingrown toenail that he left and didn’t extract that very well." And just the more—no matter what you say, they just keep focusing on those relatively trivial flaws. I think that, you know, in order to criticize WikiLeaks—and it’s legitimate to do so—if you don’t think that their approach to bringing transparency and subverting the secrecy regime is an effective one or a commendable or noble one, you’re obligated to say what the alternative is, not in some fantasy world, but in the real world. And I don’t see one.

JUAN GONZALEZ: Well, Glenn, I’d like to ask you, because the focus of so much of this is in killing the messenger and not dealing with the messages that are being released here. First of all, the comment on just the fact that as the internet and computerization of information has grown, it has made it easier for folks to download troves of information about an institution or a government, so that our societies have not dealt with this other side of the internet and computerization. And also, if this information was so secret, why did the government do such an amateurish job of protecting supposedly vital information that a—supposedly a PFC, as they suspect, downloaded so much of this critical information about Afghanistan, Iraq and even diplomatic cables?

GLENN GREENWALD: Well, I think that’s really—that last point is one of the critical issues, which is, the reality is that of all the hundreds of thousands upon hundreds of thousands of pages that WikiLeaks has released just in the last six months alone, a tiny portion of it is even interesting, let alone legitimately secret. And that underscores one of the real problems, is that the secrecy regime that we’re talking about is just—is not just a little bit excessive on the margins. What it means is that the government, the United States government, and all of its permanent national security state institutions reflexively do virtually everything behind a shield of secrecy. Essentially, the presumption is that whatever the government does in our name is secret, when the presumption is supposed to be the opposite. And you see that as clearly as you possibly can in these leaks, how much innocuous information is simply marked and stamped "secret."

And the reason that there’s not many safeguards placed on it is because what WikiLeaks is releasing—and I think this is so important—is that, you know, despite how much corruption and wrongdoing and impropriety and criminality it has revealed, this is really the lowest level of secrecy that the United States government has. The truly awful things exist on a far higher level of secrecy, at the top-secret level or even above. And it is true that if the United States government’s claim is correct, that what WikiLeaks has done has jeopardized so much that’s good and important in the world, a lot of the blame lies with the United States and the government and the military for not having safeguarded it more securely.

And the first question that you asked is, I think, critical, too, which is, we can debate WikiLeaks all we want, but at the end of the day, it doesn’t really matter, because the technology that exists is inevitably going to subvert these institutions’ secrecy regimes. It’s too easy to take massive amounts of secret and dump it on the internet. You know longer need the New York Times or the network news to agree. And I think that what we’re talking about is inevitable, whether people like Steven Aftergood or Joe Lieberman or others like it or not.

AMY GOODMAN: I want to get Steven Aftergood’s response, but first, here on Democracy Now!, we’ve conducted three extensive interviews with WikiLeaks founder Julian Assange. The archives of the interview are on our website. But I wanted to play for you part of what he told us in July on government transparency.

JULIAN ASSANGE: We have clearly stated motives, but they are not antiwar motives. We are not pacifists. We are transparency activists who understand that transparent government tends to produce just government. And that is our sort of modus operandi behind our whole organization, is to get out suppressed information into the public, where the press and the public and our nation’s politics can work on it to produce better outcomes.

AMY GOODMAN: That’s Julian Assange on Democracy Now! Yesterday, NBC News highlighted Democracy Now!’s interview yesterday with his attorney. And we are linking to all of this on our website. She says that Julian Assange is not in hiding from the authorities—they are contacting him through his lawyers—but in hiding from harm, that this character assassination, the possibility that could lead to an actual real one. Steven Aftergood, your response to what Assange said and Glenn Greenwald before that?

STEVEN AFTERGOOD: Well, I actually agree with everything that Assange said in that statement. What I don’t agree with is that it’s an accurate characterization of what WikiLeaks has done.

Glenn Greenwald had a lot to say. Let me just mention a couple of things. I don’t believe that it’s a choice between the WikiLeaks approach and giving up. This year, for the first time, the United States declassified and disclosed the size of its nuclear weapons arsenal. This year, for the first time, the U.S. government issued its first unclassified Nuclear Posture Review Report, the basic statement of nuclear weapons employment policy. This year, for the first time, the U.S. government disclosed the total intelligence budget, including both its civilian and military components. There is an alternative mechanism for progress. In today’s paper, there’s a story about ACLU having uncovered reports of violations of the Freedom—the Foreign Intelligence Surveillance Act amendments. So it’s really not a question of WikiLeaks or nothing. It’s a question of a smart, well-targeted approach or a—you know, a reckless shotgun approach.

My concern about where we—you know, going forward, I basically have two agenda items. In the security review process, I want to try and inject the idea, as Glenn Greenwald said, that overclassification is a problem here and that as we fix the other security measures, we also need to focus on fixing the classification system, reducing the scope of classification sharply. The other agenda item, which WikiLeaks has made more difficult, is to prevent a rewriting of the Espionage Act statutes in order to make them more versatile and useful against both those who disclose classified information and those who publish such information. That is now building up steam, and I think we’re likely to see efforts in that direction in the next Congress.

AMY GOODMAN: Glenn Greenwald?

GLENN GREENWALD: Yeah, I mean, let me just say, I mean, you know, I have respect for the work that Steven Aftergood and other transparency activists do in Washington, working within the Congress and other American political institutions to try and bring about incremental reform. I think he’s well intentioned. I think we probably share the same values. The problem is that I just don’t think that his perspective is, A, realistic or, B, sufficiently urgent. I don’t think it’s realistic that the Congress of the United States, now dominated by the Republican Party in the House of Representatives and an extremely conservative Democratic Party in the Senate and led by an administration, the Obama administration, that has actually increased secrecy weapons, including the state secrecy privilege and other forms of immunity designed to shield high-level executive power wrongdoing and lawbreaking from all forms of accountability or judicial review, I think it’s incredibly unrealistic to take an optimistic view that that political system, dominated by those factions, is somehow on the verge of starting to bring about meaningful increases in transparency.

AMY GOODMAN: I want to—

GLENN GREENWALD: And I think it’s insufficiently—go ahead, I’m sorry.

AMY GOODMAN: I’m going to interrupt, because I want to get to some memos that we’ve been getting from around the country that are very important and interesting. University students are being warned about WikiLeaks. An email from Columbia University’s School of International and Public Affairs, that we read in headlines, reads—I want to do it again—quote, "Hi students,

"We received a call today from a SIPA alumnus who is working at the State Department. He asked us to pass along the following information to anyone who will be applying for jobs in the federal government, since all would require a background investigation and in some instances a security clearance.

"The documents released during the past few months through Wikileaks are still considered classified documents. He recommends that you DO NOT post links to these documents nor make comments on social media sites such as Facebook or through Twitter. Engaging in these activities would call into question your ability to deal with confidential information, which is part of most positions with the federal government.

"Regards, Office of Career Services."

That’s the email to Columbia University students at the School of International and Public Affairs.

Now, I want to go on to another memo. Democracy Now! has obtained the text of a memo that’s been sent to employees at USAID. This is to thousands of employees, about reading the recently released WikiLeaks documents, and it comes from the Department of State. They have also warned their own employees. This memo reads, quote, "Any classified information that may have been unlawfully disclosed and released on the Wikileaks web site was not 'declassified' by an appopriate authority and therefore requires continued classification and protection as such from government personnel... Accessing the Wikileaks web site from any computer may be viewed as a violation of the SF-312 agreement... Any discussions concerning the legitimacy of any documents or whether or not they are classified must be conducted within controlled access areas (overseas) or within restricted areas (USAID/Washington)... The documents should not be viewed, downloaded, or stored on your USAID unclassified network computer or home computer; they should not be printed or retransmitted in any fashion."

That was the memo that went out to thousands of employees at USAID. The State Department has warned all their employees, you are not to access WikiLeaks, not only at the State Department, which they’ve blocked, by the way, WikiLeaks, but even on your home computers. Even if you’ve written a cable yourself, one of these cables that are in the trove of the documents, you cannot put your name in to see if that is one of the cables that has been released. This warning is going out throughout not only the government, as we see, but to prospective employees all over the country, even on their home computers. Steven Aftergood, your response?

STEVEN AFTERGOOD: It’s obviously insane. I mean, if they’re not allowed to read the cables on WikiLeaks, they shouldn’t be allowed to read the cables on the New York Times or other sites. It’s obviously ridiculous. You know, this whole "cablegate" was intended as a provocation. Bradley Manning said it would give thousands of diplomats heart attacks. The system has been provoked. It is—you know, it is outrageous. It’s kind of disgusting. The question is, is it good politics? I don’t think so.

AMY GOODMAN: Finally, Glenn Greenwald, your final response?

GLENN GREENWALD: I think that that response is not one caused by WikiLeaks. I think that response is reflective of what our government is and the egos that prevails. And it’s every bit as severe as it was before WikiLeaks existed. And it’s WikiLeaks that is devoted to subverting it. And I think those memos, those disgustingly repressive and authoritarian memos, and the mindset in them, shows why WikiLeaks is so needed.

AMY GOODMAN: We want to leave it there, and we want to thank Glenn Greenwald, speaking to us from Rio de Janeiro in Brazil, a legal blogger at Salon.com, and Steven Aftergood of the Federation for American Scientists, for engaging in this debate.

The response on our website has been just overwhelming. We’ve got the highest number of viewers online right now than we’ve had since the beginning of this. The interview we did with Daniel Ellsberg on October 22, Juan, the day that he was flying off to London to have the news conference with Julian Assange announcing the latest trove of documents—they’re releasing something like a quarter of a million documents—has now been hit close to 2.8 million times, and it is just soaring every day. The hunger for this information has been astounding. You can go to our website to see all the different coverage, as well as our interview with Noam Chomsky responding to the specific cables that have been released. Our website is democracynow.org.
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: The Wikileaks Question

Postby bks » Sat Dec 04, 2010 1:04 pm

Isopod
Julian, why do you think it was necessary to "give Wikileaks a face"? Don't you think it would be better if the organization was anonymous?
This whole debate has become very personal and reduced on you - "Julian Assange leaked documents", "Julian Assange is a terrorist", "Julian Assange alledgedly raped a woman", "Julian Assange should be assassinated", "Live Q&A qith Julian Assange" etc. Nobody talks about Wikileaks as an organization anymore. Many people don't even realize that there are other people behind Wikileaks, too.
And this, in my opinion, makes Wikileaks vulnerable because this enables your opponents to argue ad hominem. If they convince the public that you're an evil, woman-raping terrorist, then Wikileaks' credibility will be gone. Also, with due respect for all that you've done, I think it's unfair to all the other brave, hard working people behind Wikileaks, that you get so much credit.

Julian Assange:
This is an interesting question. I originally tried hard for the organisation to have no face, because I wanted egos to play no part in our activities. This followed the tradition of the French anonymous pure mathematians, who wrote under the collective allonym, "The Bourbaki". However this quickly led to tremendous distracting curiosity about who and random individuals claiming to represent us. In the end, someone must be responsible to the public and only a leadership that is willing to be publicly courageous can genuinely suggest that sources take risks for the greater good. In that process, I have become the lightening rod. I get undue attacks on every aspect of my life, but then I also get undue credit as some kind of balancing force.


This is an interesting subtopic, and Assange may be wright about the bolded part of his answer. That doesn't mean this had to play out like it's playing out. Not all bands need frontmen. The leaking is the thing, and the creation of a system that mirrored the invisibility of the organizations being leaked about is the ideal kind of counter-organization.

Hasn't Assange ever heard of the Residents?

http://www.youtube.com/watch?v=0xPkUskFGcg
bks
 
Posts: 1093
Joined: Thu Jul 19, 2007 2:44 am
Blog: View Blog (0)

Re: The Wikileaks Question

Postby Stephen Morgan » Sat Dec 04, 2010 2:10 pm

wintler2 wrote:John Pilger interviewed on ABC radio (mp3). He strongly defends Assenge, wikileaks and the significance of the leaks, cites muzzling of Spanish PM & hobbling of UKs Chilcott inquiry as important to know, pours scorn on craven Oz govt, moots popular campaign of support in Oz with Geoffrey Robertson.


Robertson, the millionaire owner of the New Stateman who doesn't recognise the NUJ for his staff.
Those who dream by night in the dusty recesses of their minds wake in the day to find that all was vanity; but the dreamers of the day are dangerous men, for they may act their dream with open eyes, and make it possible. -- Lawrence of Arabia
User avatar
Stephen Morgan
 
Posts: 3736
Joined: Thu Apr 19, 2007 6:37 am
Location: England
Blog: View Blog (9)

Re: The Wikileaks Question

Postby seemslikeadream » Sat Dec 04, 2010 2:18 pm

Julian Assange: Wanted by the Empire, Dead or Alive

By ALEXANDER COCKBURN

The American airwaves quiver with the screams of parlor assassins howling for Julian Assange's head. Jonah Goldberg, contributor to the National Review, asks in his syndicated column, "Why wasn't Assange garroted in his hotel room years ago?" Sarah Palin wants him hunted down and brought to justice, saying: "He is an anti-American operative with blood on his hands."
Assange can survive these theatrical blusters. A tougher question is how he will fare at the hands of the US government, which is hopping mad. The US attorney general, Eric Holder, has announced that the Justice Department and Pentagon are conducting "an active, ongoing criminal investigation" into the latest Assange-facilitated leak under Washington's Espionage Act.
Asked how the US could prosecute Assange, a non-US citizen, Holder said, "Let me be clear. This is not saber-rattling," and vowed "to swiftly close the gaps in current US legislation…"

In other words the espionage statute is being rewritten to target Assange, and in short order, if not already, President Obama – who as a candidate pledged "transparency" in government - will sign an order okaying the seizing of Assange and his transport into the US jurisdiction. Render first, fight the habeas corpus lawsuits later.

Interpol, the investigative arm of the International Criminal Court at The Hague, has issued a fugitive notice for Assange. He's wanted in Sweden for questioning in two alleged sexual assaults, one of which seems to boil down to a charge of unsafe sex and failure to phone his date the following day.

This prime accuser, Anna Ardin has, according to Israel Shamir, writing on this CounterPunch site, "ties to the US-financed anti-Castro and anti-communist groups. She published her anti-Castro diatribes in the Swedish-language publication Revista de Asignaturas Cubanas put out by Misceláneas de Cuba…Note that Ardin was deported from Cuba for subversive activities."
It's certainly not conspiracism to suspect that the CIA has been at work in fomenting these Swedish accusations. As Shamir reports, "The moment Julian sought the protection of Swedish media law, the CIA immediately threatened to discontinue intelligence sharing with SEPO, the Swedish Secret Service."

The CIA has no doubt also pondered the possibility of pushing Assange off a bridge or through a high window (a mode of assassination favored by the Agency from the earliest days) and has sadly concluded that it's too late for this sort of executive solution.

The irony is that the thousands of diplomatic communications released by WikiLeaks contain no earth-shaking disclosures that undermine the security of the American empire. The bulk of them merely illustrate the well-known fact that in every capital city round the world there is a building known as the U.S. Embassy inhabited by people whose prime function is to vanquish informed assessment of local conditions with swaddling cloths of ignorance and prejudice instilled in them by what passes for higher education in the United States, whose governing elites are now more ignorant of what is really happening in the outside world that at any time in the nation’s history.

The reports in the official press invite us to be stunned at the news that the King of Saudi Arabia wishes Iran was wiped off the map, that the US uses diplomats as spies, that Afghanistan is corrupt, also that corruption is not unknown in Russia! These press reports foster the illusion that U.S. embassies are inhabited by intelligent observers zealously remitting useful information to their superiors in Washington DC . To the contrary, diplomats – assuming they have the slightest capacity for intelligent observation and analysis -- soon learn to advance their careers by sending reports to Foggy Bottom carefully tuned to the prejudices of the top State Department and White House brass, powerful members of Congress and major players throughout the bureaucracies. Remember that as the Soviet Union slid towards extinction, the US Embassy in Moscow was doggedly supplying quavering reports of a puissant Empire of Evil still meditating whether to invade Western Europe!

This is not to downplay the great importance of this latest batch of WikiLeaks. Millions in America and around the world have been given a quick introductory course in international relations and the true arts of diplomacy – not least the third-rate, gossipy prose with which the diplomats rehearse the arch romans à clef they will write when they head into retirement.

Years ago Rebecca West wrote in her novel The Thinking Reed of a British diplomat who, "even when he was peering down a woman's dress at her breasts managed to look as though he was thinking about India." In the updated version, given Hillary Clinton's orders to the State Department, the US envoy, pretending to admire the figure of the charming French cultural attaché, would actually be thinking how to steal her credit card information, obtain a retinal scan, her email passwords and frequent flier number.

There are also genuine disclosures of great interest, some of them far from creditable to the establishment US press. On our CounterPunch site last week Gareth Porter identified a diplomatic cable from last February released by WikiLeaks which provides a detailed account of how Russian specialists on the Iranian ballistic missile program refuted the US suggestion that Iran has missiles that could target European capitals or that Iran intends to develop such a capability. Porter points out that:

"Readers of the two leading US newspapers never learned those key facts about the document. The New York Times and Washington Post reported only that the United States believed Iran had acquired such missiles - supposedly called the BM-25 - from North Korea. Neither newspaper reported the detailed Russian refutation of the US view on the issue or the lack of hard evidence for the BM-25 from the US side.

"The Times, which had obtained the diplomatic cables not from WikiLeaks but from the Guardian, according to a Washington Post story Monday, did not publish the text of the cable. The Times story said the newspaper had made the decision not to publish 'at the request of the Obama administration'. That meant that its readers could not compare the highly distorted account of the document in the Times story against the original document without searching the Wikileaks website."

Distaste among the "official" US press for WikiLeaks has been abundantly apparent from the first of the two big releases of documents pertaining to the wars in Iraq and Afghanistan. The New York Times managed the ungainly feat of publishing some of the leaks while simultaneously affecting to hold its nose, and while publishing a mean-spirited hatchet job on Assange by its reporter John F Burns, a man with a well burnished record in touting the various agendas of the US government.

There have been cheers for Assange and WikiLeaks from such famed leakers as Daniel Ellsberg, but to turn on one's television is to eavesdrop on the sort of fury that Lord Haw-Haw – aka the Irishman William Joyce, doing propaganda broadcasts from Berlin -- used to provoke in Britain in World War II. As Glenn Greenwald wrote in his column on the Salon site:

"On CNN, Wolf Blitzer was beside himself with rage over the fact that the US government had failed to keep all these things secret from him... Then - like the Good Journalist he is - Blitzer demanded assurances that the Government has taken the necessary steps to prevent him, the media generally and the citizenry from finding out any more secrets: 'Do we know yet if they've [done] that fix? In other words, somebody right now who has top secret or secret security clearance can no longer download information onto a CD or a thumb drive? Has that been fixed already?' The central concern of Blitzer - one of our nation's most honored 'journalists' - is making sure that nobody learns what the US Government is up to."

These latest WikiLeaks files contains some 261,000,000 words - about 3,000 books. They display the entrails of the American Empire. As Israel Shamir wrote here last week, "The files show US political infiltration of nearly every country, even supposedly neutral states such as Sweden and Switzerland. US embassies keep a close watch on their hosts. They have penetrated the media, the arms business, oil, intelligence, and they lobby to put US companies at the head of the line."

Will this vivid record of imperial outreach in the early 21st century soon be forgotten? Not if some competent writer offers a readable and politically vivacious redaction. But a warning: in November 1979 Iranian students seized an entire archive of the State Department, the CIA and the Defense Intelligence Agency (DIA) at the American embassy in Tehran. Many papers that were shredded were laboriously reassembled.

These secrets concerned far more than Iran. The Tehran embassy, which served as a regional base for the CIA, held records involving secret operations in many countries, notably Israel, the Soviet Union, Turkey, Pakistan, Saudi Arabia, Kuwait, Iraq and Afghanistan.

Beginning in 1982, the Iranians published some 60 volumes of these CIA reports and other US government documents from the Tehran archive, collectively entitled Documents From the US Espionage Den. As Edward Jay Epstein, a historian of US intelligence agencies, wrote years ago, "Without a doubt, these captured records represent the most extensive loss of secret data that any superpower has suffered since the end of the Second World War."

In fact the Tehran archive truly was a devastating blow to US national security. It contained vivid portraits of intelligence operations and techniques, the complicity of US journalists with US government agencies, the intricacies of oil diplomacy. The volumes are in some university libraries here. Are they read? By a handful of specialists. The inconvenient truths were swiftly buried – and perhaps the WikiLeaks files will soon be fade from memory too, joining the inspiring historical archive of intelligence coups of the left.

I should honor here “Spies for Peace” – the group of direct-action British anarchists and kindred radicals associated with the Campaign for Nuclear Disarmament and Bertrand Russell’s Committee of 100 who, in 1963, broke into a secret government bunker, Regional Seat of Government Number 6 (RSG-6) at Warren Row, near Reading, where they photographed and copied documents, showing secret government preparations for rule after a nuclear war. They distributed a pamphlet along with copies of relevant documents to the press, stigmatizing the “small group of people who have accepted thermonuclear war as a probability, and are consciously and carefully planning for it. ... They are quietly waiting for the day the bomb drops, for that will be the day they take over.” There was a big uproar, and then the Conservative government of the day issued a D-notice forbidding any further coverage in the press. The cops and intelligence services hunted long and hard for the spies for peace, and caught nary a one.

And Assange? Hopefully he will have a long reprieve from premature burial. Ecuador offered him sanctuary until the US Embassy in Quito gave the president a swift command and the invitation was rescinded. Switzerland? Istanbul? Hmmm. As noted above, he should, at the least, view with caution women eagerly inviting his embraces and certainly stay away from overpasses, bridges, and open windows.

In 1953 the CIA distributed to its agents and operatives a killer's training manual (made public in 1997) full of hands-on advice:

"The most efficient accident, in simple assassination, is a fall of 75 feet or more onto a hard surface. Elevator shafts, stair wells, unscreened windows and bridges will serve... The act may be executed by sudden, vigorous [excised] of the ankles, tipping the subject over the edge. If the assassin immediately sets up an outcry, playing the 'horrified witness', no alibi or surreptitious withdrawal is necessary."

Hope Flowers in the Graveyard

Our latest newsletter is now going out to subscribers and is available to new subscribers.

From Jerusalem Jeff Halper files an exciting report on what he sees as positive opportunities in 2011 for escape from the dead-end of a dead peace process. “ And yet,” writes Halper, who the Director of The Israeli Committee Against House Demolitions, “ I’m optimistic that 2011 will witness a game-changing ‘break’ that will create a new set of circumstances in which a just peace is possible. That jolt which smashes the present dead-end paradigm must come from outside the present ‘process.’

Don’t miss Halper’s important and exciting analysis of ways forward to a just, workable and lasting peace.

Also in this latest newsletter: What’s really happening in North and South Korea? How real is the danger of war? Peter Lee unearths the real game plans of the leaders of both Koreas, of China and of the United States.

For those newsletter readers who may have missed it on our website we feature Pam Martens’ stunning “Citizen’s Counter Strategy – Ten Ideas to Starve the Wall Street Beast”.

And Larry Portis sends us from Montpellier an amazing report and interview with director Serge Avedikian about his film Barking Island, about the way thousands of dogs in Constantinople were slaughtered as an experimental overture to the Armenian genocide.
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: The Wikileaks Question

Postby Simulist » Sat Dec 04, 2010 2:25 pm

Sarah Palin wants him hunted down and brought to justice, saying: "He is an anti-American operative with blood on his hands."

Does that make him worse than a pro-American operative with blood on her hands?
"The most strongly enforced of all known taboos is the taboo against knowing who or what you really are behind the mask of your apparently separate, independent, and isolated ego."
    — Alan Watts
User avatar
Simulist
 
Posts: 4713
Joined: Thu Dec 31, 2009 10:13 pm
Location: Here, and now.
Blog: View Blog (0)

Re: The Wikileaks Question

Postby General Patton » Sat Dec 04, 2010 6:18 pm

Wikileaks, Now
http://zunguzungu.wordpress.com/2010/12 ... leaks-now/


“We don’t have targets, other than organizations that use secrecy to conceal unjust behavior”

–Julian Assange, Time interview, last tuesday

It’s tempting to read Julian Assange’s 2006 essays as the master-key to understanding what Wikileaks represents now, tempting because it makes a really hard problem easy. But it’s also quite clear that Wikileaks has changed quite a bit since 2006, and when Wikileaks tweeted my post (which was sort of where the whole experience became surreal for me), it seems important that they praised it as explicating “one of the key ideas behind WikiLeaks.” That is, one of them, and maybe not even the primary one.

So what are the others? What else is it that Wikileaks is actually trying to do? We do want to think critically about what Assange is saying publicly about the organization he fronts for, of course, but I tend to think that what he says in interviews now is probably a better guide to their present activities than something he wrote four years ago. For example, in his interview with Time, Assange said that Wikileaks “practices civil obedience, that is, we are an organization that tries to make the world more civil and act against abusive organizations that are pushing it in the opposite direction.” And a moment later, he clarified that “It is not our goal to achieve a more transparent society; it’s our goal to achieve a more just society.”

This is an important point that gets lost if we focus too much on the techno-utopianism of the original essay, which can credibly be read as too easily equating secrecy — in all its forms — as evil. I feel like such a reading runs against the spirit of the essay, but since he can seem to make secrecy a necessary function of authoritarianism, he at least suggests that the reverse might be the case, or beg the question. And as Dr. Science is arguing over at Obsidian Wings, arguing a direct relationship between secrecy and authoritarianism can also cause us to overlook the conspiracies which occur in plain sight (PNAC, for example).

More than that, though, if we think of Wikileaks as a organization that works against “abusive” organizations — as practicing civil disobedience in a more general sense — then a whole hell of a lot starts to hinge on what is meant by abusive, and radical transparency starts to seem a lot less like a principle than a means to an end. In that interview, for example, he mentions that

“We keep secret the identity of our sources, as an example, [and] take great pains to do it. So secrecy is important for many things but shouldn’t be used to cover up abuses.”

This is not commensurate with a Zuckerbergian dismissal of all secrecy, or even the more interesting claim that secrecy is necessary for authoritarianism to function. It may be that Wikileaks is doing different things now than they thought they would in 2006. In fact, this seems so overwhelmingly likely to be the case that it feels silly to even type it. But taking that fact seriously requires us to think a little more carefully about what Wikileaks might have learned in the last four years, how their activities might have changed.

For one thing, Julian Assange talks more like the head of a media organization these days than like a hacker revolutionary. When, in the interview with Forbes, Andy Greenberg mentioned that he used to be a “traditional hacker,” he bristles a little:

That was 20 years ago. It’s very annoying to see modern day articles calling me a computer hacker. I’m not ashamed of it, I’m quite proud of it. But I understand the reason they suggest I’m a computer hacker now. There’s a very specific reason…There’s a deliberate attempt to redefine what we’re doing not as publishing, which is protected in many countries, or the journalist activities, which is protected in other ways, [but to redefine what we’re doing] as something which doesn’t have a protection, like computer hacking, and to therefore split us off from the rest of the press and from these legal protections. It’s done quite deliberately by some of our opponents. It’s also done because of fear, from publishers like The New York Times that they’ll be regulated and investigated if they include our activities in publishing and journalism.

Which seems completely true, parenthetically; only yesterday, the State department’s daily press briefing included the message that “WikiLeaks Not Media Organization.” This is, of course, literally untrue; as an organization which moves information around, Wikileaks is a “medium” for information, a media organization. Hillary Clinton doesn’t care about etymology though; what she means is that Wikileaks does not qualify for the protections which are afforded a media organization.

It may simply be tactics that leads Wikileaks to claim the status of a journalistic organization (though why they do it is far less important than the fairly plain fact that most of what they do seems to be exactly what the word “journalism” describes). But the way he handles the problem of self-definition is at least interestingly subtle. Here, at Time, he writes that

“…we’re a source-protection organization, so the last thing we would do is discuss possible sources.”

Which reframes the problem they exist to solve: instead of being the whistle-blower themselves, they work to enable others to whistle-blow (the medium through which leaks flow).

In January, at Hungry Beast, he said this:

“WikiLeaks is an international public service run by Sunshine Press. Sunshine Press is a collection of journalists and activists who are trying to publish information that has been withheld from the public, or censored once journalists have published it. We run a multijurisdictional service which protects sources with encryption technology and also through the legal system by basing our operations in countries such as Sweden and Belgium which have strong source protection laws.”

An “international public service” is incredibly vague language, but I don’t think it’s clear what Wikileaks is, and anyway, what Wikileaks is now is unlikely to be what it ends up being (and already seems to be somewhat different than what it began as). I emphasize this point not only because I want to derail the idea — which my original post did a lot to establish — that Wikileaks can be understood simply by looking at its constituting documents, as it were.

For example, the thinking in this little quote is to be found nowhere in the original essays:

It’s not correct to put me in any one philosophical or economic camp, because I’ve learned from many. But one is American libertarianism, market libertarianism. So as far as markets are concerned I’m a libertarian, but I have enough expertise in politics and history to understand that a free market ends up as monopoly unless you force them to be free. WikiLeaks is designed to make capitalism more free and ethical.

But I’m less interested in that ambition than in the simple fact that Wikileaks is evolving, and you can’t read more than a few interviews without Assange saying some variation on “We used to do X, but that caused Y problem, so now we do Z.” For example, from today’s live chat at The Guardian:

I originally tried hard for the organisation to have no face, because I wanted egos to play no part in our activities. This followed the tradition of the French anonymous pure mathematians, who wrote under the collective allonym, “The Bourbaki”. However this quickly led to tremendous distracting curiosity about who and random individuals claiming to represent us. In the end, someone must be responsible to the public and only a leadership that is willing to be publicly courageous can genuinely suggest that sources take risks for the greater good. In that process, I have become the lightening rod. I get undue attacks on every aspect of my life, but then I also get undue credit as some kind of balancing force.

Or this, from Time:

When we first started, we thought we would have the analytical work done by bloggers and people who wrote Wikipedia articles and so on. And we thought that was a natural, given that we had lots of quality, important content…But actually it turns out that that is not at all true. The bulk of the heavy lifting — heavy analytical lifting — that is done with our materials is done by us, and is done by professional journalists we work with and by professional human-rights activists. It is not done by the broader community. However, once the initial lifting is done, once a story becomes a story, becomes a news article, then we start to see community involvement, which digs deeper and provides more perspective. So the social networks tend to be, for us, an amplifier of what we are doing. And also a supply of sources for us.

So when I saw this problem early on in our first year, that the analytical effort which we thought would be supplied by Internet citizens around the world was not, I saw that, well, actually, in terms of articles, form tends to follow the funding. You can’t expect to get news-style articles out of people that are not funded after a career structure in the same way that news organizations are. You will get a different sort of form, and that form may be commentary, which sometimes is very good and sometimes there are very senior people providing commentary that is within their media experience, or we get sources who hand over material, because once again, within their media experience, it is an important issue to them. But what we don’t get from the [inaudible] community is people writing articles about an issue that they didn’t have an intimate involvement with in the first place. And of course, if you think about it, that’s natural — why would they be? The incentive’s not there. When people write political commentary on blogs or other social media, it is my experience that it is not — with some exceptions — their goal to expose the truth. Rather, it is their goal to position themselves among their peers on whatever the issue of the day is. The most effective, the most economical way to do that is simply to take the story that’s going around — it has already created a marketable audience for itself — and say whether they’re in favor of that interpretation or not.

I find the idea that “form tends to follow the funding” really interesting, by the way, and it has a lot of suggestive possibilities; for one thing, it’s the point where Wikileaks parted company with (so called “cofounder”) John Young, who said this in an interview:

I think the type of stuff I was going to publish, you should never do it for money. Only because that contaminates the credibility and it turns it into a business opportunity where there’s great treachery and lying going on. And it will contaminate Wikileaks. It always does. In fact, that’s the principal means by which noble endeavors are contaminated, the money trail. That’s pretty obvious. I happen to think that amateur stuff is better than paid stuff.

Whether this is true or not, it’s clear that Wikileaks’ decision to monetize represented an evolution from what it was in 2006. And I’m not sure what it means, but I want to close with three of his own anecdotes that I think clarify how complicated the grey areas are that Wikileaks is moving through, and how no simple set of principles — even Assange’s own — would really “explain” what it is that they’re doing.

First, from Forbes:

Assange: There’s a Texas Canadian oil company whose name escapes me. And they had these wells in Albania that had been blowing. Quite serious. We got this report from a consultant engineer into what was happening, saying vans were turning up in the middle of the night doing something to them. They were being sabotaged. The Albanian government was involved with another company; There were two rival producers and one was government-owned and the other was privately owned. So when we got this report; It didn’t have a header. It didn’t say the name of the firm, or even who the wells belonged to…

So I said, what the hell do we do with this thing? It’s impossible to verify if we don’t even know who it came from. It could have been one company trying to frame the other one. So we did something very unusual, and published it and said “We’ve got this thing, looks like it could have been written by a rival company aiming to defame the other, but we can’t verify it. We want more information.” Whether it’s a fake document or real one, something was going on. Either one company is trying to frame the other, which is interesting, or it’s true, which is also very interesting.

That’s where the matter sat until we got a letter of inquiry from an engineering consulting company asking how to get rid of it. We demanded that they first prove that they were the owner…They sent us a screen capture with the missing header and other information.

Andy Greenberg: What were they thinking?

Assange: I don’t know.

And then this, from the New Yorker:

Assange told me, “I want to set up a new standard: ‘scientific journalism.’ If you publish a paper on DNA, you are required, by all the good biological journals, to submit the data that has informed your research—the idea being that people will replicate it, check it, verify it. So this is something that needs to be done for journalism as well. There is an immediate power imbalance, in that readers are unable to verify what they are being told, and that leads to abuse.” Because Assange publishes his source material, he believes that WikiLeaks is free to offer its analysis, no matter how speculative. In the case of Project B, Assange wanted to edit the raw footage into a short film as a vehicle for commentary. For a while, he thought about calling the film “Permission to Engage,” but ultimately decided on something more forceful: “Collateral Murder.” He told Gonggrijp, “We want to knock out this ‘collateral damage’ euphemism, and so when anyone uses it they will think ‘collateral murder.’



The edited film, which was eighteen minutes long, began with a quote from George Orwell that Assange and M had selected: “Political language is designed to make lies sound truthful and murder respectable, and to give the appearance of solidity to pure wind.” It then presented information about the journalists who had been killed, and about the official response to the attack. For the audio of this section, one of the film’s Icelandic editors had layered in fragments of radio banter from the soldiers. As Assange reviewed the cut, an activist named Gudmundur Gudmundsson spoke up to say that the banter allowed viewers to “make an emotional bond” with the soldiers. Assange argued that it was mostly fragmentary and garbled, but Gudmundsson insisted: “It is just used all the time for triggering emotions.”

“At the same time, we are displaying them as monsters,” the editor said.

“But emotions always rule,” Gudmundsson said. “By the way, I worked on the sound recording for a film, ‘Children of Nature,’ that was nominated for an Oscar, so I am speaking from experience.”

“Well, what is your alternative?” Assange asked.

“Basically, bursts of sounds, interrupting the quiet,” he said.

The editor made the change, stripping the voices of the soldiers from the opening, but keeping blips and whirs of radio distortion. Assange gave the edit his final approval.

And finally, this from an interviewwith Stefan May:

Assange: One thing that can’t be faked is how much money they pay. If you have an auction and a media organisation pays the most, then they are predicting, that they will benefit the most from publishing the story. That is, they will have the maximum number of readers. So this is a very good way to measure who should have the exclusivity. We tried to do it as an experiment in Venezuela .

SM: Why Venezuela?

Assange: Because of the character of the document. We had 7 000 e-mails from Freddy Balzan, he was Hugo Chavez’s former speech writer and also the former ambassador to Argentinia. We knew that this document would have this problem, that it was big and political important, therefore probably no one would write anything about it for the reason I just said.

SM: What happened?

Assange: This auction proved to be a logistical nightmare. Media organisations wanted access to the material before they went to auction. Consequently we would get them to sign non-disclosure agreements, chop up the material and release just every second page or every second sentence.That proved to distracting to all the normal work we were doing, so that we said, forget it, we can’t do that. We just released the material as normal. And that’s precisely what happened: no one wrote anything at all about those 7 000 Emails. Even though 15 stories had appeared about the fact that we were holding the auction.

SM: The experiment failed.

Assange: The experiment didn’t fail; the experiment taught us about what the burdens were. We would actually need a team of five or six people whose job was just to arrange these auctions.

SM: You plan to continue the auction idea in the future …

Assange: We plan to continue it, but we know it will take more resources. But if we pursue that we will not do that for single documents. We will instead offer a subscription. This would be much simpler. We would only have the overhead of doing the auction stuff every three months or six months, and not for every document.
штрафбат вперед
User avatar
General Patton
 
Posts: 959
Joined: Thu Nov 16, 2006 11:57 am
Blog: View Blog (0)

PreviousNext

Return to General Discussion

Who is online

Users browsing this forum: No registered users and 163 guests