Stratfor hires former U.S. government agents, and bribes insiders and journalists (possibly in contravention to the Foreign Corrupt Practices Act).
Wikileaks announces the initial release from a trove of 5 million Stratfor emails hacked by the group Anonymous.
CD Quality listen/download here:
http://www.ecoshock.net/eshock12/ES_120307_Show.mp3
Stratfor emails brag about access to secret and classified U.S. government information. (When will they be investigated and charged?)
In one case, Stratfor agent Fred Burton suggests access to FBI files on PETA (People for the Ethical Treatment of Animals) for his client Coca Cola, regarding the Vancouver Winter Olympics 2010.
Other emails brag about access to drone attack info, and documents from Bin Laden's safe house.
The Stratfor emails also reveal a multinational effort to attack Wikileaks Editor in Chief Julian Assange. The promise to bankrupt him, plot to remove his Australian citizenship, and to jail him for decades if not life, using a secret Grand Jury indictment which Stratfor knows about (again, illegally). One Stratfor agent suggests killing Assange.
Surely the British Courts have to take these threats to Julian Assange seriously, in his case to avoid extradition to Sweden (the mid-way stop to mistreatment and life in prison in America, for this Australian citizen).
Stratfor has been shown to be incompetent, but still does planning for the U.S. Marines, and reports for the Air Force. It's a nest of vipers, as heard this week on Radio Ecoshock.
Includes direct source material, including analysis by Julian Assange of harmful big media mergers, not published elsewhere.
Support Julian Assange at http://www.wikileaks.org
Comments
Hide the following comment
arrest
08.03.2012 22:47
a/k/a “crediblethreat,”
Jeremy Hammond is being charged with the computer hack on Stratfor.
Jeremy Hammond talk at Defcon regarding electronic civil disobedience
http://video.google.com/videoplay?docid=1269112265902193941
Jeremy Hammond - Chicago Magazine Article
http://www.chicagomag.com/Chicago-Magazine/July-2007/The-Hacktivist/
Feb. 27 WikiLeaks press conference: The Global Intelligence Files
http://www.ustream.tv/recorded/20736311
INSIGHT - CT/CYBER - cyber and internet governance issues - EU105
http://wikileaks.org/gifiles/docs/167291_-alpha-insight-ct-cyber-cyber-and-internet-governance-issues.html
http://wikileaks.org/gifiles/attach/13/13943_GSC-CyberBulletin-4-October-2011.pdf
Re: hacker questions
http://wikileaks.org/gifiles/docs/1549513_re-hacker-questions-.html
Fwd: Re: US 'to view major cyber attacks as acts of war'
http://wikileaks.org/gifiles/docs/1661172_fwd-re-us-to-view-major-cyber-attacks-as-acts-of-war-.html
Cyber Security Question...
http://wikileaks.org/gifiles/docs/5482669_cyber-security-question-.html
Re: cybersecurity
http://wikileaks.org/gifiles/docs/5514431_re-cybersecurity-.html
re encryption guidance
http://wikileaks.org/gifiles/docs/3464416_re-encryption-guidance-.html
http://wikileaks.org/gifiles/docs/3546963_re-encryption-guidance-.html
palantir software
http://wikileaks.org/gifiles/docs/745547_re-ct-tactical-palantir-software-.html
open-source-practice
http://wikileaks.org/gifiles/docs/5091635_re-a-thought-on-open-source-practice-.html
DHS - Safeguarding Sensitive Information
http://cryptocomb.org/DHS-Safeguarding-Sensitive-FOUO-Information.pdf
Anon Project Mayhem DHS Report
http://cryptocomb.org/Project-Mayhem-DHS.pdf
PROTECTING SENSITIVE COMPARTMENTED INFORMATION WITHIN INFORMATION SYSTEMS - (SCIF Manual)
http://cryptocomb.org/Protecting-SCI-Within-is-Manual-2004-FOUO.pdf
DHS Training Documents/Presentations regarding surveillance practices/procedures
http://cryptocomb.org/DHS-training-materials-csoghoian-foia.zip
INTELLIGENCE SUPPORT TO URBAN OPERATIONS
http://cryptocomb.org/FM_2-91.4_Intelligence_Support_to_Urban_Operations_(FOUO)_(Jan_2008).pdf
Building your presence with Facebook Pages: A guide for Military Organizations
http://cryptocomb.org/FacebookGuideMilitaryOrgs.pdf
Homeland Security and Intelligence: Next Steps in Evolving the Mission
http://cryptocomb.org/Next_Steps_in_Evolving_the_Mission.pdf
DoD Handling Dissent/Protest by Service Members
http://cryptome.org/dodi/dodi-1325-06.pdf
Computer (In)security:Infiltrating Open Systems
http://cryptome.org/compinsec.htm
DARPA RFP for Cyber Insider Threat
http://cryptome.org/dodi/cinder.pdf
us-dhs-leftwing-extremist-cyber-threat
http://wlstorage.net/file/us-dhs-leftwing-extremist-cyber-threat.pdf
NSA Overview of Cloud Computing
http://cryptome.org/2012/01/nsa-cloud.pdf
Security and Privacy in Public Cloud Computing
http://cryptome.org/0003/SP-800-144.pdf
DHS Updates Social Media Spying Targets
http://cryptome.org/2012/01/dhs-sm-spy-a.pdf
DHS Joint Cybersecurity Services Pilot
http://cryptome.org/2012/01/0080.pdf
NSA Review of Information for the Public
http://cryptome.org/2012/01/0072.pdf
FBI Social Media and Open Sources Spying
http://cryptome.org/2012/01/0065.pdf
British Bases in Cyprus and Signals Intelligence
http://cryptome.org/2012/01/0060.pdf
Internet Trust Next Generation
http://cryptome.org/2012/01/0042.pdf
PGP Spying
http://cryptome.org/2012/01/0013.pdf
285 Pages of DHS Media Monitoring Docs
http://epic.org/foia/epic-v-dhs-media-monitoring/EPIC-FOIA-DHS-Media-Monitoring-12-2012.pdf
Navy Critical Infrastructure Program
http://cryptome.org/dodi/secnav-3501-1c.pdf
Air Force COMINT Solicitation
http://cryptome.org/0006/af-comint-sol.pdf
Militarizing Civil Agencies for Peace of Mind
http://cryptome.org/0005/gsa-1122.zip
Raytheon Cybersecurity Technology
http://cryptome.org/0005/raytheon-cysec.zip
Raytheon Intelligence and Information Systems
http://cryptome.org/raytheon-iis.pdf
Critical Infrastructure Needs Cybersecurity
http://cryptome.org/0005/gao-11-865t.pdf
Marine Full Spectrum Cyberspace Operations
http://cryptome.org/dodi/usmc-cyber.zip
DoD Strategy for Operating in Cyberspace
http://cryptome.org/0005/dod-cyberspace.zip
FBI Computer Patheticism
http://cryptome.org/nara/fbi/fbi-04-0204.pdf
Smart Grid Cybersecurity Weaknesses
http://cryptome.org/0003/gao-11-117.zip
http://cryptome.org/0003/nistir-7628.zip
http://cryptome.org/0002/doe100510-2.pdf
http://cryptome.org/0002/doe100510.pdf
http://cryptome.org/2012/01/gao-12-507t.pdf
NSA And Computer Development
http://cryptome.org/0002/nsa-computers.pdf
Global Free Flow of Information on the Internet
http://cryptome.org/0002/doc092910.pdf
DARPA RFP for Cyber Insider Threat
http://cryptome.org/dodi/cinder.pdf
China Military and Security Developments 2010
http://cryptome.org/dodi/cmpr-2010.zip
False Blogs and Military Information Strategy
http://cryptome.org/dodi/jsou-06-5.pdf
Electronic Intelligence (ELINT) at NSA
http://cryptome.org/nsa-elint.zip
Field Manual 2.0 Intelligence
http://cryptome.org/dodi/fm-2-0-intel.zip
Covert Blogs as Military Information Operations
http://cryptome.org/covert-blogs.zip
Soviet Capabilities in Electronic Warfare
http://cryptome.org/soviet-ew.zip
http://cryptome.org/jya/rusigint.htm
How the FBI Surveils the Net
http://cryptome.org/fbi-cgvop.zip
UK Police Guide to Computer/Electronic Evidence
http://cryptome.org/acpo-guide.htm
NSA to intercept TETRA police networks
http://cryptome.org/nsa-tetra.htm
CIA Head Forsees Better Hackers
http://cryptome.org/jya/cia-hackers.htm
WarFighter Information
http://cryptome.org/jya/win-ndx.htm
Hackers Are Out to Get You
http://cryptome.org/jya/mirror.txt
r