Wikileaks: a Guide for American Law Librarians*

Total Page:16

File Type:pdf, Size:1020Kb

Wikileaks: a Guide for American Law Librarians* LAW LIBRARY JOURNAL Vol. 104:2 [2012-20] WikiLeaks: A Guide for American Law Librarians* James p. Kelly, Jr.** In posting confidential and classified information, WikiLeaks has become one of the world’s most controversial web sites. This paper examines the federal law concerning WikiLeaks and the use of WikiLeaks as an information source. It raises questions librarians must ask themselves as technology advances and leaks continue. Background . .246 Legal Troubles. .248 Financial Troubles . .249 The Espionage Act. 250 New York Times Co. v. United States. .251 United States v. Rosen. .253 Other Relevant Statutes . .254 18 U.S.C. § 641. 254 50 U.S.C. § 421. 254 18 U.S.C. § 1030(a)(1). 254 Prosecuting WikiLeaks Under Current Law. .254 Proposed Legislation. 255 Cases Involving WikiLeaks. .257 A Host of Research Problems. .258 The Congressional Research Service and the Library of Congress. 258 Reliability and Moral Quandaries. .259 Conclusion . 261 ¶1 WikiLeaks has become one of the world’s most controversial web sites. In posting confidential and classified information from governments, businesses, and organizations around the world, it has become a target for those in power. Others have vigorously defended the web site, saying it promotes and defends the ideals of a free press and free speech that are vital to democracy. For librarians generally, WikiLeaks represents a new source for information that might otherwise be unavailable. However, how this information was acquired can present significant legal and ethical problems for its users. ¶2 This article examines WikiLeaks from a legal and a library perspective. While the legal status or problems of WikiLeaks in other countries is occasionally * © James P. Kelly, Jr., 2012. ** Access Services Research Librarian, Alyne Queener Massey Law Library, Vanderbilt University, Nashville, Tennessee. 245 246 Law LIBRARY JOURNAL Vol. 104:2 [2012-20] mentioned, it is devoted solely to the legal status of WikiLeaks in the United States and concerns only the legal status of the web site, Julian Assange, and the organiza- tion with regards to the information posted there. It does not address Assange’s other legal troubles or the status of WikiLeaks in other nations, except incidentally. The last part of the article discusses some of the issues WikiLeaks presents for librarians, particularly those of using WikiLeaks as a source for useful and other- wise unavailable information. No solutions are offered—the issues are raised for the purposes of awareness and debate. Background ¶3 WikiLeaks describes itself as “a not-for-profit media organisation.”1 Formed in 2007, the organization publishes “original source material” and news stories on its web site.2 WikiLeaks claims it is based on “the defence of freedom of speech and media publishing, the improvement of our common historical record and the sup- port of the rights of all people to create new history.”3 It sees itself as a news orga- nization and an outlet for whistle-blowers. Although it presents its news stories in a Wikipedia-like style, it has no relation to Wikipedia. Despite its name, WikiLeaks is not a wiki, so general users cannot edit documents.4 ¶4 Since its inception, the web site has stirred controversy for its publication of documents “of political, diplomatic, or ethical significance.”5 This has included, in many cases, publishing documents that have been classified by governments. The web site accepts anonymous sources of information and vets this information for accuracy and authenticity.6 The web site contains “a high security anonymous drop box fortified by cutting-edge cryptographic information technologies,”7 and places a high value on anonymity and protection of its sources: We use traditional investigative journalism techniques as well as more modern technol- ogy-based methods. Typically we will do a forensic analysis of the document, determine the cost of forgery, means, motive, opportunity, the claims of the apparent authoring organisa- tion, and answer a set of other detailed questions about the document. We may also seek external verification of the document.8 ¶5 One of the most important features of WikiLeaks, from a legal perspective, is that it claims it does not solicit information. It sees itself as a site for enabling 1. About, WiKileAKs, http://www.wikileaks.ch/About.html (last visited Jan. 4, 2012) [hereinaf- ter About WikiLeaks]. 2. Id. 3. Id. 4. Id. 5. Wikileaks: Submissions, WiKileAKs, archived version available at http://web.archive.org/web /20080419013425/http://www.wikileaks.org/wiki/Wikileaks:Submissions (last visited Jan. 27, 2012) (as of this writing the current WikiLeaks site has no active submissions page). 6. Submissions, WiKileAKs, http://www.wikileaks.org/Submissions (last visited Jan. 9, 2012). 7. About WikiLeaks, supra note 1. 8. Id. Vol. 104:2 [2012-20] WIKILeaks: A gUIde FOR AMeRICAN law LIBRARIANS 247 whistle-blowing. Rather than go directly to the press, whistle-blowers can go to WikiLeaks, and WikiLeaks can then leak to the press and public at large.9 ¶6 The web site’s “home,” the Internet host Bahnhof, is currently located in a bomb shelter in the mountains of Sweden.10 Because of its troubles and interna- tional scope, the web site has multiple URLs and has moved over time, but is cur- rently available at both http://www.wikileaks.org and http://www.wikileaks.ch. Most notably, WikiLeaks at one point moved its site to Amazon.com’s servers fol- lowing an attack by a hacker on its old servers. Amazon then ousted WikiLeaks, claiming WikiLeaks did not follow Amazon’s terms of service.11 ¶7 When Amazon ousted WikiLeaks, a group of hackers calling themselves “Anonymous” targeted the web sites of Amazon and other companies that had stopped working with WikiLeaks, such as Paypal, MasterCard, and Bank of America, along with critics of WikiLeaks like Senator Joseph Lieberman and former vice presidential candidate Sarah Palin, with distributed denial of service (DDoS) attacks, designed to shut the sites down.12 The attack against Amazon was not suc- cessful, but Paypal was down for a time.13 It does not appear that WikiLeaks was responsible, but the organization said the attacks reflected public opinion in sup- port of WikiLeaks.14 Indeed, the attacks seem to have been a coordinated effort by hackers who supported WikiLeaks’ cause.15 In July 2011, sixteen people in the United States and five in Europe were arrested for their alleged roles in the cyber attacks.16 ¶8 The public face of WikiLeaks is Julian Assange, an Australian publisher, jour- nalist, and former computer hacker. His status in the United States indicates how divisive a figure he has become: U.S. officials have called for his arrest, and Vice President Joseph Biden has characterized him as a terrorist,17 but he was voted Readers’ Choice for Time magazine’s 2010 Person of the Year.18 As of this writing, he resides in England while appealing an order of extradition to Sweden on charges 9. Id. 10. W.J. Hennigan, Wikileaks’ New Home Is in a Former Bomb Shelter, l.A. times: teChnology (Dec. 2, 2010, 11:07 A.m.), http://latimesblogs.latimes.com/technology/2010/12/wikileaks-bahnhof -amazon.html. 11. Id.; W.J. Hennigan, Amazon Says It Dumped Wikileaks Because It Put Innocent People in Jeopardy, l.A. times: teChnology (Dec. 2, 2010, 6:40 p.m.), http://latimesblogs.latimes.com /technology/2010/12/amazon-wikileaks-servers.html. 12. Sean-Paul Correll, ’Tis the Season of DDoS—WikiLeaks Edition, pAndAlAbs blog (Dec. 4, 2010), http://pandalabs.pandasecurity.com/tis-the-season-of-ddos-wikileaks-editio/. 13. Georgina Prodhan, WikiLeaks Supporters’ Group Abandons Cyber Attacks, reuters (Dec. 11, 2010), http://af.reuters.com/article/cameroonNews/idAFLDE6BA05O20101211. 14. David Meyer, Wikileaks Refuses to Back, Condemn Anonymous Attack, zdnet uK (Dec. 9, 2010), http://www.zdnet.co.uk/blogs/communication-breakdown-10000030/wikileaks-refuses-to -back-condemn-anonymous-attacks-10021275/. 15. Prodhan, supra note 13. 16. Press Release, Fed. Bureau of Investigation, Sixteen Individuals Arrested in the United States for Alleged Roles in Cyber Attacks (July 19, 2011), http://www.fbi.gov/news/pressrel/press-releases /sixteen-individuals-arrested-in-the-united-states-for-alleged-roles-in-cyber-attacks. 17. Andrew Ross Sorkin, A WikiLeaks Problem for Enforcers, n.y. times, Dec. 21, 2010, at B1. 18. Megan Friedman, Julian Assange: Readers’ Choice for TIME’s Person of the Year 2010, time neWsfeed (Dec. 13, 2010), http://newsfeed.time.com/2010/12/13/julian-assange-readers-choice-for -times-person-of-the-year-2010. 248 Law LIBRARY JOURNAL Vol. 104:2 [2012-20] of sexual assault.19 Assange claims the charges are false and politically moti- vated.20 Legal troubles ¶9 The nature of WikiLeaks and the information it has published has brought the organization into direct conflict with many governments, businesses, and orga- nizations. According to its web site, “since formation in 2007, WikiLeaks has been victorious over every legal (and illegal) attack, including those from the Pentagon, the Chinese Public Security Bureau, the former president of Kenya, the Premier of Bermuda, Scientology, the Catholic & Mormon Church, the largest Swiss private bank, and Russian companies.”21 Among some of the more contentious documents posted on WikiLeaks are more than 91,000 U.S. military reports related to the war in Afghanistan22 and almost 400,000 reports related to the war in Iraq.23 On April 5, 2010, WikiLeaks released one of its most controversial stories: a classified U.S. military video of a helicopter attack in Iraq in 2007 that resulted in the death of, among others, two Reuters correspondents.24 ¶10 In November 2010, WikiLeaks, along with several newspapers including the New York Times, released 250,000 U.S. diplomatic cables.25 Prior to the release, however, Julian Assange sent a letter to the U.S.
Recommended publications
  • JTF-GTMO Detainee Assessment
    S E C R E T //NOFORN I I 20320619 DEPARTMENTOF DEFENSE HEADQUARTERS,JOINT TASK FORCEGUANTANAMO U.S. NAVAL STATION,GUANTANAMO BAY, CUBA APO AE 09350 JTF-GTMO-CDR 19June 2007 MEMORANDUM FOR Commander,United StatesSouthem Command. 3511 NW 9lst Avenue. Miami,FL33172. SUBJECT: Recommendationfor ContinuedDetention Under DoD Control (CD) for GuantanamoDetainee, ISN: US9SA-000079DP(S) JTF-GTMO DetaineeAssessment 1. (S//NF) Personal Information: o JDIMSAIDRC ReferenceName: FahedA al-Harasi o Aliases and Current/True Name: Fahd Atiyah Hamza Hamid al-Harazi" Hassanal-Makki. FahedFahad" Khalid. Abu Hassan. al-Sharif. Abu Barak o Placeof Birth: Mecca. SaudiArabia (SA) o Date of Birth: 18 November 1978 o Citizenship: SaudiArabia o InternmentSerial Number (ISN): US9SA-000079DP 2. (U//T'OUO) Health: Detaineeis in good health. 3. (S//NF) JTF-GTMO Assessment: a. (S) Recommendation: JTF-GTMO recommendsthis detaineefor ContinuedDetention Under DoD Control (CD). JTF-GTMO previouslyassessed detainee for Continued Detentionwith TransferLanguage on 26May 2006. b. (S//NF) Executive Summary: Detaineeis reportedto be a memberof al-Qaida. He was identified as having attendedmilitant training and was an instructor at the al-Qaida al- Faruq Training Camp. Detaineewas in Afghanistan (AF) since 1999 during which he is assessedto have participated in hostilities againstUS and Coalition forces as a member of Classifiedby: MultipleSources REASON:E.O. 12958, AS AMENDED,Section 1.4(C) Declassi$on:20320619 S E C R E T //NOFORN I I 20320619 S E C R E T // NOFORN I I 20320619 JTF-GTMO.CDR SUBJECT: Recommendationfor ContinuedDetention Under DoD Control (CD) for GuantanamoDetainee, ISN: US9SA-000079DP(S) UsamaBin Laden's (UBL) 55th Arab Brigade.l Detainee'sname and aliaswere listed in recovereddocuments associated with al-Qaida, and the Saudi Ministry of Interior General Directorate of Investigations(Mabahith) identified him as a high priority detainee.
    [Show full text]
  • Inside Russia's Intelligence Agencies
    EUROPEAN COUNCIL ON FOREIGN BRIEF POLICY RELATIONS ecfr.eu PUTIN’S HYDRA: INSIDE RUSSIA’S INTELLIGENCE SERVICES Mark Galeotti For his birthday in 2014, Russian President Vladimir Putin was treated to an exhibition of faux Greek friezes showing SUMMARY him in the guise of Hercules. In one, he was slaying the • Russia’s intelligence agencies are engaged in an “hydra of sanctions”.1 active and aggressive campaign in support of the Kremlin’s wider geopolitical agenda. The image of the hydra – a voracious and vicious multi- headed beast, guided by a single mind, and which grows • As well as espionage, Moscow’s “special services” new heads as soon as one is lopped off – crops up frequently conduct active measures aimed at subverting in discussions of Russia’s intelligence and security services. and destabilising European governments, Murdered dissident Alexander Litvinenko and his co-author operations in support of Russian economic Yuri Felshtinsky wrote of the way “the old KGB, like some interests, and attacks on political enemies. multi-headed hydra, split into four new structures” after 1991.2 More recently, a British counterintelligence officer • Moscow has developed an array of overlapping described Russia’s Foreign Intelligence Service (SVR) as and competitive security and spy services. The a hydra because of the way that, for every plot foiled or aim is to encourage risk-taking and multiple operative expelled, more quickly appear. sources, but it also leads to turf wars and a tendency to play to Kremlin prejudices. The West finds itself in a new “hot peace” in which many consider Russia not just as an irritant or challenge, but • While much useful intelligence is collected, as an outright threat.
    [Show full text]
  • CIA Best Practices in Counterinsurgency
    CIA Best Practices in Counterinsurgency WikiLeaks release: December 18, 2014 Keywords: CIA, counterinsurgency, HVT, HVD, Afghanistan, Algeria, Colombia, Iraq, Israel, Peru, Northern Ireland, Sri Lanka, Chechnya, Libya, Pakistan, Thailand,HAMAS, FARC, PULO, AQI, FLN, IRA, PLO, LTTE, al-Qa‘ida, Taliban, drone, assassination Restraint: SECRET//NOFORN (no foreign nationals) Title: Best Practices in Counterinsurgency: Making High-Value Targeting Operations an Effective Counterinsurgency Tool Date: July 07, 2009 Organisation: Central Intelligence Agency (CIA) Author: CIA Office of Transnational Issues; Conflict, Governance, and Society Group Link: http://wikileaks.org/cia-hvt-counterinsurgency Pages: 21 Description This is a secret CIA document assessing high-value targeting (HVT) programs world-wide for their impact on insurgencies. The document is classified SECRET//NOFORN (no foreign nationals) and is for internal use to review the positive and negative implications of targeted assassinations on these groups for the strength of the group post the attack. The document assesses attacks on insurgent groups by the United States and other countries within Afghanistan, Algeria, Colombia, Iraq, Israel, Peru, Northern Ireland, Sri Lanka, Chechnya, Libya, Pakistan and Thailand. The document, which is "pro-assassination", was completed in July 2009 and coincides with the first year of the Obama administration and Leon Panetta's directorship of the CIA during which the United States very significantly increased its CIA assassination program at the
    [Show full text]
  • Wikileaks and the Institutional Framework for National Security Disclosures
    THE YALE LAW JOURNAL PATRICIA L. BELLIA WikiLeaks and the Institutional Framework for National Security Disclosures ABSTRACT. WikiLeaks' successive disclosures of classified U.S. documents throughout 2010 and 2011 invite comparison to publishers' decisions forty years ago to release portions of the Pentagon Papers, the classified analytic history of U.S. policy in Vietnam. The analogy is a powerful weapon for WikiLeaks' defenders. The Supreme Court's decision in the Pentagon Papers case signaled that the task of weighing whether to publicly disclose leaked national security information would fall to publishers, not the executive or the courts, at least in the absence of an exceedingly grave threat of harm. The lessons of the PentagonPapers case for WikiLeaks, however, are more complicated than they may first appear. The Court's per curiam opinion masks areas of substantial disagreement as well as a number of shared assumptions among the Court's members. Specifically, the Pentagon Papers case reflects an institutional framework for downstream disclosure of leaked national security information, under which publishers within the reach of U.S. law would weigh the potential harms and benefits of disclosure against the backdrop of potential criminal penalties and recognized journalistic norms. The WikiLeaks disclosures show the instability of this framework by revealing new challenges for controlling the downstream disclosure of leaked information and the corresponding likelihood of "unintermediated" disclosure by an insider; the risks of non-media intermediaries attempting to curtail such disclosures, in response to government pressure or otherwise; and the pressing need to prevent and respond to leaks at the source. AUTHOR.
    [Show full text]
  • Offensive Capabilities
    GCHQ and UK Mass Surveillance Chapter 5 5 Beyond signals intelligence: Offensive capabilities 5.1 Introduction Documents released by German magazine Der Spiegel provide a much richer picture of the offensive activities of the NSA and its allies, including the UK’s GCHQ.i The global surveillance infrastructure and hacking tools described in the previous chapters are not only used for obtaining information to be fed into intelligence reports and tracking terrorists. The agencies are also developing cyber-warfare capabilities, with the NSA taking the lead within the US armed forces. This militarisation of the internet saw U.S. intelligence services carried out 231 offensive cyber-operations in 2011ii. The UK's National Strategic Defence and Security Review from 2010 made hostile attacks upon UK cyberspace a major priorityiii. It is fair to assume that many countries are following suit and building cyber-warfare capabilities. Der Spiegel terms the development of these aggressive hacking tools as Digital Weapons. In their view D weapons which should join the ABC (Atomic, Biological and Chemical) weapons of the 20th century because of their indiscriminate nature. Here lies a fundamental problem. The modern world with connected global communications networks means that non-state actors such as civilians and businesses are now affected by the agencies’ activities much more frequently than before. The internet is used by everyone – cyberspace is mainly a civilian space – and the opportunity for collateral damage is huge. The papers leaked to Der Spiegel appear to show that signal agencies have little regard for the security and wellbeing of anyone who gets caught in the path of their operations.
    [Show full text]
  • Wikileaks, the First Amendment and the Press by Jonathan Peters1
    WikiLeaks, the First Amendment and the Press By Jonathan Peters1 Using a high-security online drop box and a well-insulated website, WikiLeaks has published 75,000 classified U.S. documents about the war in Afghanistan,2 nearly 400,000 classified U.S. documents about the war in Iraq,3 and more than 2,000 U.S. diplomatic cables.4 In doing so, it has collaborated with some of the most powerful newspapers in the world,5 and it has rankled some of the most powerful people in the world.6 President Barack Obama said in July 2010, right after the release of the Afghanistan documents, that he was “concerned about the disclosure of sensitive information from the battlefield.”7 His concern spread quickly through the echelons of power, as WikiLeaks continued in the fall to release caches of classified U.S. documents. Secretary of State Hillary Clinton condemned the slow drip of diplomatic cables, saying it was “not just an attack on America's foreign policy interests, it [was] an attack on the 1 Jonathan Peters is a lawyer and the Frank Martin Fellow at the Missouri School of Journalism, where he is working on his Ph.D. and specializing in the First Amendment. He has written on legal issues for a variety of newspapers and magazines, and now he writes regularly for PBS MediaShift about new media and the law. E-mail: [email protected]. 2 Noam N. Levey and Jennifer Martinez, A whistle-blower with global resonance; WikiLeaks publishes documents from around the world in its quest for transparency, L.A.
    [Show full text]
  • Mass Surveillance
    Mass Surveillance Mass Surveillance What are the risks for the citizens and the opportunities for the European Information Society? What are the possible mitigation strategies? Part 1 - Risks and opportunities raised by the current generation of network services and applications Study IP/G/STOA/FWC-2013-1/LOT 9/C5/SC1 January 2015 PE 527.409 STOA - Science and Technology Options Assessment The STOA project “Mass Surveillance Part 1 – Risks, Opportunities and Mitigation Strategies” was carried out by TECNALIA Research and Investigation in Spain. AUTHORS Arkaitz Gamino Garcia Concepción Cortes Velasco Eider Iturbe Zamalloa Erkuden Rios Velasco Iñaki Eguía Elejabarrieta Javier Herrera Lotero Jason Mansell (Linguistic Review) José Javier Larrañeta Ibañez Stefan Schuster (Editor) The authors acknowledge and would like to thank the following experts for their contributions to this report: Prof. Nigel Smart, University of Bristol; Matteo E. Bonfanti PhD, Research Fellow in International Law and Security, Scuola Superiore Sant’Anna Pisa; Prof. Fred Piper, University of London; Caspar Bowden, independent privacy researcher; Maria Pilar Torres Bruna, Head of Cybersecurity, Everis Aerospace, Defense and Security; Prof. Kenny Paterson, University of London; Agustín Martin and Luis Hernández Encinas, Tenured Scientists, Department of Information Processing and Cryptography (Cryptology and Information Security Group), CSIC; Alessandro Zanasi, Zanasi & Partners; Fernando Acero, Expert on Open Source Software; Luigi Coppolino,Università degli Studi di Napoli; Marcello Antonucci, EZNESS srl; Rachel Oldroyd, Managing Editor of The Bureau of Investigative Journalism; Peter Kruse, Founder of CSIS Security Group A/S; Ryan Gallagher, investigative Reporter of The Intercept; Capitán Alberto Redondo, Guardia Civil; Prof. Bart Preneel, KU Leuven; Raoul Chiesa, Security Brokers SCpA, CyberDefcon Ltd.; Prof.
    [Show full text]
  • Download the PDF File
    S E C RE T //NOFORN I I 20310825 DEPARTMENT OF DEFENSE JOINT TASK FORCE GUANTANAMO GUANTANAMO BAY, CI,IBA APO AE 09360 JTF-GTMO-CC 25 August2006 MEMORANDUM FOR Commander,United StatesSouthern Command, 3511 NW 9lst Avenue. Miami. FL33172 SUBJECT: Recommendationfor Continued Detention Under DoD Control (CD) for GuantanamoDetainee, ISN: US9SA-000230DP(S) JTF-GTMODetainee Assessment 1. (S/NF) PersonalInformation: o JDIMSAIDRC ReferenceName: Hamud Dakhil Hamud o Aliases and Current/True Name: Talut al-Jeddawi. Humud Dakhil Humud Said al-Jadani.Hamud Sultan.Nag Mohammad. Safwan the Afghan o Placeof Birth: Jeddah.Saudi Arabia (SA) o Dateof Birth: 22May 1973 o Citizenship: SaudiArabia o InternmentSerial Number (ISN): US9SA-000230DP 2. (FOUO) Health: Detaineeis in goodhealth. 3. (S//NF) JTF-GTMOAssessment: a. (S) Recommendation: JTF-GTMOrecommends this detaineefor Continued DetentionUnder DoD Control(CD). JTF-GTMOpreviously assessed detainee as Continued DetentionUnder DoD Control(CD) on 5 September2005. b. (S/NF) Executive Summary: Detaineeis assessedto be a memberof al-Qaidawith an extensivehistory of militantjihad. Detaineeis an admittedleader of armedfighters in ToraBora duringhostilities against US forcesand associated with severalsenior al-Qaida members.He receivedbasic and advanced training in Chechnyaand Afghanistan (AF) CLASSIFIEDBY: MULTIPLESOURCES REASON:E.O. 12958 SECTION 1.5(C) DECLASSIFYON: 203108 1 I S E C RE T // NOFORNI I 20310825 S E C R E T // NOFORNI I 20310825 JTF-GTMO-CC SUBJECT:Recommendation for ContinuedDetention Under DoD Control(CD) for GuantanamoDetainee, ISN: US9SA-000230DP (S) includingtraining on smallarns, explosives,mortars, and anti-aircraft weaponry. JTF- GTMO determinedthis detaineeto be: o A HIGH risk, as he is likely to posea threatto the US, its interestsand allies.
    [Show full text]
  • An Oft Overlooked Response Option to Hostile Cyber Operations
    The Plea of Necessity: An Oft Overlooked Response Option to Hostile Cyber Operations Louise Arimatsu and Michael N. Schmitt 97 INT’L L. STUD. 1171 (2021) Volume 97 2021 Published by the Stockton Center for International Law ISSN 2375-2831 The Plea of Necessity Vol. 97 The Plea of Necessity: An Oft Overlooked Response Option to Hostile Cyber Operations Louise Arimatsu∗ and Michael N. Schmitt∗∗ CONTENTS I. Introduction ........................................................................................... 1172 II. Uncertainty and Limitations in the Law of Self-Defense ............... 1175 III. Uncertainty and Limitations in the Law of Countermeasures ....... 1179 IV. Necessity as a Response Option ......................................................... 1181 A. Threshold .................................................................................... 1183 B. Limitations................................................................................... 1191 C. Assistance by Other States? ...................................................... 1194 D. Geography ................................................................................... 1197 V. Concluding Thoughts ........................................................................... 1198 ∗ Distinguished Policy Fellow, Centre for Women, Peace and Security, London School of Economics. ∗∗ Professor of International Law, University of Reading; Francis Lieber Distinguished Scholar, U.S. Military Academy at West Point; Charles H. Stockton Distinguished Scholar- in-Residence,
    [Show full text]
  • Wikileaks.Org
    U.S. Intelligence planned to destroy WikiLeaks WikiLeaks release: March 15, 2010 keywords: WikiLeaks, U.S. intelligence, U.S. Army, National Ground Intelligence Center, NGIC, classified, SE- CRET, NOFORN restraint: Classified SECRET/NOFORN (US) title: Wikileaks.org - An Online Reference to Foreign Intelligence Services, Insurgents, Or Terrorist Groups? date: March 18, 2008 group: United States Army Counterintelligence Center, Cyber Counterintelligence Assessments Branch; De- partment of Defence Intelligence Analysis Program author: Michael D. Horvath link: http://wikileaks.org/file/us-intel-wikileaks.pdf pages: 32 Description By Julian Assange ([email protected]) This document is a classifed (SECRET/NOFORN) 32 page U.S. counterintelligence investigation into WikiLeaks. “The possibility that current employees or moles within DoD or elsewhere in the U.S. government are providing sensitive or classified information to Wikileaks.org cannot be ruled out”. It concocts a plan to fatally marginalize the organization. Since WikiLeaks uses “trust as a center of gravity by protecting the anonymity and identity of the insiders, leakers or whisteblowers”, the report recommends “The identification, exposure, termination of employment, criminal prosecution, legal action against current or former insiders, leakers, or whistlblowers could potentially damage or destroy this center of gravity and deter others considering similar actions from using the Wikileaks.org Web site”. [As two years have passed since the date of the report, with no WikiLeaks’ source exposed, it appears that this plan was ineffective]. As an odd justificaton for the plan, the report claims that “Several foreign countries including China, Israel, North Kora, Russia, Vietnam, and Zimbabwe have denounced or blocked access to the Wikileaks.org website”.
    [Show full text]
  • Stuxnet, Schmitt Analysis, and the Cyber “Use-Of-Force” Debate
    Members of International Telecommunications Union and UN Institute for Training and Research confer on cyber security UN (Jean-Marc Ferré) UN (Jean-Marc Stuxnet, Schmitt Analysis, and the Cyber “Use-of-Force” Debate By ANDREW C. FOLTZ All Members shall refrain in ne of the many seemingly advance the specific criteria states will use in intractable legal issues sur- making such determinations. their international relations rounding cyberspace involves As discussed in this article, several ana- from the threat or use of force O whether and when peacetime lytic frameworks have been developed to help against the territorial integ- cyber operations constitute a prohibited use of assess when cyber operations constitute a use force under Article 2(4) of the United Nations of force.3 One conclusion these frameworks rity or political independence (UN) Charter. Notwithstanding a significant share is that cyber operations resulting in of any state, or in any other body of scholarly work on this topic and physical damage or injury will almost always manner inconsistent with extensive real-world examples from which to be regarded as a use of force. When these draw, there is no internationally recognized frameworks were developed, however, there the Purposes of the United definition of a use of force.2 Rather, what has were few, if any, examples of peacetime, state- Nations. emerged is a general consensus that some sponsored cyber coercion. More importantly, cyber operations will constitute a use of force, the prospect of cyber attacks causing physical —Article 2(4), Charter of the but that it may not be possible to identify in damage was largely theoretical.4 Beginning United Nations1 Lieutenant Colonel Andrew C.
    [Show full text]
  • Asia Pacific Bulletin | August 2, 2010 War Effort
    Asia Pacific Bulletin Number 65 | August 2, 2010 WikiLeaks Intensifies Afghanistan Debate BY GAUTAM ADHIKARI On the face of it, they are not particularly revealing documents. The over 90,000 classified U.S. military papers released by WikiLeaks are apparently intended to unveil what was unknown about the conduct of the war in Afghanistan. To those who have followed that war closely, there is not much that is strikingly new in the revelations. Nevertheless, the exposé is significant on at least two counts. First, within hours of their publication they have begun to strengthen anti-war Gautam Adhikari, FICCI-EWC sentiment, both among those who were against the war from the start, as well as those who were watching and waiting, and growing increasingly skeptical of a costly Visiting Fellow at the East-West exercise in a faraway wilderness that was taking more and more American lives, with Center in Washington, explains no winning outcome in sight. Such sentiments abound on the left and the right of the that “The over 90,000 political spectrum, and which are also gaining strength on Capitol Hill. And, frankly, classified U.S. military papers one cannot be certain exactly where President Obama stands on this issue. released by WikiLeaks are One could go by what his press secretary, Robert Gibbs, said the day after the papers apparently intended to unveil were published: “We are in this region because of what happened on 9/11.” The what was unknown about the United States, said Gibbs, wanted to “ensure that there is not a safe haven in Afghanistan by which attacks against this country and countries around the world can conduct of the war in be planned.” But, given the changing political climate, will President Obama and his Afghanistan.
    [Show full text]