10 Year Prison Term Sought for Anonymous Hacktivist Jeremy Hammond

"Anonymous hacktivist Jeremy Hammond should receive the maximum 10 year prison term for defacing law enforcement and corporate websites and stealing 200 gigabytes of email and 60,000 credit card numbers from a private intelligence firm, prosecutors argued in a court filing today.

“Contrary to the picture he paints of himself … Hammond is a computer hacking recidivist who, following a federal conviction for computer hacking, went on to engage in a massive hacking spree during which he caused harm to numerous businesses, individuals, and governments, resulting in losses of between $1 million and $2.5 million, and threatened the safety of the public at large, especially law enforcement officers and their families,” the government wrote in a sentencing memorandum.

Hammond is scheduled for sentencing in New York on Friday before U.S. District Judge Loretta Preska. The 28-year-old Chicagoan pleaded guilty earlier this year to the keystone attack of the short-lived Lulzsec/AntiSec era: a damaging December 2011 intrusion into the servers of the private intelligence firm Strategic Forecasting, Inc., where Hammond bulk-deleted files and stole 5 million private email messages, which he gave to WikiLeaks.

Unlike most large-scale hacks these days, Hammond’s intrusions were strictly not-for-profit. Hammond has a long history of liberal activism and direct action, including work for the anti-war group Food Not Bombs. In 2006 he was sentenced to two years in custody for hacking the website of a right-wing group. While in jail for that hack in 2008, he heard about Anonymous and became intrigued, his lawyers said in a court filing this month.

In 2011, he began staging protest hacks and data thefts against a range of companies and organizations tied to law enforcement and defense, including the FBI’s Virtual Academy; the Arizona Department of Public Safety; Brooks-Jeffrey Marketing, Inc.; Special Forces Gear; Vanguard Defense Industries; the Jefferson County, Alabama Sheriff’s Office; the Boston Police Patrolmen’s Association; and Combined Systems, Inc.

His biggest success came at Stratfor, where he wiped out files and databases and stole 60,000 credit card numbers belong to Stratfor subscribers. At Hammond’s urging, Anonymous members promptly loaded up some cards with $700,000 in fraudulent donations to non-profit groups. Hammond also stole 5 million email messages, which have been trickling out of WikiLeaks as the “Global Intelligence Files” ever since.

“An equally important part is destroying their servers and dumping their user/address list and private e-mails”
–Jeremy Hammond

In its sentencing memorandum today, the government quotes from online chats in which Hammond encouraged Anonymous members to rack up charges on the Stratfor customer credit cards, and discussed his ambitions to obliterate the company.

“An equally important part is destroying their servers and dumping their user/address list and private e-mails with the goal of destroying the target,” he wrote. “I’m hoping bankruptcy, collapse.”

The government’s portrait of an angry, destructive intruder contrasts sharply with the description offered by Hammond’s defense team, who compare him to WikiLeaks source Chelsea (formerly Bradley) Manning.

“Jeremy saw working with Anonymous and Antisec as an opportunity to be like Chelsea Manning – to do his part to access information that needed to be shared with the people,” wrote defense attorneys Susan Kellman and Sarah Kinstler in a court filing earlier this month."
(continued)

http://feeds.wired.com/c/35185/f/661467/s/339c3b38/sc/1/l/0L0Swired0N0Cthreatlevel0C20A130C110Chammond0Esentencing0Ememo0C/story01.htm

 



"The time is now to support Jeremy Hammond, Hack This Site Founder.

For the Hack This Site users who do not know Jeremy, he is our founder who started Hack This Site around ten years ago. He has not been around now for a number of years due to the legal restrictions of his parole after hacktivism related charges.

Jeremy Hammond is currently a prisoner pending sentencing for computer hacking crimes. His crimes were acts of civil disobedience, acts of protest against an encroaching surveillance state. Jeremy faces a maximum of 10 years under the plea agreement he signed. The government will want the full 10 years.
Will you please help us ask the judge for less time?

Jeremy’s sentencing is not going to be delayed any further. It will go forward mid-November.
Letters to the court in support of Jeremy need to be in by no later than the 15th of October so they can be submitted to the court - that means you should do it now - TODAY! This is important. If you care about Jeremy Hammond, the freedom of the internet or the encroaching surveillance state, you need to take action on this now - this is the opportunity to have your voice heard on this matter.
Any and all help that you all can give, including both passing this along and writing your own letter to the court about why they should not give Jeremy 10 years is not only appreciated, but is desperately needed.
Please spread this message around and let’s get as many letters as we can and let’s make sure they are all thoughtful and powerful.
This is important for Jeremy and important for freedom. Please speak now on this crucial issue.

Please visit the following link for more information on how you can help"

https://www.hackthissite.org/news/view/656

went on to engage in a massive hacking spree during which he caused harm to numerous businesses, individuals, and governments, resulting in losses of between $1 million and $2.5 million, and threatened the safety of the public at large, especially law enforcement officers and their families

If any of that is true it sounds like he got what was coming to him. Although the government is notorious for making "hackers"seem like awful people. Does what he is being accused of not match up with what he has actually done? If so, someone please enlighten me on why he doesn't deserve a full sentence.

I think an issue here is perception that what these guys are doing is harmless as activism or mild vandalism but to most folks this is akin to breaking in ones home and stealing. If you ask my dad, anyone who hacks into someone else's computer is the same as breaking in their house. 

Part of me loves what annon does but in reality they are breaking standing laws. What would be a more systemic change would be to change the laws to reflect what punishment fits what crime. Changing text on a site is small fries but stealing personal data is theft. When it happens to you by a criminal it's a crime but when it happens to a big corp is it less of a crime? Idk. 

Jeremy Hammond was just sentenced to 10 years in prison. To people reading this: if you investigate this case, you'll read a lot of things said about Jeremy Hammond. Before you do that, you should read his own words.


"Good morning. Thank you for this opportunity. My name is Jeremy Hammond and I’m here to be sentenced for hacking activities carried out during my involvement with Anonymous. I have been locked up at MCC for the past 20 months and have had a lot of time to think about how I would explain my actions.

Before I begin, I want to take a moment to recognize the work of the people who have supported me. I want to thank all the lawyers and others who worked on my case: Elizabeth Fink, Susan Kellman, Sarah Kunstler, Emily Kunstler, Margaret Kunstler, and Grainne O’Neill. I also want to thank the National Lawyers Guild, the Jeremy Hammond Defense Committee and Support Network, Free Anons, the Anonymous Solidarity Network, Anarchist Black Cross, and all others who have helped me by writing a letter of support, sending me letters, attending my court dates, and spreading the word about my case. I also want to shout out my brothers and sisters behind bars and those who are still out there fighting the power.

The acts of civil disobedience and direct action that I am being sentenced for today are in line with the principles of community and equality that have guided my life. I hacked into dozens of high profile corporations and government institutions, understanding very clearly that what I was doing was against the law, and that my actions could land me back in federal prison. But I felt that I had an obligation to use my skills to expose and confront injustice—and to bring the truth to light.

Could I have achieved the same goals through legal means? I have tried everything from voting petitions to peaceful protest and have found that those in power do not want the truth to be exposed. When we speak truth to power we are ignored at best and brutally suppressed at worst. We are confronting a power structure that does not respect its own system of checks and balances, never mind the rights of it’s own citizens or the international community.

My introduction to politics was when George W. Bush stole the Presidential election in 2000, then took advantage of the waves of racism and patriotism after 9/11 to launch unprovoked imperialist wars against Iraq and Afghanistan. I took to the streets in protest naively believing our voices would be heard in Washington and we could stop the war. Instead, we were labeled as traitors, beaten, and arrested.

I have been arrested for numerous acts of civil disobedience on the streets of Chicago, but it wasn’t until 2005 that I used my computer skills to break the law in political protest. I was arrested by the FBI for hacking into the computer systems of a right-wing, pro-war group called Protest Warrior, an organization that sold racist t-shirts on their website and harassed anti-war groups. I was charged under the Computer Fraud and Abuse Act, and the “intended loss” in my case was arbitrarily calculated by multiplying the 5000 credit cards in Protest Warrior’s database by $500, resulting in a total of $2.5 million.My sentencing guidelines were calculated on the basis of this “loss,” even though not a single credit card was used or distributed – by me or anyone else. I was sentenced to two years in prison.

While in prison I have seen for myself the ugly reality of how the criminal justice system destroys the lives of the millions of people held captive behind bars. The experience solidified my opposition to repressive forms of power and the importance of standing up for what you believe.

When I was released, I was eager to continue my involvement in struggles for social change. I didn’t want to go back to prison, so I focused on above-ground community organizing. But over time, I became frustrated with the limitations, of peaceful protest, seeing it as reformist and ineffective. The Obama administration continued the wars in Iraq and Afghanistan, escalated the use of drones, and failed to close Guantanamo Bay.

Around this time, I was following the work of groups like Wikileaks and Anonymous. It was very inspiring to see the ideas of hactivism coming to fruition. I was particularly moved by the heroic actions of Chelsea Manning, who had exposed the atrocities committed by U.S. forces in Iraq and Afghanistan. She took an enormous personal risk to leak this information – believing that the public had a right to know and hoping that her disclosures would be a positive step to end these abuses. It is heart-wrenching to hear about her cruel treatment in military lockup.

I thought long and hard about choosing this path again. I had to ask myself, if Chelsea Manning fell into the abysmal nightmare of prison fighting for the truth, could I in good conscience do any less, if I was able? I thought the best way to demonstrate solidarity was to continue the work of exposing and confronting corruption.

I was drawn to Anonymous because I believe in autonomous, decentralized direct action. At the time Anonymous was involved in operations in support of the Arab Spring uprisings, against censorship, and in defense of Wikileaks. I had a lot to contribute, including technical skills, and how to better articulate ideas and goals. It was an exciting time – the birth of a digital dissent movement, where the definitions and capabilities of hacktivism were being shaped.

I was especially interested in the work of the hackers of LulzSec who were breaking into some significant targets and becoming increasingly political. Around this time, I first started talking to Sabu, who was very open about the hacks he supposedly committed, and was encouraging hackers to unite and attack major government and corporate systems under the banner of Anti Security. But very early in my involvement, the other Lulzsec hackers were arrested, leaving me to break into systems and write press releases. Later, I would learn that Sabu had been the first one arrested, and that the entire time I was talking to him he was an FBI informant.

Anonymous was also involved in the early stages of Occupy Wall Street. I was regularly participating on the streets as part of Occupy Chicago and was very excited to see a worldwide mass movement against the injustices of capitalism and racism. In several short months, the “Occupations” came to an end, closed by police crackdowns and mass arrests of protestors who were kicked out of their own public parks. The repression of Anonymous and the Occupy Movement set the tone for Antisec in the following months – the majority of our hacks against police targets were in retaliation for the arrests of our comrades.

I targeted law enforcement systems because of the racism and inequality with which the criminal law is enforced. I targeted the manufacturers and distributors of military and police equipment who profit from weaponry used to advance U.S. political and economic interests abroad and to repress people at home. I targeted information security firms because they work in secret to protect government and corporate interests at the expense of individual rights, undermining and discrediting activists, journalists and other truth seekers, and spreading disinformation.

I had never even heard of Stratfor until Sabu brought it to my attention. Sabu was encouraging people to invade systems, and helping to strategize and facilitate attacks. He even provided me with vulnerabilities of targets passed on by other hackers, so it came as a great surprise when I learned that Sabu had been working with the FBI the entire time.

On December 4, 2011, Sabu was approached by another hacker who had already broken into Stratfor’s credit card database. Sabu, under the watchful eye of his government handlers, then brought the hack to Antisec by inviting this hacker to our private chatroom, where he supplied download links to the full credit card database as well as the initial vulnerability access point to Stratfor’s systems.

I spent some time researching Stratfor and reviewing the information we were given, and decided that their activities and client base made them a deserving target. I did find it ironic that Stratfor’s wealthy and powerful customer base had their credit cards used to donate to humanitarian organizations, but my main role in the attack was to retrieve Stratfor’s private email spools which is where all the dirty secrets are typically found.

It took me more than a week to gain further access into Stratfor’s internal systems, but I eventually broke into their mail server. There was so much information, we needed several servers of our own in order to transfer the emails. Sabu, who was involved with the operation at every step, offered a server, which was provided and monitored by the FBI. Over the next weeks, the emails were transferred, the credit cards were used for donations, and Stratfor’s systems were defaced and destroyed. Why the FBI would introduce us to the hacker who found the initial vulnerability and allow this hack to continue remains a mystery.

As a result of the Stratfor hack, some of the dangers of the unregulated private intelligence industry are now known. It has been revealed through Wikileaks and other journalists around the world that Stratfor maintained a worldwide network of informants that they used to engage in intrusive and possibly illegal surveillance activities on behalf of large multinational corporations.

After Stratfor, I continued to break into other targets, using a powerful “zero day exploit” allowing me administrator access to systems running the popular Plesk webhosting platform. Sabu asked me many times for access to this exploit, which I refused to give him. Without his own independent access, Sabu continued to supply me with lists of vulnerable targets. I broke into numerous websites he supplied, uploaded the stolen email accounts and databases onto Sabu’s FBI server, and handed over passwords and backdoors that enabled Sabu (and, by extension, his FBI handlers) to control these targets.

These intrusions, all of which were suggested by Sabu while cooperating with the FBI, affected thousands of domain names and consisted largely of foreign government websites, including those of XXXXXXX, XXXXXXXX, XXXX, XXXXXX, XXXXX, XXXXXXXX, XXXXXXX and the XXXXXX XXXXXXX. In one instance, Sabu and I provided access information to hackers who went on to deface and destroy many government websites in XXXXXX. I don’t know how other information I provided to him may have been used, but I think the government’s collection and use of this data needs to be investigated.



The government celebrates my conviction and imprisonment, hoping that it will close the door on the full story. I took responsibility for my actions, by pleading guilty, but when will the government be made to answer for its crimes?

The U.S. hypes the threat of hackers in order to justify the multi billion dollar cyber security industrial complex, but it is also responsible for the same conduct it aggressively prosecutes and claims to work to prevent. The hypocrisy of “law and order” and the injustices caused by capitalism cannot be cured by institutional reform but through civil disobedience and direct action. Yes I broke the law, but I believe that sometimes laws must be broken in order to make room for change.

In the immortal word of Frederick Douglas, “Power concedes nothing without a demand. It never did and it never will. Find out just what any people will quietly submit to and you have found out the exact measure of injustice and wrong which will be imposed upon them, and these will continue till they are resisted with either words or blows, or both. The limits of tyrants are prescribed by the endurance of those whom they oppress.”

This is not to say that I do not have any regrets. I realize that I released the personal information of innocent people who had nothing to do with the operations of the institutions I targeted. I apologize for the release of data that was harmful to individuals and irrelevant to my goals. I believe in the individual right to privacy – from government surveillance, and from actors like myself, and I appreciate the irony of my own involvement in the trampling of these rights. I am committed to working to make this world a better place for all of us. I still believe in the importance of hactivism as a form of civil disobedience, but it is time for me to move on to other ways of seeking change. My time in prison has taken a toll on my family, friends, and community. I know I am needed at home. I recognize that 7 years ago I stood before a different federal judge, facing similar charges, but this does not lessen the sincerity of what I say to you today.

It has taken a lot for me to write this, to explain my actions, knowing that doing so — honestly — could cost me more years of my life in prison. I am aware that I could get as many as 10 years, but I hope that I do not, as I believe there is so much work to be done.

STAY STRONG AND KEEP STRUGGLING!

- Jeremy Hammond"

 

http://www.sparrowmedia.net/2013/11/jeremy-hammond-sentence/

 

 





Some of those redacted words are Iran, Turkey, and Brazil.



"Before being cut off by U.S. District Court Judge Loretta Preska, Hammond claimed that foreign government targets included Turkey, Brazil and Iran. Preska had already imposed a protective order preventing the release of the countries' names, which were in Hammond's statement as well as in sentencing paperwork. The government had disputed his claims involving the countries, and Preska responded by ordering that their names be redacted. She cut Hammond off in court Friday before he was able to list all of the countries in violation of the order."

 

http://www.huffingtonpost.com/2013/11/15/jeremy-hammond-sentenced_n_4280738.html



Jeremy Hammond founded www.hackthissite.org in 2003, a website dedicated to providing free education on web security. Many people have learned valuable web security skills because Jeremy wanted to share knowledge with the world.

Here is what the guys at hackthissite.org have to say.

 

 

"In yet another example of how biased and unfair the United States justice system is, Jeremy Hammond -- the founder of HackThisSite -- recieved the full possible sentence of 10 years in prison

This case has been extremely high-profile lately, making it to the covers of Wired, Huffington Post, Russia Today, Salon, The Guardian (primary source of the Edward Snowden leaks), Washington Post, and Forbes, just to name a few, and for good reason, too. As Rolling Stone pointed out, "Many supporters see Hammond's case as part of a broader trend of the government seeking what they say are disproportionately long sentences for acts that are better understood as civil disobedience than rampant criminality. Aaron Swartz, who faced prosecution under the Computer Fraud and Abuse Act – the same statute used to prosecute Hammond – took his own life last year, after facing possible decades in prison for downloading academic journals from an MIT server."

Indeed, this case is high-profile because it shows how unfair civil disobedience and hacktivism is being portrayed and punished. But to truly exemplify how biased justice truly is, notice the one part in particular that Rolling Stone article highlights:

Hammond's supporters and attorneys had previously called on Judge Preska to recuse herself following the discovery that her husband was a victim of the hack she was charged with ruling on. That motion was denied.


We have mentioned this repeatedly already in our news posts about Hammond and Judge Preska. Unfortunately, impartiality and recusal is not enforced in the American justice system, and the onus of this enforcement falls solely and exclusively on the presiding judge. This would be as if police policed themselves and had no Internal Affairs bureau, and yet that is how the U.S. justice system has existed since its inception.

However, the part that is most troubling was an excerpt from Judge Preska's sentencing statement. She claimed the ultimate purpose of her ruling, invoking an unnecessary maximum sentence, was to fulfill a "need for adequate public deterrence." Literally and exactly, she is punishing Hammond to the maximum extent law will allow her to solely to send a message: Stand up and speak out against corruption, and the government WILL make it hurt.

Justice is not blind. No, in fact, it is perfectly capable of 20/20 vision. Justice simply does not care for those who do not silently obey the status quo, and cannot afford to buy laws to favor themselves.

Stay strong, Jeremy. When we find where you are being held, we will write you."

 

https://www.hackthissite.org/news/view/657



(bolded mine)


 

Richard Stallman's letter asking for community service:

 

 

"

  [ To any NSA and FBI agents reading my email: please consider
[ whether defending the US Constitution against all enemies,
[ foreign or domestic, requires you to follow Snowden’s example.

References about GNU and Linux:
http://www.gnu.org/gnu/gnu-linux-faq.html
http://www.gnu.org/gnu/the-gnu-project.html
Reference about copyleft:
http://www.gnu.org/copyleft/

Dear Judge Preska
I’ve been proud to call myself a hacker since 1971.  That’s when I was
hired by the MIT Artificial Intelligence Lab to join the team that
developed the lab’s operating systems — for which the unofficial job
title was “system hacker”.  My subsequent hacking career has included
developing the GNU operating system, which is often erroneously called
“Linux”, and the legal hack of “copyleft” which uses copyright law to
ensure that all users of a program are free to redistribute it and
change it.  I’ve received numerous awards and doctorates for my
hacking, and have been invited twice to publish articles in law
reviews.

Being a hacker means practicing and enjoying playful cleverness.  (See
stallman.org/articles/on-hacking.html.)  It does not particularly have
to do with breaking security.  Indeed, no one ever broke security on
the AI lab’s system, because we decided not to implement any.

That decision, made by the original team members who became my
mentors, was not taken lightly: it was the result of careful political
and philosophical thought.  Instead of keeping most users (those
without “privileges” — which already sounds like a prison) shackled
so that they could not hurt each other, we thought the lab members and
guest users could learn to get along as a community, choosing not to
hurt each other.  And they did!

This example is not unusual for hackers.  From the beginning, hackers’
taste for playful cleverness has often gone along with a sense of
social responsibility, concern for others’ well-being.  Jeremy Hammond
is a fine example of a socially responsible hacker.  He found a clever
way to expose the many nefarious deeds that Stratfor was planning and
proposing.

People should not be allowed to enter others’ computers without
permission; but when punishing someone for virtual trespassing, we
ought to consider his motive.  Those who trespass as part of a
nonviolent protest, either physically or virtually, should not receive
severe punishments.  Those who act neither for gain nor for malice
should not receive severe punishments.  Imagine where our country
would be if the civil rights and antiwar sit-ins had been punished by
years in prison!  If we do not want the US to be like Putin’s Russia,
imposing long sentences on protesters, we must steer clear of doing
so.  That applies to virtual protests as well as physical ones.

I therefore respectfully suggest that Hammond be sentenced to
community service.  To make use of his skills and abilities, this
service could consist of helping nonprofit organizations protect their
personal data.
Sincerely,
Richard Stallman
Lead developer of the GNU system (gnu.org)
President, Free Software Foundation (fsf.org)
MacArthur Fellow
Internet hall-of-famer (internethalloffame.org)"

 

http://venturebeat.com/2013/11/15/richard-stallman-letter/

Thank you for what you did Jeremy. You are truly a hero. I will post this here for you. <3

 

 

"LONDON—Today, Monday 27 February, WikiLeaks began publishing The Global Intelligence Files – more than five million emails from the Texas-headquartered "global intelligence" company Stratfor. The emails date from between July 2004 and late December 2011. They reveal the inner workings of a company that fronts as an intelligence publisher, but provides confidential intelligence services to large corporations, such as Bhopal’s Dow Chemical Co., Lockheed Martin, Northrop Grumman, Raytheon and government agencies, including the US Department of Homeland Security, the US Marines and the US Defense Intelligence Agency. The emails show Stratfor’s web of informers, pay-off structure, payment-laundering techniques and psychological methods, for example :

"[Y]ou have to take control of him. Control means financial, sexual or psychological control... This is intended to start our conversation on your next phase" – CEO George Friedman to Stratfor analyst Reva Bhalla on 6 December 2011, on how to exploit an Israeli intelligence informant providing information on the medical condition of the President of Venezuala, Hugo Chavez.

The material contains privileged information about the US government’s attacks against Julian Assange and WikiLeaks and Stratfor’s own attempts to subvert WikiLeaks. There are more than 4,000 emails mentioning WikiLeaks or Julian Assange. The emails also expose the revolving door that operates in private intelligence companies in the United States. Government and diplomatic sources from around the world give Stratfor advance knowledge of global politics and events in exchange for money. The Global Intelligence Files exposes how Stratfor has recruited a global network of informants who are paid via Swiss banks accounts and pre-paid credit cards. Stratfor has a mix of covert and overt informants, which includes government employees, embassy staff and journalists around the world.

The material shows how a private intelligence agency works, and how they target individuals for their corporate and government clients. For example, Stratfor monitored and analysed the online activities of Bhopal activists, including the "Yes Men", for the US chemical giant Dow Chemical. The activists seek redress for the 1984 Dow Chemical/Union Carbide gas disaster in Bhopal, India. The disaster led to thousands of deaths, injuries in more than half a million people, and lasting environmental damage.

Stratfor has realised that its routine use of secret cash bribes to get information from insiders is risky. In August 2011, Stratfor CEO George Friedman confidentially told his employees : "We are retaining a law firm to create a policy for Stratfor on the Foreign Corrupt Practices Act. I don’t plan to do the perp walk and I don’t want anyone here doing it either."

Stratfor’s use of insiders for intelligence soon turned into a money-making scheme of questionable legality. The emails show that in 2009 then-Goldman Sachs Managing Director Shea Morenz and Stratfor CEO George Friedman hatched an idea to "utilise the intelligence" it was pulling in from its insider network to start up a captive strategic investment fund. CEO George Friedman explained in a confidential August 2011 document, marked DO NOT SHARE OR DISCUSS : "What StratCap will do is use our Stratfor’s intelligence and analysis to trade in a range of geopolitical instruments, particularly government bonds, currencies and the like". The emails show that in 2011 Goldman Sach’s Morenz invested "substantially" more than $4million and joined Stratfor’s board of directors. Throughout 2011, a complex offshore share structure extending as far as South Africa was erected, designed to make StratCap appear to be legally independent. But, confidentially, Friedman told StratFor staff : "Do not think of StratCap as an outside organisation. It will be integral... It will be useful to you if, for the sake of convenience, you think of it as another aspect of Stratfor and Shea as another executive in Stratfor... we are already working on mock portfolios and trades". StratCap is due to launch in 2012.

The Stratfor emails reveal a company that cultivates close ties with US government agencies and employs former US government staff. It is preparing the 3-year Forecast for the Commandant of the US Marine Corps, and it trains US marines and "other government intelligence agencies" in "becoming government Stratfors". Stratfor’s Vice-President for Intelligence, Fred Burton, was formerly a special agent with the US State Department’s Diplomatic Security Service and was their Deputy Chief of the counterterrorism division. Despite the governmental ties, Stratfor and similar companies operate in complete secrecy with no political oversight or accountability. Stratfor claims that it operates "without ideology, agenda or national bias", yet the emails reveal private intelligence staff who align themselves closely with US government policies and channel tips to the Mossad – including through an information mule in the Israeli newspaper Haaretz, Yossi Melman, who conspired with Guardian journalist David Leigh to secretly, and in violation of WikiLeaks’ contract with the Guardian, move WikiLeaks US diplomatic cables to Israel.

Ironically, considering the present circumstances, Stratfor was trying to get into what it called the leak-focused "gravy train" that sprung up after WikiLeaks’ Afghanistan disclosures :

"[Is it] possible for us to get some of that ’leak-focused’ gravy train ? This is an obvious fear sale, so that’s a good thing. And we have something to offer that the IT security companies don’t, mainly our focus on counter-intelligence and surveillance that Fred and Stick know better than anyone on the planet... Could we develop some ideas and procedures on the idea of ´leak-focused’ network security that focuses on preventing one’s own employees from leaking sensitive information... In fact, I’m not so sure this is an IT problem that requires an IT solution."

Like WikiLeaks’ diplomatic cables, much of the significance of the emails will be revealed over the coming weeks, as our coalition and the public search through them and discover connections. Readers will find that whereas large numbers of Stratfor’s subscribers and clients work in the US military and intelligence agencies, Stratfor gave a complimentary membership to the controversial Pakistan general Hamid Gul, former head of Pakistan’s ISI intelligence service, who, according to US diplomatic cables, planned an IED attack on international forces in Afghanistan in 2006. Readers will discover Stratfor’s internal email classification system that codes correspondence according to categories such as ’alpha’, ’tactical’ and ’secure’. The correspondence also contains code names for people of particular interest such as ’Hizzies’ (members of Hezbollah), or ’Adogg’ (Mahmoud Ahmedinejad).

Stratfor did secret deals with dozens of media organisations and journalists – from Reuters to the Kiev Post. The list of Stratfor’s "Confederation Partners", whom Stratfor internally referred to as its "Confed **** House" are included in the release. While it is acceptable for journalists to swap information or be paid by other media organisations, because Stratfor is a private intelligence organisation that services governments and private clients these relationships are corrupt or corrupting.

WikiLeaks has also obtained Stratfor’s list of informants and, in many cases, records of its payoffs, including $1,200 a month paid to the informant "Geronimo" , handled by Stratfor’s Former State Department agent Fred Burton.

WikiLeaks has built an investigative partnership with more than 25 media organisations and activists to inform the public about this huge body of documents. The organisations were provided access to a sophisticated investigative database developed by WikiLeaks and together with WikiLeaks are conducting journalistic evaluations of these emails. Important revelations discovered using this system will appear in the media in the coming weeks, together with the gradual release of the source documents."

 

https://wikileaks.org/the-gifiles.html