Implications of Wikileaks Publishing Details of CIA's Cyber Arsenal

Total Page:16

File Type:pdf, Size:1020Kb

Implications of Wikileaks Publishing Details of CIA's Cyber Arsenal Implications of Wikileaks Publishing Details of CIA’s Cyber Arsenal ANKURA CONSULTING CYBERSECURITY & GEOPOLITICAL TEAMS CONSIDER THE FALLOUT OF WIKILEAKS’ REVELATIONS SUMMARY On Tuesday, March 7th, WikiLeaks, the whistle-blowing website run by Julian Assange, released a cache of Central In- telligence Agency (CIA) documents known as “Vault 7,” which contain details of CIA hacking tools. The cache included approximately 9,000 documents, dating from 2013 to 2016, which describe spyware, malware, and other tools allegedly used by the CIA to bypass encrypted messaging services by penetrating computer and mobile operating systems in- cluding Apple’s iOS and Google’s Android. It also suggests that developers can inject these tools without the owners’ knowledge, thus turning computers, network routers, smartphones, and web-enabled household appliances, electron- ics, and “smart” systems into remote spying devices. The documents also have the potential to reveal unprecedented detail about the CIA’s electronic spying tools at tremendous cost to US national security. It has been widely reported in the media that the CIA has identified Russian officials as having fed materials hacked from the Democratic National Committee to WikiLeaks. In fact, it has also been said that the US intelligence com- munity believes WikiLeaks has a relationship with Russian intelligence, even if WikiLeaks is simply being used as an outlet for leaked material damaging to the US. On September 7, in the aftermath of the Russian breach of the Democratic National Committee’s servers, James Clapper, ________________________________ then-director of national intelligence, stated, “The Russians hack our systems all the THE RUSSIANS HACK OUR time, not just government but also corporate and personal systems.” On March 20, SYSTEMS ALL THE TIME, FBI director James Comey confirmed the existence of an official investigation into the NOT JUST GOVERNMENT allegation that the Russians did in fact use cyber attacks to interfere in and influence BUT ALSO CORPORATE the outcome of the 2016 US Presidential election. The Vault 7 release has already AND PERSONAL SYSTEMS inflamed the political dialog over Russian interference in the 2016 US election, and ________________________________ will now likely contribute to the increasing fear that Moscow is using the same cyber tactics to influence upcoming European elections. It should come as no surprise to anyone that the CIA has invested heavily in leading-edge cyber hacking methods to further its intelligence gathering mission. Contrary to the claims of WikiLeaks, the revelations thus far do not indicate vulnerabilities in commercial decryption or encryption tools. Instead, the Vault 7 discoveries indicate that commercial encryption is so strong that the CIA would need to inject surveillance tools onto each individual device to be able to read data prior to encryption. This process requires a much more laborious and tedious mix of human and technical intelligence, focused specifically on an individual or individuals being targeted, rather than just overriding technology en masse. The fact that today’s encryption technology is so strong that the CIA cannot break it without embedded sur- INSIGHTS veillance techniques should reassure all who practice good cyber security protocols. But everyone should be clear that it does not mean that people and companies are completely safe from other types of cyber attacks, particularly insider threats that bypass encryption by originating behind the firewall or the use of embedded surveillance by increasingly sophisticated cyber criminals. Michelle DiGruttolo, Head of Ankura’s Geopolitical Practice, said, “It is worrisome that because of this leak, people now think that the CIA can simply turn home appliances into surveillance tools. This is not true. The reason why this leak is concerning is a much greater issue. The real reason is that important coding details connected to cyber tools are now available to criminals, which potentially puts commercial secrets at risk. Also, from a technical standpoint, the leaks have revealed novel and heretofore unknown methods, at least to the average consumer, for transforming everyday electronic equipment into effective surveillance tools.” IoT VULNERABILITIES If the WikiLeaks allegations and materials are accurate, this is a clear demonstration of the fundamental vulnerability of the Internet of Things (IoT) devices manufactured for mass entertainment and consumer productivity rather than security. For example, the WikiLeaks writer notes that the CIA considered leveraging these newly discovered tactics to exploit a smart TV as a voice-recording mechanism. ________________________________ Senior Managing Director of Ankura’s Cybersecurity Practice, Luke Tenery, advises ORGANIZATIONS SHOULD that “organizations should consider that a broad mix of consumer technologies, nev- CONSIDER THAT A BROAD er identified as such before, can now become threat vectors which might allow in- MIX OF CONSUMER TECH- telligence-gathering actors to probe and attack adversaries.” An example of this was NOLOGIES, NEVER IDENTI- the October 21, 2016 IoT Distributed Denial of Service (DDoS) attack in which the Do- FIED AS SUCH BEFORE, CAN main Name System (DNS) provider “Dyn” was significantly disrupted, subsequently NOW BECOME THREAT VEC- impacting the availability of major internet platforms and services across the globe. TORS WHICH MIGHT AL- During this attack, the now-identified ‘Mirai’ botnet was used, an unprecedented cy- LOW INTELLIGENCE-GATH- ber incident comprised of nontraditional devices, including approximately 50,000 closed circuit television cameras. These devices, in retrospect, were very easily com- ERING ACTORS TO PROBE promised due to the use of simple default passwords. Tenery continues, “The exact ________________________________AND ATTACK ADVERSARIES same botnet technique could be applied today to launch similar attacks. The CCTV cameras are the tip of the iceberg, as more and more devices – regardless of whether it makes sense or not – are being sold with ‘smart’ capabilities and with internet connectivity. Hacking communities now have a much larger repertoire of tools to choose from – and their toolbox is growing every day – when they formulate these types of attacks.” These cyber incidents present a new reality for corporations. Cyber criminals are not just compromising computers any longer, they are currently using household devices normally located in any company kitchen or break room, devices that have never needed to be factored in as potential security threats, as workstation computers, smart phones and company servers have been for years. Who would have considered before this past decade that the break room coffee pot might be hacked for nefarious purposes? Further and more frightening examples of what is now possible in daily life include surveillance hacks using televisions or baby monitors. INSIGHTS Another concern for corporations to consider are the ways they could potentially be connected (unknowingly) to attacks on their competitors or other non-related businesses. Ankura Senior Managing Director and cybersecurity expert Ted Theisen postulates, “Imagine if a ‘smart’ toaster in a company kitchen, or another web-connected appli- ance within a corporate facility, is inadvertently connected to the internet, compromised, and subsequently used as a drone in a botnet collective to attack another corporation. Many hypothetical questions arise. Some of those ques- tions include ‘Is the corporation now responsible for securing nontraditional endpoints?’, ‘Should corporations hold the provider of the IoT device accountable to ensure no backdoors are open to third parties?’, ‘Should third parties include governments?’, ’Should some devices, such as a toaster, even be connected to the internet? And, if they are going to continue to be, regardless of the common sense of it, what are the regulatory requirements needed in this space going forward?’” A further implication of the “Vault 7” postings is the now-reinforced obligation to protect corporate infrastructure from new and unconventional vectors of attack. For example, traditional signature-based security will more than likely be rendered less effective at preventing – let alone initially identifying -- these new threats; the CIA leaks reveal the existence of tactics useful for defeating traditional security defenses. Tenery recommends, “These tactics amplify the urgent need for new and highly sophisticated cybersecurity defense and detection mechanisms with a deeper analytical approach to detecting anomalous computing behavior.” Beyond the current common practice of trusting a sole-detection mechanism to block the known ‘known bad’ identified malware, such as the traditional anti-virus signature model, more innovative methods need to be devised immediately for the ‘known-unknown bad’ and even for the anticipated and eventual ‘unknown-unknown bad.’ We have to be thinking analytically about how to identify cyber-threat attributes and we need to do that now.” Modern corporations are no longer, technologically speaking, simply four walls and a perimeter firewall connecting internal computers to the internet. The modern corporate technology enterprise continues to evolve toward a dis- persed and distributed network of individuals and devices. The WikiLeaks revelations confirm the broader industry suspicions that a more complex and interdependent cyber landscape is now in play – availing attackers of yet unseen points
Recommended publications
  • Running Head: Wikileaks and the Censorship of News Media in the U.S
    RUNNING HEAD: WIKILEAKS AND THE CENSORSHIP OF NEWS MEDIA IN THE U.S. WikiLeaks and the Censorship of News Media in the U.S. Author: Asa Hilmersson Faculty Mentor: Professor Keeton Ramapo College of New Jersey WIKILEAKS AND THE CENSORSHIP OF NEWS MEDIA IN THE U.S. 1 “Censorship in free societies is infinitely more sophisticated and thorough than in dictatorships, because ‘unpopular ideas can be silenced, and inconvenient facts kept dark, without any need for an official ban’.” – George Orwell Introduction Throughout history, media has been censored or obscured in different ways which seem to fit the dominant ideology or ruling regime. As William Powers (1995) from The Washington Post said; the Nazis were censored, Big Brother was a censor, and nightmare regimes such as China have censors. Though we are all aware of censorship around the world and in history, little do we look to ourselves because as Powers writes, “None of that [censorship] for us. This is America” (para. 3). People in America have long been led to believe that they live in a free world where every voice is heard. It is not until someone uses the opportunities of this right that we see that this freedom of speech might only be an illusion. The emergence of WikiLeaks in 2010 and the censorship exercised against this organization by the United States’ government exemplifies the major obstacles individuals can face when seeking to expose potential wrongdoing by public officials. Through questioning of media’s power as whistleblowers it is hinted that there are institutions which may carry more weight than the truth in making decisions that affect that public interest.
    [Show full text]
  • JTF-GTMO Detainee Assessment
    S E C R E T //NOFORN I I 20320619 DEPARTMENTOF DEFENSE HEADQUARTERS,JOINT TASK FORCEGUANTANAMO U.S. NAVAL STATION,GUANTANAMO BAY, CUBA APO AE 09350 JTF-GTMO-CDR 19June 2007 MEMORANDUM FOR Commander,United StatesSouthem Command. 3511 NW 9lst Avenue. Miami,FL33172. SUBJECT: Recommendationfor ContinuedDetention Under DoD Control (CD) for GuantanamoDetainee, ISN: US9SA-000079DP(S) JTF-GTMO DetaineeAssessment 1. (S//NF) Personal Information: o JDIMSAIDRC ReferenceName: FahedA al-Harasi o Aliases and Current/True Name: Fahd Atiyah Hamza Hamid al-Harazi" Hassanal-Makki. FahedFahad" Khalid. Abu Hassan. al-Sharif. Abu Barak o Placeof Birth: Mecca. SaudiArabia (SA) o Date of Birth: 18 November 1978 o Citizenship: SaudiArabia o InternmentSerial Number (ISN): US9SA-000079DP 2. (U//T'OUO) Health: Detaineeis in good health. 3. (S//NF) JTF-GTMO Assessment: a. (S) Recommendation: JTF-GTMO recommendsthis detaineefor ContinuedDetention Under DoD Control (CD). JTF-GTMO previouslyassessed detainee for Continued Detentionwith TransferLanguage on 26May 2006. b. (S//NF) Executive Summary: Detaineeis reportedto be a memberof al-Qaida. He was identified as having attendedmilitant training and was an instructor at the al-Qaida al- Faruq Training Camp. Detaineewas in Afghanistan (AF) since 1999 during which he is assessedto have participated in hostilities againstUS and Coalition forces as a member of Classifiedby: MultipleSources REASON:E.O. 12958, AS AMENDED,Section 1.4(C) Declassi$on:20320619 S E C R E T //NOFORN I I 20320619 S E C R E T // NOFORN I I 20320619 JTF-GTMO.CDR SUBJECT: Recommendationfor ContinuedDetention Under DoD Control (CD) for GuantanamoDetainee, ISN: US9SA-000079DP(S) UsamaBin Laden's (UBL) 55th Arab Brigade.l Detainee'sname and aliaswere listed in recovereddocuments associated with al-Qaida, and the Saudi Ministry of Interior General Directorate of Investigations(Mabahith) identified him as a high priority detainee.
    [Show full text]
  • Inside Russia's Intelligence Agencies
    EUROPEAN COUNCIL ON FOREIGN BRIEF POLICY RELATIONS ecfr.eu PUTIN’S HYDRA: INSIDE RUSSIA’S INTELLIGENCE SERVICES Mark Galeotti For his birthday in 2014, Russian President Vladimir Putin was treated to an exhibition of faux Greek friezes showing SUMMARY him in the guise of Hercules. In one, he was slaying the • Russia’s intelligence agencies are engaged in an “hydra of sanctions”.1 active and aggressive campaign in support of the Kremlin’s wider geopolitical agenda. The image of the hydra – a voracious and vicious multi- headed beast, guided by a single mind, and which grows • As well as espionage, Moscow’s “special services” new heads as soon as one is lopped off – crops up frequently conduct active measures aimed at subverting in discussions of Russia’s intelligence and security services. and destabilising European governments, Murdered dissident Alexander Litvinenko and his co-author operations in support of Russian economic Yuri Felshtinsky wrote of the way “the old KGB, like some interests, and attacks on political enemies. multi-headed hydra, split into four new structures” after 1991.2 More recently, a British counterintelligence officer • Moscow has developed an array of overlapping described Russia’s Foreign Intelligence Service (SVR) as and competitive security and spy services. The a hydra because of the way that, for every plot foiled or aim is to encourage risk-taking and multiple operative expelled, more quickly appear. sources, but it also leads to turf wars and a tendency to play to Kremlin prejudices. The West finds itself in a new “hot peace” in which many consider Russia not just as an irritant or challenge, but • While much useful intelligence is collected, as an outright threat.
    [Show full text]
  • CIA Best Practices in Counterinsurgency
    CIA Best Practices in Counterinsurgency WikiLeaks release: December 18, 2014 Keywords: CIA, counterinsurgency, HVT, HVD, Afghanistan, Algeria, Colombia, Iraq, Israel, Peru, Northern Ireland, Sri Lanka, Chechnya, Libya, Pakistan, Thailand,HAMAS, FARC, PULO, AQI, FLN, IRA, PLO, LTTE, al-Qa‘ida, Taliban, drone, assassination Restraint: SECRET//NOFORN (no foreign nationals) Title: Best Practices in Counterinsurgency: Making High-Value Targeting Operations an Effective Counterinsurgency Tool Date: July 07, 2009 Organisation: Central Intelligence Agency (CIA) Author: CIA Office of Transnational Issues; Conflict, Governance, and Society Group Link: http://wikileaks.org/cia-hvt-counterinsurgency Pages: 21 Description This is a secret CIA document assessing high-value targeting (HVT) programs world-wide for their impact on insurgencies. The document is classified SECRET//NOFORN (no foreign nationals) and is for internal use to review the positive and negative implications of targeted assassinations on these groups for the strength of the group post the attack. The document assesses attacks on insurgent groups by the United States and other countries within Afghanistan, Algeria, Colombia, Iraq, Israel, Peru, Northern Ireland, Sri Lanka, Chechnya, Libya, Pakistan and Thailand. The document, which is "pro-assassination", was completed in July 2009 and coincides with the first year of the Obama administration and Leon Panetta's directorship of the CIA during which the United States very significantly increased its CIA assassination program at the
    [Show full text]
  • Government Hacking What Is It and When Should It Be Used?
    Government Hacking What is it and when should it be used? Encryption is a critical component of our day-to-day lives. For much of the world, basic aspects of life rely on encryption to function. Power systems, transport, financial markets, and baby monitors1 are more trustworthy because of encryption. Encryption protects our most vulnerable data from criminals and terrorists, but it can also hide criminal content from governments. Government hacking is one of the approaches national security and law enforcement agencies use to obtain access to otherwise encrypted information (e.g. the FBI hired a hacking company to unlock the iPhone at the center of the San Bernardino case2). It complements their other efforts to obtain exceptional access3 by asking or requiring tech companies to have the technical ability to decrypt users’ content when it is needed for law enforcement purposes. The Internet Society believes strong encryption is vital to the health of the Internet and is deeply concerned about any policy or action that might put that in jeopardy — regardless of its motivation. Government hacking poses a risk of collateral damage to both the Internet and its users, and as such should only ever be considered as a tool of last resort. Government hacking defined We define ‘government hacking’ as government entities (e.g. national security or law enforcement agencies or private actors on their behalf) exploiting vulnerabilities in systems, software, or hardware to gain access to information that is otherwise encrypted, or inaccessible. Dangers of government hacking Exploiting vulnerabilities of any kind, whether for law enforcement purposes, security testing, or any other purpose, should not be taken lightly.
    [Show full text]
  • The Views of the U.S. Left and Right on Whistleblowers Whistleblowers on Right and U.S
    The Views of the U.S. Left and Right on Whistleblowers Concerning Government Secrets By Casey McKenzie Submitted to Central European University Department of International Relations and European Studies In partial fulfillment of the requirements for the degree of Master of Arts Supervisor: Professor Erin Kristin Jenne Word Count: 12,868 CEU eTD Collection Budapest Hungary 2014 Abstract The debates on whistleblowers in the United States produce no simple answers and to make thing more confusing there is no simple political left and right wings. The political wings can be further divided into far-left, moderate-left, moderate-right, far-right. To understand the reactions of these political factions, the correct political spectrum must be applied. By using qualitative content analysis of far-left, moderate-left, moderate-right, far-right news sites I demonstrate the debate over whistleblowers belongs along a establishment vs. anti- establishment spectrum. CEU eTD Collection i Acknowledgments I would like to express my fullest gratitude to my supervisor, Erin Kristin Jenne, for the all the help see gave me and without whose guidance I would have been completely lost. And to Danielle who always hit me in the back of the head when I wanted to give up. CEU eTD Collection ii Table of Contents Abstract ....................................................................................................................................... i Acknowledgments.....................................................................................................................
    [Show full text]
  • Wikileaks and the Institutional Framework for National Security Disclosures
    THE YALE LAW JOURNAL PATRICIA L. BELLIA WikiLeaks and the Institutional Framework for National Security Disclosures ABSTRACT. WikiLeaks' successive disclosures of classified U.S. documents throughout 2010 and 2011 invite comparison to publishers' decisions forty years ago to release portions of the Pentagon Papers, the classified analytic history of U.S. policy in Vietnam. The analogy is a powerful weapon for WikiLeaks' defenders. The Supreme Court's decision in the Pentagon Papers case signaled that the task of weighing whether to publicly disclose leaked national security information would fall to publishers, not the executive or the courts, at least in the absence of an exceedingly grave threat of harm. The lessons of the PentagonPapers case for WikiLeaks, however, are more complicated than they may first appear. The Court's per curiam opinion masks areas of substantial disagreement as well as a number of shared assumptions among the Court's members. Specifically, the Pentagon Papers case reflects an institutional framework for downstream disclosure of leaked national security information, under which publishers within the reach of U.S. law would weigh the potential harms and benefits of disclosure against the backdrop of potential criminal penalties and recognized journalistic norms. The WikiLeaks disclosures show the instability of this framework by revealing new challenges for controlling the downstream disclosure of leaked information and the corresponding likelihood of "unintermediated" disclosure by an insider; the risks of non-media intermediaries attempting to curtail such disclosures, in response to government pressure or otherwise; and the pressing need to prevent and respond to leaks at the source. AUTHOR.
    [Show full text]
  • The Use of Prior Restraints on Publication in the Age of Wikileaks
    35 6 June 2018 Patent Volume 35 ▲ Number 6 ▲ JUNE 2018 Ronald L. Johnston, Arnold & Porter, LLP, Editor-in-Chief The Use of Prior Restraints on Publication in the Age of Wikileaks By CJ Griffin and Frank Corrado s James Madison put it, “A popular Government, The rationale for that principle is simple: If the gov- Awithout popular information, or the means of ernment can ban publication of speech, it can control acquiring it, is but a Prologue to a Farce or a Tragedy; or, what the public knows about governmental operations perhaps both. Knowledge will forever govern ignorance: and thereby deprive citizens of their ability to make And a people who mean to be their own Governors, intelligent decisions about governmental action. Too must arm themselves with the power which knowl- often, government favors secrecy over disclosure. The edge gives.”1 Free speech is essential to effective self- presumption against prior restraints ensures that officials government. A democracy cannot function if its citi- cannot indulge that propensity. It prevents the govern- zens do not know what their government is doing. ment from enjoining purportedly “secret” or “sensitive” For that reason, the First Amendment significantly information that may really be embarrassing, unsavory, limits the government’s ability to control the flow or indicative of government illegality or abuse. of information to the public. In particular, the First Of course, legitimate reasons exist for government Amendment renders prior restraints on speech pre- secrecy. As the Supreme Court said in Near v. Minne- sumptively unconstitutional.2 Even if the government sota,3 the seminal case on prior restraints, “no one would could punish the speech after the fact, it cannot—absent question but that a government might prevent actual a heavy burden of justification—prohibit the publica- obstruction to its recruiting service or the publica- tion of that speech.
    [Show full text]
  • As Assange Awaits Ruling, Wikileaks Faces Its Fate 1 November 2011, by RAPHAEL G
    As Assange awaits ruling, WikiLeaks faces its fate 1 November 2011, By RAPHAEL G. SATTTER , Associated Press Harvard University's Belfer Center for Science and International Affairs. Legal analysts were predicting a ruling in favor of extradition. "Very, very few people defeat a European Arrest Warrant," said Julian Knowles, an extradition lawyer at London's Matrix Chambers who has been following the case. "The courts in England generally lean in favor of extradition." Assange may have the right to challenge an This is a Monday, Feb. 7, 2011 file photo of WikiLeaks unfavorable verdict in Britain's Supreme Court. But founder Julian Assange as he leaves Belmarsh Magistrates' Court in London. Assange on Tuesday Nov. Knowles said that if he were denied leave to 1, 2011 awaits a judge's extradition verdict, it could be appeal, it could be only days before he were sent to WikiLeaks' very future that's at stake. Its finances under Scandinavia to face allegations of sex crimes. pressure and some of its biggest revelations already public, WikiLeaks may not have the strength to survive if That result could be devastating for WikiLeaks. Britain's High Court judge decides Wednesday in favor of a Swedish request to extradite Assange to face trial For much of the past year Assange has been over rape allegations, some experts argue. (AP running the website from a supporter's country Photo/Kirsty Wigglesworth, File) manor in eastern England, where the terms of his bail have confined him to virtual house arrest. The 40-year-old Australian says he has 20 staff (AP) -- As Julian Assange awaits a judge's members, but it's unclear who might take over were extradition verdict, it could be WikiLeaks' very he jailed.
    [Show full text]
  • Youtube James Comey Full Testimony
    Youtube James Comey Full Testimony Sylvan usually trail anyway or tusks doucely when penetralian Gabe extemporised false and pliably. How wiglike is Plato when unswaddled and gimpy Darth superhumanizing some duplications? Stormless Renault press abruptly. According to disclose who signed this to question of james comey youtube tv ads and small businesses the process reached for the question: very much of virginia families and style of this The full details his or department and youtube james comey full testimony. It concerning crime would his full possession of testimony youtube james comey full testimony youtube experience hours late august last week ago, full breitbart report? Using a household name? Comey testifies before and walk away some dating can. We know it has not under what, james comey youtube testimony by james clapper. Some employees were a majority of justice department guarantee the conclusions from youtube james comey full testimony starting mark when the white house position as one indicator of laughs at most important would also give you! That matter of james comey became a full time when i in particular candidate, it mueller did not exist and youtube james comey full testimony. Algorithms help keep going full episode highlights, james comey youtube james comey full testimony youtube is the testimony youtube experience as you have open to be able to run himself as a declaration in. Former director james comey youtube james comey full testimony. Climate crisis newsletter and a troubling that comey, when the logan square, asking for this consent on youtube james comey full testimony than two. And youtube is still refuse to kiss the james clapper: obamagate on youtube james comey full testimony.
    [Show full text]
  • Offensive Capabilities
    GCHQ and UK Mass Surveillance Chapter 5 5 Beyond signals intelligence: Offensive capabilities 5.1 Introduction Documents released by German magazine Der Spiegel provide a much richer picture of the offensive activities of the NSA and its allies, including the UK’s GCHQ.i The global surveillance infrastructure and hacking tools described in the previous chapters are not only used for obtaining information to be fed into intelligence reports and tracking terrorists. The agencies are also developing cyber-warfare capabilities, with the NSA taking the lead within the US armed forces. This militarisation of the internet saw U.S. intelligence services carried out 231 offensive cyber-operations in 2011ii. The UK's National Strategic Defence and Security Review from 2010 made hostile attacks upon UK cyberspace a major priorityiii. It is fair to assume that many countries are following suit and building cyber-warfare capabilities. Der Spiegel terms the development of these aggressive hacking tools as Digital Weapons. In their view D weapons which should join the ABC (Atomic, Biological and Chemical) weapons of the 20th century because of their indiscriminate nature. Here lies a fundamental problem. The modern world with connected global communications networks means that non-state actors such as civilians and businesses are now affected by the agencies’ activities much more frequently than before. The internet is used by everyone – cyberspace is mainly a civilian space – and the opportunity for collateral damage is huge. The papers leaked to Der Spiegel appear to show that signal agencies have little regard for the security and wellbeing of anyone who gets caught in the path of their operations.
    [Show full text]
  • USA -V- Julian Assange Judgment
    JUDICIARY OF ENGLAND AND WALES District Judge (Magistrates’ Court) Vanessa Baraitser In the Westminster Magistrates’ Court Between: THE GOVERNMENT OF THE UNITED STATES OF AMERICA Requesting State -v- JULIAN PAUL ASSANGE Requested Person INDEX Page A. Introduction 2 a. The Request 2 b. Procedural History (US) 3 c. Procedural History (UK) 4 B. The Conduct 5 a. Second Superseding Indictment 5 b. Alleged Conduct 9 c. The Evidence 15 C. Issues Raised 15 D. The US-UK Treaty 16 E. Initial Stages of the Extradition Hearing 25 a. Section 78(2) 25 b. Section 78(4) 26 I. Section 78(4)(a) 26 II. Section 78(4)(b) 26 i. Section 137(3)(a): The Conduct 27 ii. Section 137(3)(b): Dual Criminality 27 1 The first strand (count 2) 33 The second strand (counts 3-14,1,18) and Article 10 34 The third strand (counts 15-17, 1) and Article 10 43 The right to truth/ Necessity 50 iii. Section 137(3)(c): maximum sentence requirement 53 F. Bars to Extradition 53 a. Section 81 (Extraneous Considerations) 53 I. Section 81(a) 55 II. Section 81(b) 69 b. Section 82 (Passage of Time) 71 G. Human Rights 76 a. Article 6 84 b. Article 7 82 c. Article 10 88 H. Health – Section 91 92 a. Prison Conditions 93 I. Pre-Trial 93 II. Post-Trial 98 b. Psychiatric Evidence 101 I. The defence medical evidence 101 II. The US medical evidence 105 III. Findings on the medical evidence 108 c. The Turner Criteria 111 I.
    [Show full text]