Category Archive 'Wikileaks'
05 Feb 2011

Wikileaks: Obama Betrayed Britain

, , , , ,


Jacob Epstein, Sir Winston Churchill, 1946, on loan to the White House Oval Office from the British Government 2001-2009.

The Telegraph‘s perusal of the Wilkileaks leaked diplomatic documents finds that Barack Obama traded British defense secrets to Russia as part of the price for Russian agreement to the START Treaty.

Information about every Trident missile the US supplies to Britain will be given to Russia as part of an arms control deal signed by President Barack Obama next week.

Defence analysts claim the agreement risks undermining Britain’s policy of refusing to confirm the exact size of its nuclear arsenal.

The fact that the Americans used British nuclear secrets as a bargaining chip also sheds new light on the so-called “special relationship”, which is shown often to be a one-sided affair by US diplomatic communications obtained by the WikiLeaks website. …

A series of classified messages sent to Washington by US negotiators show how information on Britain’s nuclear capability was crucial to securing Russia’s support for the “New START” deal.

Although the treaty was not supposed to have any impact on Britain, the leaked cables show that Russia used the talks to demand more information about the UK’s Trident missiles, which are manufactured and maintained in the US.

Washington lobbied London in 2009 for permission to supply Moscow with detailed data about the performance of UK missiles. The UK refused, but the US agreed to hand over the serial numbers of Trident missiles it transfers to Britain.

Professor Malcolm Chalmers said: “This appears to be significant because while the UK has announced how many missiles it possesses, there has been no way for the Russians to verify this. Over time, the unique identifiers will provide them with another data point to gauge the size of the British arsenal.”

Duncan Lennox, editor of Jane’s Strategic Weapons Systems, said: “They want to find out whether Britain has more missiles than we say we have, and having the unique identifiers might help them.”

——————————-

Anthony Calabrese, an American attorney working in London, felt obliged to remind his British friends that they had overwhelmingly rooted for Obama to win the presidency.

Well, you guys all wanted him and you got what you wanted. In my 18 months living in London (truly one of the World’s greatest cities BTW) I have met one person who did not want Obama to win the 2008 election (and most of my co-workers seem to be Tories). I have had these same Tories complain to me about something the administration has done (BP, the Churchill bust, the snubbing of the Queen) yet 15 seconds later react with horror when they find out I did not vote for him.

Look folks, you wanted him, you got him, now you are getting it good and hard. George Bush who you all revile would never have pulled that. John McCain would never have done that. But keep up your adulation of President Obama, maybe he will wave at you occasionally.

03 Feb 2011

Wikileaks: US Sent Message to China

, , ,

The Telegraph also found in the Wikileaks leaked documents the account of the United States responding to China’s showing off its Star Wars capabilities by launching a ballistic missile to destroy one of its own weather satellites by promptly popping off a missile from a US Aegis missile cruiser and potting a US satellite. Message: “Not only can we do that, too. We have been able to for a long time, and we can even launch the missile from a ship. Guess what else we can do.”

The “star wars” arms race was began in January 2007 when China shocked the White House by shooting down one of its weather satellite 530 miles above the Earth.

The strike, which resulted in thousands of pieces of debris orbiting the earth, raised fears that the Chinese had the power to cause chaos by destroying US military and civilian satellites.

In February 2008, America launched its own “test” strike to destroy a malfunctioning American satellite, which demonstrated to the Chinese it also had the capability to strike in space.

America stated at the time that the strike was not a military test but a necessary mission to remove a faulty spy satellite.

The leaked documents appear to show its true intentions.

02 Feb 2011

Telegraph Finds Wikileaks Details on Al Qaeda Plans for Dirty Bombs, Nuclear Smuggling, and Childrens’ Articles Filled With Explosives

, , , , , ,

The Telegraph has found some alarming information in Wikileaks’ collection of stolen cables.

Al-Qaeda is attempting to procure nuclear material and recruit rogue scientists in order to build a radioactive “dirty bomb,” leaked documents published in Wednesday’s Telegraph newspaper revealed.

The cables, released by the WikiLeaks website, showed that security chiefs told a Nato meeting in January 2009 that Al-Qaeda was planning a programme of “dirty radioactive improvised explosive devices (IEDs).”

The makeshift nuclear bombs, which could be used against soldiers fighting in Afghanistan, would contaminate the surrounding area for years to come.

The leaked documents also revealed that Al-Qaeda papers found in 2007 convinced security officials that “greater advances” had been made in bio-terrorism than was previously feared.

US security personnel were warned in 2008 that terrorists had “the technical competence to manufacture an explosive device beyond a mere dirty bomb.”

—————————————–

The Vancouver Sun mentions a few more details.

A leading atomic regulator has privately warned the world stands on the brink of a “nuclear 9/11.”

Security briefings suggest jihadi groups are also close to producing “workable and efficient” biological and chemical weapons that could kill thousands if unleashed in attacks on the West.

Thousands of classified American cables obtained by WikiLeaks and passed to the Daily Telegraph detail the international struggle to stop the spread of weapons-grade nuclear, chemical and biological material around the globe.

At a NATO meeting in 2009, security chiefs briefed member states that al-Qaida was plotting a program of “dirty radioactive IEDs”, makeshift nuclear roadside bombs that could be used against western troops in Afghanistan.

As well as causing a large explosion, a “dirty bomb” attack would contaminate the area for many years.

The briefings also state that al-Qaida documents found in Afghanistan in 2007 revealed that “greater advances” had been made in bioterrorism than was previously realized. An Indian national security adviser told American security personnel in June 2008 that terrorists had made a “manifest attempt to get fissile material” and “have the technical competence to manufacture an explosive device beyond a mere dirty bomb”.

Alerts about the smuggling of nuclear material, sent to Washington from foreign U.S. embassies, document how criminal and terrorist gangs were trafficking large amounts of highly radioactive material across Europe, Africa and the Middle East.

—————————————–

And the Telegraph published today the details of a series of nuclear trafficking incidents occurring in recent years.

Radiation alarms installed on the border crossing between Uzbekistan and Kazakhstan sounded in November 2007 as a freight train travelling from Kyrgyzstan to Iran passed through Nazarbek rail station. Customs officials halted the train to perform an examination and found that a single carriage ostensibly packed with “scrap metal” was perilously radioactive. So high were the radiation levels that officials were instructed not to pass within five metres of the carriage, making it impossible to come close enough to open it. At the time of the last dispatch to Washington, sent in January 2008, the rail car was still unopened and remained in quarantine.

In November 2007, the US embassy in London received a telephone call from a British deep-sea salvage merchant based in Sheffield, who claimed that his business associates in the Philippines had found six uranium “bricks” at the site of an underwater wreck. The uranium had formerly belonged the US. The merchant provided nine photographs of the bricks, which he said his associates wanted to sell for a profit. It is not clear whether diplomats agreed to the purchase.

Officials in the US embassy in Uganda were approached in February 2008 by a source who claimed that a Congolese acquaintance had asked him to help find a buyer for some highly enriched pure uranium liquid. The source, a Ugandan gold merchant, said a potential sale to a Pakistani buyer in Kenya had fallen through due to the ongoing civil unrest in the east African county. A nuclear smuggling alert sent back to Washington states that the highly radioactive material may be transported across the Congolese border in Uganda in the next few days by train, bus or taxi.

In September 2009, two employees working at the Rossing Uranium Mine in Namibia smuggled almost half a ton of the uranium concentrate powder – known as “yellowcake” – out of the compound in plastic carrier bags. The theft was initiated by Namibian police officers who offered the two employees “exorbitant amounts of money” in a bungled sting designed to determine how easily uranium could be stolen. The two employees removed the yellowcake from a broken drum and scooped it into carrier bags which they placed into a skip and smuggled out of the compound on the back of a haulage truck. The police caught the thieves when they attempted to sell 24 bags containing 170kg (370lb) of the stolen yellowcake. The remaining 250kg was not intercepted and are likely to have been sold on to smugglers.

A car carrying three Armenian men set off a radiation detector on the Georgian-Armenian border in August 2009. The driver was waved through by guards after he claimed to have been injected with radioactive isotopes during surgery. When the alarm sounded again as the car returned from Armenia, the guards decided to carry out a search. They found that the car was contaminated with radiation throughout, but no nuclear material was discovered. Whatever radioactive cargo the car may previously have been carrying had already been delivered.

A Portuguese man walked into the US embassy in Lisbon in July 2008 offering to sell six uranium plates that had been stolen from Chernobyl – the site of the 1986 nuclear catastrophe in the USSR. The plates were in the possession of an ex-Russian general who was allegedly using a Portuguese judge to broker sales, he said. Officials reported that the source was a well-known “small-time hustler,” known as “The Giraffe” who was involved in “many scams”. The case was referred to the Portuguese police.

The Security Service of Ukraine arrested two private entrepreneurs and a prominent local politician in April 2009 as they attempted to sell a container of weapons-grade plutonium for $10 million (£6.3 million) in the western province of Ternopil Oblast. A security official told the embassy that the radioactive material could be “used by terrorists for making a dirty bomb”.

During the summer of 2009, Russian customs officers reported three incidents in which cobalt-60, a highly radioactive substance, was detected in passenger trains travelling from Kazakhstan to Russia. A large number of passengers were exposed to the radiation. The authorities seized 500g of the substance.

—————————————–

Also, in the Telegraph:

Airport security staff are being urged to examine “children’s articles” after US intelligence concluded that terrorists were plotting to fill them with explosive chemicals.

Terrorists are attempting to manufacture nitrocellulose, a chemical which can become highly explosive if tightly packed. Details of how to prepare the chemical, which cannot be detected by airport X-ray machines, have been found in al-Qaeda training manuals.

31 Dec 2010

Assange’s Hostages

, , ,

Empty Wheel, writing at voice-of-the-treasonous-American-clerisy Fire Dog Lake, shares Assange’s reflexive anti-Americanism and is affirmatively impressed by Assange’s ability to threaten the lives of American allies overseas.

Well, Julian Assange just made it clear who his hostages are:

    Top officials in several Arab countries have close links with the CIA, and many officials keep visiting US embassies in their respective countries voluntarily to establish links with this key US intelligence agency, says Julian Assange, founder of the whistle-blowing website, WikiLeaks.“These officials are spies for the US in their countries,” Assange told Al Jazeera Arabic channel in an interview yesterday.

    The interviewer, Ahmed Mansour, said at the start of the interview which was a continuation of last week’s interface, that Assange had even shown him the files that contained the names of some top Arab officials with alleged links with the CIA.

    [snip]

    “If I am killed or detained for a long time, there are 2,000 websites ready to publish the remaining files. We have protected these websites through very safe passwords,” said Assange.

Assange’s message–on Al Jazeera, in a message directed to “the Arab Street”? If he is disappeared or killed or put away, the names of America’s stooges in the Middle East will be released on some outlet like Al Jazeera.

14 Dec 2010

How to Foil Wikileaks

, , , ,

According to the News Junkie:

Concerning Wikileaks, Governor Mike Huckabee said: “If we want to keep our nation’s secrets ‘SECRET,’ store them where President Obama stores his college transcripts and birth certificate.”

Hat tip to Karen L. Myers.

07 Dec 2010

Assange Surrenders to British Police

,

Julian Assange surrendered by prearrangement to British police this morning.


The Guardian
reports that Assange’s attoneys are trying to make a bail arrangement in which “a security of at least £100,000 and a surety – where third parties guarantee to pay the court if he absconds” would allow Assange to be at large while he fights his extradition to Sweden.

[I]f extradited to Sweden under the EAW, Assange will be vulnerable to other extradition requests from countries including the US. The US has an extradition treaty with Sweden dating back to 1960s, when the two countries agreed to “make more effective the cooperation of the two countries in the repression of crime.” Extradition under the treaty is likely to face a number of obstacles, not least the fact that the likely charges facing Assange in the US – under the Espionage Act or other legislation protecting national security – are not included in the exhaustive list of offences set out in the law. There may also be issues of jurisdiction, since the offences which Assange is accused of did not take place in the US.Even if Assange’s case falls outside the scope of Sweden’s treaty with the US, there would still be scope for the country to agree to his extradition to the US.

Swedish law permits extradition more generally to countries outside Europe, although the process is subject to safeguards, including a ban on extradition for “political offences” or where the suspect has reason to fear persecution on account of their membership of a social group or political beliefs.

There are no reports of the Wikileaks “nuclear” retaliation package’s password being released so far however.

06 Dec 2010

Net Closing on Assange — Swiss Close His Bank Account

, , ,

The Telegraph reports that the British manhunt for Julian Assange has begun.

Scotland Yard has received the paperwork required to arrest Julian Assange. …

[T]here is no longer any legal impediment to holding Mr Assange and making him appear before City of Westminster Magistrates’ Court.

————————————

Some news agency reports:

The Swiss postal system stripped WikiLeaks founder Julian Assange of a key fundraising tool Monday, accusing him of lying and immediately shutting down one of his bank accounts.

The swift action by Postfinance, the financial arm of Swiss Post, came after it determined the “Australian citizen provided false information regarding his place of residence during the account opening process.”

Assange had told Postfinance he lived in Geneva but could offer no proof that he was a Swiss resident, a requirement of opening such an account.

06 Dec 2010

Wikileaks: Blackmail and Information War

,

A secret state department cable identifying US overseas vital interest locations was leaked by Wilkileaks, reports the Telegraph.

A February 2009 State Department cable asked embassies around the world to update a 2008 list of vital interests. Unlike most of the documents made available by WikiLeaks so far, it was marked “secret”. …

Among the British sites mentioned is a manufacturing facility run by BAE Systems in Lancashire, and the landing station for the transatlantic Apollo undersea cable at Bude in Cornwall.

Sites in the Middle East included the shipping lanes of Djibouti, an import terminal in Egypt, the Suez Canal and the oil terminal in Basra, Iraq.

Called the Critical Foreign Dependencies Initiative, the list divides the world into six regions. It makes clear how the US depends on a range of substances from smallpox vaccines in Denmark to bauxite in Guinea and liquefied natural gas in the Middle East.

Also listed is a facility making the rabies vaccines in France and typhoid vaccines in Switzerland.

It also includes the email and direct telephone numbers of two State Department officials compiling the information.

————————————-

With a Swedish warrant for sexual assault hanging over his head, Julian Assange is again making blackmail threats against the US Government, warns the New York Post.

WikiLeaks founder Julian Assange has circulated across the internet an encrypted “poison pill” cache of uncensored documents suspected to include files on BP and Guantanamo Bay.

One of the files identified this weekend by The (London) Sunday Times — called the “insurance” file — has been downloaded from the WikiLeaks website by tens of thousands of supporters, from America to Australia.

Assange warns that any government that tries to curtail his activities risks triggering a new deluge of state and commercial secrets.

The military papers on Guantanamo Bay, yet to be published, believed to have been supplied by Bradley Manning, who was arrested in May. Other documents that Assange is confirmed to possess include an aerial video of a US airstrike in Afghanistan that killed civilians, BP files and Bank of America documents.

One of the key files available for download — named insurance.aes256 — appears to be encrypted with a 256-digit key. Experts said last week it was virtually unbreakable.

Assange has warned he can divulge the classified documents in the insurance file and similar backups if he is detained or the WikiLeaks website is permanently removed from the internet. He has suggested the contents are unredacted, posing a possible security risk for coalition partners around the world.

Assange warned: “We have over a long period of time distributed encrypted backups of material we have yet to release. All we have to do is release the password to that material, and it is instantly available.”

————————————-
What is Assange doing?

L.Gordon Crovitz explains that Julian Assange is a leftwing radical employing a new form of information warfare, using its own information against the United States and the capitalist system in order to create a defensive reaction leading to paralysis.

The irony is that WikiLeaks’ use of technology to post confidential U.S. government documents will certainly result in a less free flow of information. The outrage is that this is Mr. Assange’s express intention. …

Mr. Assange is misunderstood in the media and among digirati as an advocate of transparency. Instead, this battening down of the information hatches by the U.S. is precisely his goal. The reason he launched WikiLeaks is not that he’s a whistleblower—there’s no wrongdoing inherent in diplomatic cables—but because he hopes to hobble the U.S., which according to his underreported philosophy can best be done if officials lose access to a free flow of information.

In 2006, Mr. Assange wrote a pair of essays, “State and Terrorist Conspiracies” and “Conspiracy as Governance.” He sees the U.S. as an authoritarian conspiracy. “To radically shift regime behavior we must think clearly and boldly for if we have learned anything, it is that regimes do not want to be changed,” he writes. “Conspiracies take information about the world in which they operate,” he writes, and “pass it around the conspirators and then act on the result.”

His central plan is that leaks will restrict the flow of information among officials—”conspirators” in his view—making government less effective. Or, as Mr. Assange puts it, “We can marginalize a conspiracy’s ability to act by decreasing total conspiratorial power until it is no longer able to understand, and hence respond effectively to its environment. . . . An authoritarian conspiracy that cannot think efficiently cannot act to preserve itself.”

Berkeley blogger Aaron Bady last week posted a useful translation of these essays. He explains Mr. Assange’s view this way: “While an organization structured by direct and open lines of communication will be much more vulnerable to outside penetration, the more opaque it becomes to itself (as a defense against the outside gaze), the less able it will be to ‘think’ as a system, to communicate with itself.” Mr. Assange’s idea is that with enough leaks, “the security state will then try to shrink its computational network in response, thereby making itself dumber and slower and smaller.”

Or as Mr. Assange told Time magazine last week, “It is not our goal to achieve a more transparent society; it’s our goal to achieve a more just society.” If leaks cause U.S. officials to “lock down internally and to balkanize,” they will “cease to be as efficient as they were.”

————————————-

Breaking News just tweeted:

WikiLeaks says its servers at Swedish ISP non-responsive.

04 Dec 2010

Wikileaks Reveals US Climate Change Skullduggery

, ,

Of course, praying to jaguar goddesses addicted to human sacrifice may not really be so inappropriate, if you happen to be a member of the international bureaucratic clerisy using alleged Anthropogenic climate change as a tool for gaining economic advantage.

The latest Wikileaks document dump, reports the Guardian, reveals that US diplomats used threats and bribery and spied on developing countries in an underhanded effort to force them to conform to a regulatory regime dictated by the leading Western governments.

Hidden behind the save-the-world rhetoric of the global climate change negotiations lies the mucky realpolitik: money and threats buy political support; spying and cyberwarfare are used to seek out leverage.

The US diplomatic cables reveal how the US seeks dirt on nations opposed to its approach to tackling global warming; how financial and other aid is used by countries to gain political backing; how distrust, broken promises and creative accounting dog negotiations; and how the US mounted a secret global diplomatic offensive to overwhelm opposition to the controversial “Copenhagen accord”, the unofficial document that emerged from the ruins of the Copenhagen climate change summit in 2009.

Negotiating a climate treaty is a high-stakes game, not just because of the danger warming poses to civilisation but also because re-engineering the global economy to a low-carbon model will see the flow of billions of dollars redirected.

01 Dec 2010

“Every Other Government in the World Knows the United States Government Leaks Like a Sieve”

, , ,

Michael Yon passed along this email from the office of Defense Secretary Robert Gates, in which Gates magisterially dismisses the significance of Julian Assange’s latest revelations.

One of the common themes that I heard from the time I was a senior agency official in the early 1980s in every military engagement we were in was the complaint of the lack of adequate intelligence support. That began to change with the Gulf War in 1991, but it really has changed dramatically after 9/11.

And clearly the finding that the lack of sharing of information had prevented people from, quote/unquote, “connecting the dots” led to much wider sharing of information, and I would say especially wider sharing of information at the front, so that no one at the front was denied — in one of the theaters, Afghanistan or Iraq — was denied any information that might possibly be helpful to them. Now, obviously, that aperture went too wide. There’s no reason for a young officer at a forward operating post in Afghanistan to get cables having to do with the START negotiations. And so we’ve taken a number of mitigating steps in the department. I directed a number of these things to be undertaken in August.

First, the — an automated capability to monitor workstations for security purposes. We’ve got about 60 percent of this done, mostly in — mostly stateside. And I’ve directed that we accelerate the completion of it.

Second, as I think you know, we’ve taken steps in CENTCOM in September and now everywhere to direct that all CD and DVD write capability off the network be disabled. We have — we have done some other things in terms of two-man policies — wherever you can move information from a classified system to an unclassified system, to have a two-person policy there. …

[L]et me just offer some perspective as somebody who’s been at this a long time. Every other government in the world knows the United States government leaks like a sieve, and it has for a long time. And I dragged this up the other day when I was looking at some of these prospective releases. And this is a quote from John Adams: “How can a government go on, publishing all of their negotiations with foreign nations, I know not.”

To me, it appears as dangerous and pernicious as it is novel.”

When we went to real congressional oversight of intelligence in the mid-’70s, there was a broad view that no other foreign intelligence service would ever share information with us again if we were going to share it all with the Congress. Those fears all proved unfounded.

Now, I’ve heard the impact of these releases on our foreign policy described as a meltdown, as a game-changer, and so on. I think — I think those descriptions are fairly significantly overwrought. The fact is, governments deal with the United States because it’s in their interest, not because they like us, not because they trust us, and not because they believe we can keep secrets. Many governments — some governments deal with us because they fear us, some because they respect us, most because they need us. We are still essentially, as has been said before, the indispensable nation.

So other nations will continue to deal with us. They will continue to work with us. We will continue to share sensitive information with one another.

Is this embarrassing? Yes. Is it awkward? Yes. Consequences for U.S. foreign policy? I think fairly modest.

Ouch! One can picture Julian Assange’s flaccid lower lip protruding glumly at being so contemptuously dismissed, and in the middle of his most recent 15 minutes of fame, too.

30 Nov 2010

Wikileaks’ Mirror Sites Defy US Authority

, , ,

Cade Metz, in the Register, outlines the technological strategy that allows Wikileaks to use host-servers on US soil, while enjoying impunity from interference by federal authorities.

WikiLeaks is hosting its cache of confidential US Statement Department cables on US-based Amazon servers, just as it did with with the classified Iraq War documents it released last month.

According to NetCraft’s records, the whistle-blowing website is mirroring the diplomatic cables on Amazon’s US-based EC2 service and France-based servers operated by French ISP Octopuce. The main WikiLeaks site is mirrored on Ireland-based Amazon servers.

WikiLeaks also uses a US-based domain name registrar (Dynadot) and a US-based DNS service (EveryDNS).

In theory, if the US government decides that WikiLeaks has broken the law in publishing federal intelligence data, it could move to have WikiLeaks booted from such US-based servers. But WikiLeaks could simply fall back on its core servers — presumably still hosted by “bulletproof” Swedish hosting outfit PRQ — and the feds would take a PR hit.

Clearly, this is how WikiLeaks reads the situation, as it continues to use Amazon’s US-based “cloud” service to accomodate extra demand for its data.

In an added twist, the whistle-blower is also using software from Seattle-based outfit Tableau to visually map its trove of leaked diplomatic cables. Tableau grew out of a project run by the US Department of Defense.

29 Nov 2010

Most Amusing Leak

, ,


Ramzan Kadryov (center) and friends

New York Times describes a Russian politico who knows how to party.

In a 2006 account, a wide-eyed American diplomat describes the lavish wedding of a well-connected couple in Dagestan, in Russia’s Caucasus, where one guest is the strongman who runs the war-ravaged Russian republic of Chechnya, Ramzan Kadyrov.

The diplomat tells of drunken guests throwing $100 bills at child dancers, and nighttime water-scooter jaunts on the Caspian Sea.

“The dancers probably picked upwards of USD 5000 off the cobblestones,” the diplomat wrote. The host later tells him that Ramzan Kadyrov “had brought the happy couple ‘a five-kilo lump of gold’ as his wedding present.”

“After the dancing and a quick tour of the premises, Ramzan and his army drove off back to Chechnya,” the diplomat reported to Washington. “We asked why Ramzan did not spend the night in Makhachkala, and were told, ‘Ramzan never spends the night anywhere.’ ”

Your are browsing
the Archives of Never Yet Melted in the 'Wikileaks' Category.
/div>








Feeds
Entries (RSS)
Comments (RSS)
Feed Shark