Re: Fwd: Jussi - Does he work for Nokia? As a Chief of
Subject: Re: Fwd: Jussi - Does he work for Nokia? As a Chief of
From: Barrett Brown <barriticus@gmail.com>
Date: 2/12/11, 16:48
To: "MICHAEL RILEY, BLOOMBERG/ NEWSROOM:" <michaelriley@bloomberg.net>

The lawyer reached me by phone from an Unknown Number line. I recorded it as is my policy with all of these low-end sort of people and have attached here. Didn't catch his name; ask for the guy who sounds like a pussy.

On Sat, Feb 12, 2011 at 3:32 PM, MICHAEL RILEY, BLOOMBERG/ NEWSROOM: <michaelriley@bloomberg.net> wrote:
Backed out? Do u have the email for said lead cousel u can send me? I won't say where I got it.

I need to ask these guys some questions and they aren't returning calls.




---
Sent From Bloomberg Mobile MSG

---- Original Message ----
From: Barrett Brown <barriticus@gmail.com>
At: 2/12/2011 13:19

He was simply surprised. Said, "Wow. Yes, I'm interested in all of this."
Then I sent him our brand new compilation on why it is that Michael
Steckman's clear, specific, fundamental, and longterm involvement with the
conspiracy against Glenn Greenwald and Wikileaks shows that that Palantir,
founded by several Paypal vets, was deceitful in its apology and why its
disassociation with HBGary does not change the fact that, unless Steckman is
fired, it is still the exact same company that played a pivotal role in this
conspiracy - and, of course, we are still looking into the extent to which
others at the company were aware or involved in this conspiracy. Oh, look,
here's that document now, composed by a crack team of Anons with legal and
other relevant backgrounds last night in preparation for the 1:00 pm EST
conference call that their lead counsel scheduled with me yesterday and out
of which he has nonetheless quite wisely backed out!


*
Overview

The following emails clearly establish Matthew Steckman's involvement in the
creation of the leaked presentation/proposal entitled, "The Wikileaks
Threat," including content allegedly considered unethical by the Internet
security firm, Palantir, and possibly illegal under U.S. law. According to
emails sent and received by Steckman, Matthew Steckman:

  - Was the first to correspond with Bank of America's legal
  representation, Hunton & Williams regarding Wikileaks, a publisher allegedly
  holding leaked documents from Bank of America;


  - Was aware that Hunton & Williams had been recommended to Bank of
  America by the U.S. Department of Justice;


  - Solicited the involvement of the security firms Berico and HBGary, in
  addition to his own firm, Palantir;


  - Outlined the format of the presentation to be made to Hunton & Williams
  by Palantir, Berico and HBGary, including the number of slides and the
  possible content of slides;


  - Received and approved suggestions for the proposal from representatives
  from HBGary, Berico and Palantir, including HBGary CEO Aaron Barr;


  - Specifically approved suggestions for the proposal, made by Aaron Barr,
  regarding strategic "attacks" on journalist Glenn Greenwald and others in
  the media for the purpose of undermining Wikileaks' support in the media;


  - Specifically approved suggestions for the proposal, made by Aaron Barr,
  regarding the exploitation of weaknesses in Wikileaks' infrastructure,
  including its network of staff, volunteers and leakers; its submission
  servers; its finances; its founder, Julian Assange; etc;


  - Incorporated the above-described suggestions for the proposal, made by
  Aaron Barr, into the finished proposal;


  - Personally created, formatted, revised, edited, approved and
  distributed the presentation document in question.


Listed emails also detail correspondance between employees of the firms
HBGary and Palantir (including Aaron Barr and Matthew Steckman) among
others, concerning the internet movement called Anonymous, its alleged
connections to Wikileaks, and Aaron's Barr's research on Anonymous,
including its alleged connections to Wikileaks.



List of emails TO Matthew Steckman RE: Wikileaks

  - John Woods (Hunton for BoA) requests slides for a presentation to a
  "large US bank" re: Wikileaks:


  -  http://search.hbgary.anonleaks.ru/index.php?id<http://search.hbgary.anonleaks.ru/index.php?id=15036><http://piratepad.net/ep/search?query=15036>
  =15036 <http://search.hbgary.anonleaks.ru/index.php?id=15036>


  - Eli Bingham (Palantir) requests for sec reps from Palantir, Berico and
  HBGary to join a conference call regarding the "large US bank" opportunity
  discussed above:


  -  http://search.hbgary.anonleaks.ru/index.php?id<http://search.hbgary.anonleaks.ru/index.php?id=15039><http://piratepad.net/ep/search?query=15039>
  =15039 <http://search.hbgary.anonleaks.ru/index.php?id=15039>


  - Aaron Barr informs Matthew Steckman that he cannot open a file
  attachment from Steckman's previous email (linked):


  -  http://search.hbgary.anonleaks.ru/index.php?id<http://search.hbgary.anonleaks.ru/index.php?id=15059><http://piratepad.net/ep/search?query=15059>
  =15059 <http://search.hbgary.anonleaks.ru/index.php?id=15059>


  - Aaron Barr discusses sending analysis information to Matthew Steckman,
  regarding BoA/Wikileaks. Barr mentions "mapping" [speculation: the analysis
  maps seen in the presentation made to Hunton for BoA]:


  -  http://search.hbgary.anonleaks.ru/index.php?id<http://search.hbgary.anonleaks.ru/index.php?id=15061><http://piratepad.net/ep/search?query=15061>
  =15061 <http://search.hbgary.anonleaks.ru/index.php?id=15061>


  - Aaron Barr, to Matthew Stuckman, explicitly lays out potential "attack"
  strategies against Wikileaks' "weak points," citing Wikileaks' volunteers,
  staff, financials, submission servers, Julian Assange, the perceived
  security of leakers, etc. [speculation: this appears to be the origination
  of most of the points made in the palantir/berico/hbgary presentation to BoA
  legal defense]:


  -  http://search.hbgary.anonleaks.ru/index.php?id<http://search.hbgary.anonleaks.ru/index.php?id=15069><http://piratepad.net/ep/search?query=15069>
  =15069 <http://search.hbgary.anonleaks.ru/index.php?id=15069>


  - Aaron Barr introduces Matthew Steckman to the idea of attacking Glenn
  Greenwald specifically, and makes a case for strategically undermining
  Wikileaks' support in the "liberal" media. Barr explicitly uses the word
  "attack" in relation to organizations/individuals supporting Wikileaks:


  - http://search.hbgary.anonleaks.ru/index.php?id<http://search.hbgary.anonleaks.ru/index.php?id=15070><http://piratepad.net/ep/search?query=15070>
  =15070 <http://search.hbgary.anonleaks.ru/index.php?id=15070>


  - Aaron Barr informs Matthew Steckman that he cannot open a file
  attachment sent by Steckman. Attachment appears to be a draft of the
  presentation to be made to Hunton for BoA:


  - http://search.hbgary.anonleaks.ru/index.php?id<http://search.hbgary.anonleaks.ru/index.php?id=15075><http://piratepad.net/ep/search?query=15075>
  =15075 <http://search.hbgary.anonleaks.ru/index.php?id=15075>


  - Aaron Barr agrees with Matthew Steckman that they should find out
  "later" on whose end is the technical issue keeping Barr from accessing
  Steckman's BoA/Wikileaks proposal file attachments:


  - http://search.hbgary.anonleaks.ru/index.php?id<http://search.hbgary.anonleaks.ru/index.php?id=15079><http://piratepad.net/ep/search?query=15079>
  =15079 <http://search.hbgary.anonleaks.ru/index.php?id=15079>



List of emails FROM Matthew Steckman RE: Wikileaks

  - Matthew Steckman invites Aaron Barr (and reps from Palantir and Berico)
  to join a conference call about an opportunity from a "large US bank" re:
  Wikileaks (mentioned in previous email):


  - http://search.hbgary.anonleaks.ru/index.php?id<http://search.hbgary.anonleaks.ru/index.php?id=15038><http://piratepad.net/ep/search?query=15038>
  =15038 <http://search.hbgary.anonleaks.ru/index.php?id=15038>


  - Matthew Steckman summarizes, for Palantir, Berico and HBGary sec reps,
  a phonecall from Hunton and Williams; outlines BoA/Wikileaks opportunity as
  "internal investigation;" mentions BoA seeking injunction against wikileaks;
  mentions US Department of Justice's recommendation of Hunton & Williams,
  specifically Richard Wyatt, whom steckman refers to as "the emperor," to
  BoA's general counsel; mentions roles of Palantir, Berico and HBGary;
  mentions potential prosecution of Wikileaks:


  - http://search.hbgary.anonleaks.ru/index.php?id<http://search.hbgary.anonleaks.ru/index.php?id=15041><http://piratepad.net/ep/search?query=15041>
  =15041 <http://search.hbgary.anonleaks.ru/index.php?id=15041>


  - Matthew Steckman outlines possible presentation slides for proposal to
  Hunton for BoA, and organizes logistics of upcoming conference call:


  - http://search.hbgary.anonleaks.ru/index.php?id<http://search.hbgary.anonleaks.ru/index.php?id=15044><http://piratepad.net/ep/search?query=15044>
  =15044 <http://search.hbgary.anonleaks.ru/index.php?id=15044>


  - Matthew Steckman sends "a cleaned up version" of a document for sec
  reps to "work from" [original attachment is not included at listed link,
  document is an early draft of the BoA proposal.] Steckman informs sec reps
  from HBGary, Palantir and Berico that he is only collecting information for
  the time being, regarding the BoA/WIkileaks proposal:


  - http://search.hbgary.anonleaks.ru/index.php?id<http://search.hbgary.anonleaks.ru/index.php?id=15050><http://piratepad.net/ep/search?query=15050>
  =15050 <http://search.hbgary.anonleaks.ru/index.php?id=15050>


  - Matthew Steckman sends Berico and HBGary reps another "cleaned up
  version to work from":


  - http://search.hbgary.anonleaks.ru/index.php?id<http://search.hbgary.anonleaks.ru/index.php?id=15051><http://piratepad.net/ep/search?query=15051>
  =15051 <http://search.hbgary.anonleaks.ru/index.php?id=15051>


  - Matthew Steckman informs John Woods (Hunton for BoA) that the three
  firms (Palantir, Berico, HBGary) will have coordinated an early proposal by
  "tonight" [Dec 02, 2010]:


  - http://search.hbgary.anonleaks.ru/index.php?id<http://search.hbgary.anonleaks.ru/index.php?id=15052><http://piratepad.net/ep/search?query=15052>
  =15052 <http://search.hbgary.anonleaks.ru/index.php?id=15052>


  - Matthew Steckman and John Woods (Hunton for BoA) organize logistics of
  morning conference call:


  - http://search.hbgary.anonleaks.ru/index.php?id<http://search.hbgary.anonleaks.ru/index.php?id=15055><http://piratepad.net/ep/search?query=15055>
  =15055 <http://search.hbgary.anonleaks.ru/index.php?id=15055>


  - Matthew Steckman sends "working draft" of BoA/Wikileaks proposal to sec
  reps from Berico, Palantir and HBGary:


  - http://search.hbgary.anonleaks.ru/index.php?id<http://search.hbgary.anonleaks.ru/index.php?id=15057><http://piratepad.net/ep/search?query=15057>
  =15057 <http://search.hbgary.anonleaks.ru/index.php?id=15057>


  - Matthew Steckman sends conference call details [date, time, phone
  number] to John Woods (Hunton for BoA) and Berico, Palantir and HBGary sec
  reps:


  - http://search.hbgary.anonleaks.ru/index.php?id<http://search.hbgary.anonleaks.ru/index.php?id=15058><http://piratepad.net/ep/search?query=15058>
  =15058 <http://search.hbgary.anonleaks.ru/index.php?id=15058>


  - Matthew Steckman sends proposal notes ["document"] for upcoming
  conference call/presentation to John Woods (Hunton for BoA) and Berico,
  Palantir and HBGary sec reps:


  - http://search.hbgary.anonleaks.ru/index.php?id<http://search.hbgary.anonleaks.ru/index.php?id=15067><http://piratepad.net/ep/search?query=15067>
  =15067 <http://search.hbgary.anonleaks.ru/index.php?id=15067>


  - Matthew Steckman informs Aaron Barr that he approves of Barr's earlier
  suggestions regarding Wikileaks' strengths/weaknesses and that he plans to
  "spotlight" an attack on Glenn Greenwald in the upcoming presentation, also
  per Barr's earlier suggestion [see earlier emails TO Steckman]:


  - http://search.hbgary.anonleaks.ru/index.php?id<http://search.hbgary.anonleaks.ru/index.php?id=15071><http://piratepad.net/ep/search?query=15071>
  =15071 <http://search.hbgary.anonleaks.ru/index.php?id=15071>


  - Matthew Steckman informs Aaron Barr that Barr's suggestions have been
  added to the updated proposal and thanks Barr for his suggestions [detailed
  in emails/synopses above]:


  - http://search.hbgary.anonleaks.ru/index.php?id<http://search.hbgary.anonleaks.ru/index.php?id=15073><http://piratepad.net/ep/search?query=15073>
  =15073 <http://search.hbgary.anonleaks.ru/index.php?id=15073>


  - Matthew Steckman sends Aaron Barr a "Pfd" [sic] and suggests that they
  need to work out Barr's technical difficulties opening steckman's email
  attachments "afterwards":


  - http://search.hbgary.anonleaks.ru/index.php?id<http://search.hbgary.anonleaks.ru/index.php?id=15076><http://piratepad.net/ep/search?query=15076>
  =15076 <http://search.hbgary.anonleaks.ru/index.php?id=15076>



List of emails TO/FROM Aaron Barr RE: Anonymous Research and/or Anonymous
Connections to Wikileaks

  - Aaron Barr contacts John Woods (Hunton for BoA) about Barr's research
  on Anonymous. Barr claims to have information about Anonymous that possibly
  no one else has regarding "organization operations and communications
  infrastructure as well as key players by name." Barr mentions possible
  application of this information to another "opportunity" previously
  discussed with Woods, but does not elaborate:


  - http://search.hbgary.anonleaks.ru/index.php?id<http://search.hbgary.anonleaks.ru/index.php?id=16499><http://piratepad.net/ep/search?query=16499>
  =16499 <http://search.hbgary.anonleaks.ru/index.php?id=16499>


  - Aaron Barr and Matthew Steckman discuss sharing Barr's research on
  Anonymous:


  - http://search.hbgary.anonleaks.ru/index.php?id<http://search.hbgary.anonleaks.ru/index.php?id=16379><http://piratepad.net/ep/search?query=16379>
  =16379 <http://search.hbgary.anonleaks.ru/index.php?id=16379>


  - Aaron Barr and Matthew Stechman discuss meeting and sharing Barr's
  research on Anonymous:


  - http://search.hbgary.anonleaks.ru/index.php?id<http://search.hbgary.anonleaks.ru/index.php?id=16419><http://piratepad.net/ep/search?query=16419>
  =16419 <http://search.hbgary.anonleaks.ru/index.php?id=16419>


  - Aaron Barr contacts Dawn Meyerriecks (Office of the Director of
  National Intelligence) and informs her of his research on Anonymous. Barr
  claims to have put together "a significant data set" and offers to discuss
  his "results, methodologies, and significance of social media for analysis
  and exposure":


  - http://search.hbgary.anonleaks.ru/index.php?id<http://search.hbgary.anonleaks.ru/index.php?id=16574><http://piratepad.net/ep/search?query=16574>
  =16574 <http://search.hbgary.anonleaks.ru/index.php?id=16574>


  - Aaron Barr corresponds with John Woods (Hunton) and claims that he has
  mapped out 80-90% of Anonymous' leadership. Barr claims to be meeting with
  "govies" [speculation: government officials] "next week" [dated 01/31/2011.]
  Follow-up to email in which Barr alleges ties between Anonymous and
  Wikileaks.


  - http://search.hbgary.anonleaks.ru/index.php?id<http://search.hbgary.anonleaks.ru/index.php?id=16834><http://piratepad.net/ep/search?query=16834>
  =16834 <http://search.hbgary.anonleaks.ru/index.php?id=16834>


  - Aaron  Barr discusses with Bill Wansley (Booz, Allen, Hamilton) the
  possibility of researching ties between Anonymous and Wikileaks; Barr
  claims there are "many" such ties:


  - http://search.hbgary.anonleaks.ru/index.php?id<http://search.hbgary.anonleaks.ru/index.php?id=16633><http://piratepad.net/ep/search?query=16633>
  =16633 <http://search.hbgary.anonleaks.ru/index.php?id=16633>



List of emails TO/FROM Other HBGary Employees RE: Wikileaks and/or Anonymous

  - Bob Slapnik (HBGary) recounts to HBGary's sales department a recent
  conversation at a "customer site" about potential markets created by the
  Wikileaks release (i.e. China's resultant access to classified US security
  intelligence and the US's subsequent need for new sec.) Slapnik stresses the
  importance of targeted language when proposing such products:


  - http://search.hbgary.anonleaks.ru/index.php?id<http://search.hbgary.anonleaks.ru/index.php?id=31460><http://piratepad.net/ep/search?query=31460>
  =31460 <http://search.hbgary.anonleaks.ru/index.php?id=31460>


  - David Willson informs Ted Vera (HBGary) that the Bank of
  America/Wikileaks news has been broken by FOX:


  - http://search.hbgary.anonleaks.ru/index.php?id<http://search.hbgary.anonleaks.ru/index.php?id=43197><http://piratepad.net/ep/search?query=43197>
  =43197 <http://search.hbgary.anonleaks.ru/index.php?id=43197>



"The Wikileaks Threat" (Original Document) Discussed in Listed Emails

  - WikiLeaks Response v5: http://www.mediafire.com/?d08n3fiw6c02bju


  - WikiLeaks Response v6: http://www.mediafire.com/?ki4tjk8iaunn5f6


  - Differences between drafts/versions:


  - Organizational breakdown expanded


  - White space changed


  - Minor wording changes


  - The rest seems to be identical
  -


Background Brief


Based on what I’ve seen of their corporate positioning, Palantir seem to be
invested in the idea that they are one of the good guys.  They claim to
offer technology which better distinguishes and discriminates amongst
information acquired via mass-surveillance, and to permit the ‘tagging’ of
this information so that it is accessible only to those with the appropriate
clearance and jurisdiction.

               “ dedicated to working for the common good and doing what’s
right”


 “That deeply felt commitment has been clear since the company’s inception
and is evident in the company’s roster of advisors, leaders, engineers, and
technology experts.”

                              White Paper:     ‘Privacy and Civil Liberties
are in Palantir’s DNA’

http://www.palantir.com/privacy-and-civil-liberties

“Dam it feels good to be a gangsta...”

                              Matthew Steckman

                  (worthwhile background: positioned as trying to make a
bad system better

http://www.npr.org/templates/story/story.php?storyId<http://www.npr.org/templates/story/story.php?storyId=106479613&ft=1&f=1014><http://piratepad.net/ep/search?query=106479613&ft>
=106479613&ft<http://www.npr.org/templates/story/story.php?storyId=106479613&ft=1&f=1014><http://piratepad.net/ep/search?query=1&f>
=1&f<http://www.npr.org/templates/story/story.php?storyId=106479613&ft=1&f=1014><http://piratepad.net/ep/search?query=1014>
=1014<http://www.npr.org/templates/story/story.php?storyId=106479613&ft=1&f=1014>
 )

They’re also pretty high profile, with a market capitalisation of over $1
billion (mostly courtesy of PayPal cofounder Peter Thiel)  - ie, they’re a
little more serious than the HBGary fools.



http://blogs.forbes.com/oliverchiang/2010/11/12/names-you-need-to-know-in-2011-palantir-technologies/


All of which makes it likely that they’re going to be looking to isolate
Steckman, emphasising the disparity between their corporate values and his
conduct.  Obviously, having THEIR emails would make it easier to determine
just how much upper management knew about his work without having to
actually ask them only to receive the standard incredulous insistence of
virtue.  Either way, probing this is likely to give some insight into the
scale of the threat as they presently perceive it.


On that threat, I think the safest thing to say at the moment is that nobody
is quite sure where all of this is going to end up.  Equally safe is that
whatever we might be able to reduce the ‘Anonymous’ position to, it will
likely be directly contrary to Palantir and their ilk – they want this to be
a momentary blip, we want it to be the chink that proves the undoing of this
sick machine we’ve all ended up serving and despising.  The following is
intended to outline some of the bigger picture factors in the form of some
choice extracts from authoritative sources.  This will hopefully yield
insights into particular pressure points, fissures and weaknesses to be
exploited.





Privatization and the Federal Government: An Introduction
December 28, 2006 Kevin R. Kosar   Congressional Reporting Service
http://www.fas.org/sgp/crs/misc/RL33777.pdf

Furthermore, the movement of an activity from the governmental sector to the
private sector, or vice versa, has significant ramifications. Most
obviously, the behavior of the entity carrying out the task will differ
because each sector has different incentives and constraints. One public
administration scholar has suggested that the incentives amount to this: a
government entity may do only what the law permits and prescribes; a private
entity may do whatever the law does not forbid.

Government agencies, unlike private firms, usually operate under complex
accountability hierarchies that include multiple and even conflicting goals.
Federal agencies, for example, are subject to the corpus of federal
management laws. These laws serve as means for keeping executive branch
agencies accountable to Congress, the President, and the public. They also
embody principles of democratic justice, such as the allowance for public
participation and government transparency.


Thus, in shifting an activity from the governmental to the private sector,
the nature of government oversight is transformed. As the components of
government provision of goods and services are privatized, the jurisdiction
of federal management laws, Congress, the President, and the courts is
reduced.



Privatization’s Pretensions
Jon D. Michaels
[77:717 2010]  The University of Chicago Law Review
http://lawreview.uchicago.edu/issues/backissues/v77/77_2/77-2-PrivatizationsPretensions-Michaels.pdf

Workarounds provide outsourcing agencies with the means of accomplishing
distinct policy goals that—but for the pretext of technocratic
privatization—would either be legally unattainable or much more difficult to
realize.

Consider the following scenario:
Exploiting Legal-Status Differentials. The Department of Homeland Security
(DHS) would like to establish a data mining operation to gather intelligence
on potential terrorist threats.  Bristling under stringent federal privacy
laws imposed on government officials—laws that inhibit DHS’s ability to
collect and analyze personal information without court
authorization—policymakers turn to private contractors. Contractors, like
most other private individuals, are largely beyond the scope of these
federal laws.   For the most part, these laws were enacted well before
contractors were hired with great regularity to assist with law enforcement
and counterterrorism initiatives.  Now, in an era where outsourcing is the
norm, DHS may use the statutes’ narrowness to its advantage and award
government contracts to the unencumbered private data brokers. The
contractors can then acquire the information more liberally on their own and
submit raw data or synthesized intelligence to the government. DHS thus gets
the benefit of more sweeping, intrusive searches than would otherwise be
permitted of government officials, short of their first obtaining warrants
or securing legislative change.




Report of the Special Rapporteur on the promotion and protection of human
rights and
fundamental freedoms while countering terrorism, Martin Scheinin
HUMAN RIGHTS COUNCIL Thirteenth session
A/HRC/13/37 28 December 2009
http://www2.ohchr.org/english/bodies/hrcouncil/docs/13session/A-HRC-13-37.pdf

[20]States that previously lacked constitutional or statutory safeguards
have been able to radically transform their surveillance powers with few
restrictions. In countries that have constitutional and legal safeguards,
Governments have endangered the protection of the right to privacy by not
extending these safeguards to their cooperation with third countries
and private
actors, or by placing surveillance systems beyond the jurisdiction of their
constitutions.

[41]The Special Rapporteur notes that since September 2001 there has been a
trend towards outsourcing the collection of intelligence to private
contractors... [raising concerns about] lack of proper training, the
introduction of a profit motive into situations which are prone to human
rights violations, and the often questionable prospect that such contractors
will be subject to judicial and parliamentary accountability mechanisms




 Report of the Special Rapporteur on the promotion and protection of human
rights and fundamental freedoms while countering terrorism, Martin Scheinin
 HUMAN RIGHTS COUNCIL Tenth session
A/HRC/10/3     4 February 2009
http://www2.ohchr.org/english/issues/terrorism/rapporteur/docs/A.HRC.10.3.pdf

B. Recommendations
For legislative assemblies
65. The Special Rapporteur recommends that any interference with the right
to privacy, family, home or correspondence by an intelligence agency should
be authorized by provisions of law that are particularly precise,
proportionate to the security threat, and offer effective guarantees against
abuse. States should ensure that competent authorities apply less intrusive
investigation methods than special investigation techniques if such methods
enable a terrorist offence to be detected, prevented or prosecuted with
adequate effectiveness. Decision-making authority should be layered so that
the greater the invasion of privacy, the higher the level of necessary
authorization. Furthermore, in order to safeguard against the arbitrary use
of special investigative techniques and violations of human rights, the use
of special investigative techniques by the intelligence agencies must be
subject to appropriate supervision and review.
66. There should be a domestic legal basis for the storage and use of data
by intelligence and security services, which is foreseeable as to its
effects and subject to scrutiny in the public interest. The law should also
provide for effective controls on how long information may be retained, the
use to which it may be put, and who may have access to it, and ensure
compliance with international data protection principles in the handling of
information. There should be audit processes, which include external
independent personnel, to ensure that such rules are adhered to.

67. The Special Rapporteur also recommends the adoption of legislation that
clarifies the rights, responsibilities, and liability of private companies
in submitting data to government agencies.

For the executive power
71. The executive should have effective powers of control, provided for in
law, over the intelligence agencies and have adequate information about
their actions in order to be able to effectively exercise control over them.
The minister responsible for the intelligence and security services should
therefore have the right to approve matters of political sensitivity (such
as cooperation with agencies from other countries) or undertakings that
affect fundamental rights (such as the approval of special investigative
powers, whether or not additional external approval is required from a
judge).

*
On Sat, Feb 12, 2011 at 12:50 PM, MICHAEL RILEY, BLOOMBERG/ NEWSROOM: <
michaelriley@bloomberg.net> wrote:

> That must have been an interesting conversation. How is he taking all this?
>
> ------------------------------------------------------------
> Michael Riley
> Washington bureau/Bloomberg News
> (202) 624 1982
> (720) 635 8553 (cell)
>
> ----- Original Message -----
> From: Barrett Brown <barriticus@gmail.com>
> To: MICHAEL RILEY (BLOOMBERG/ NEWSROOM:)
> At:  2/12 10:18:51
>
> K. Also finally got in touch with Greenwald for first time since this all
> went down and laid everything on him at once, including still-secret stuff,
> etc. He didn't know I was Anon; we're only very passing acquaintances
> despite him quoting me occasionally and speaking at our deal.
>
> On Sat, Feb 12, 2011 at 9:16 AM, MICHAEL RILEY, BLOOMBERG/ NEWSROOM: <
> michaelriley@bloomberg.net> wrote:
>
> > That's fascinating stuff.
> >
> > I'm hoping a flight today just after the time you'll be doing the call.
> But
> > I'll call on the stop-over and see how it went.
> >
> >
> >
> >
> >
> > ---
> > Sent From Bloomberg Mobile MSG
> >
> > ---- Original Message ----
> > From: Barrett Brown <barriticus@gmail.com>
> > At: 2/12/2011 3:42
> >
> > Also, I have a conference call with the lead counsel of Palintir and
> > Matthew
> > Steckman, who was central to the firm's work on the Wikileaks/Greenwald
> > conspiracy. This will take place today at 1:00 pm EST and is prompted by
> an
> > e-mail I wrote Steckman last night telling him he needs to get in touch
> > with
> > me. His lawyer called me and I explained a bit about how Anon operates in
> > these situations. I will be offering him a deal that will prevent him and
> > the company from becoming the next central target so long as he provides
> us
> > with actionable intel leading to the ruin of the other firms involved,
> > particularly info on the "secret" partner firms like Endgame. Meanwhile,
> > we've determined that a couple of firms involved are close to NSA; we'll
> be
> > staying away from those for the moment. Unless, of course, someone wants
> > info on them for a major story.
> >
> > On Fri, Feb 11, 2011 at 6:26 PM, Barrett Brown <barriticus@gmail.com>
> > wrote:
> >
> > > oh hai lol.
> > >
> > > http://www.lacy.ie/hbgary.php?id=1493
> > >
> > > <http://www.lacy.ie/hbgary.php?id=1493>
> > > http://www.lacy.ie/hbgary.php?id=40501
> > >
> > > <http://www.lacy.ie/hbgary.php?id=40501>I just spoke to David
> Gerulski,
> > vp
> > > of sales and marketing. Asked him if he had any association with
> HBGary.
> > He
> > > said he couldn't talk about it. Told him I know he is because I have
> his
> > > e-mails in front of me, and that if he wanted to open up communication,
> > he
> > > can call or e-mail me. Let me know if you'd like recording.
> > >
> > >
> > > On Fri, Feb 11, 2011 at 6:04 PM, MICHAEL RILEY, BLOOMBERG/ NEWSROOM: <
> > > michaelriley@bloomberg.net> wrote:
> > >
> > >> ok...thx
> > >>
> > >> ------------------------------------------------------------
> > >> Michael Riley
> > >> Washington bureau/Bloomberg News
> > >> (202) 624 1982
> > >> (720) 635 8553 (cell)
> > >>
> > >> ----- Original Message -----
> > >> From: Barrett Brown <barriticus@gmail.com>
> > >> To: MICHAEL RILEY (BLOOMBERG/ NEWSROOM:)
> > >> At:  2/11 19:04:28
> > >>
> > >> Those are unlikely to come out till Monday.
> > >>
> > >> On Fri, Feb 11, 2011 at 3:17 PM, barri2009 <barriticus@gmail.com>
> > wrote:
> > >>
> > >> > Will find out in a few minutes.
> > >> > Sent via BlackBerry by AT&T
> > >> >
> > >> > -----Original Message-----
> > >> > From: "MICHAEL RILEY, BLOOMBERG/ NEWSROOM:" <
> > michaelriley@bloomberg.net
> > >> >
> > >> > Date: 11 Feb 2011 17:21:07
> > >> > To: <barriticus@gmail.com>
> > >> > Subject: Re: Fwd: Jussi - Does he work for Nokia? As a Chief of
> > >> >
> > >> > Hey, barrett. will you let me know when greg's emails go up?
> > >> >
> > >> > Is it likely to happen tonight?
> > >> >
> > >> > ------------------------------------------------------------
> > >> > Michael Riley
> > >> > Washington bureau/Bloomberg News
> > >> > (202) 624 1982
> > >> > (720) 635 8553 (cell)
> > >> >
> > >> > ----- Original Message -----
> > >> > From: Barrett Brown <barriticus@gmail.com>
> > >> > To: MICHAEL RILEY (BLOOMBERG/ NEWSROOM:)
> > >> > At:  2/11 15:36:41
> > >> >
> > >> > > >
> > >> > > > Here you go. http://ru.phiral.net/~noyx/em.txt
> > >> > > >
> > >> > > > On Fri, Feb 11, 2011 at 2:00 PM, Barrett Brown <
> > >> barriticus@gmail.com>
> > >> > > > wrote:
> > >> > > >
> > >> > > > > Still looking for that one but wanted to make sure you have
> this
> > >> too.
> > >> > > > >
> > >> > > > > http://img52.imageshack.us/img52/5192/pwnedx.jpg
> > >> > > > >
> > >> > > > >
> > >> > > > > On Fri, Feb 11, 2011 at 1:48 PM, MICHAEL RILEY, BLOOMBERG/
> > >> NEWSROOM:
> > >> > <
> > >> > > > > michaelriley@bloomberg.net> wrote:
> > >> > > > >
> > >> > > > >> this is great stuff.
> > >> > > > >>
> > >> > > > >> can i ask one more favor. All those emails where barr is
> > bragging
> > >> > > about
> > >> > > > >> having the goods on anonymous, and then about how pissed he
> is
> > >> once
> > >> > > the
> > >> > > > >> attack starts. Do you have a copy of them or know where I can
> > get
> > >> > > them?
> > >> > > > the
> > >> > > > >> arstechnica piece is pretty comprehensive but i just need to
> > lay
> > >> > hands
> > >> > > > on
> > >> > > > >> them to satisfy the bosses that they're real.
> > >> > > > >>
> > >> > > > >> thoughts?
> > >> > > > >>
> > >> > > > >> ------------------------------------------------------------
> > >> > > > >> Michael Riley
> > >> > > > >> Washington bureau/Bloomberg News
> > >> > > > >> (202) 624 1982
> > >> > > > >> (720) 635 8553 (cell)
> > >> > > > >>
> > >> > > > >> ----- Original Message -----
> > >> > > > >> From: Barrett Brown <barriticus@gmail.com>
> > >> > > > >> To: MICHAEL RILEY (BLOOMBERG/ NEWSROOM:),
> barryeisler@mac.com,
> > >> > > > >> campbell@vertesi.com, greggatghc@gmail.com,
> > >> ravi.somaiya@gmail.com,
> > >> > > > >> robinsonchicago@gmail.com
> > >> > > > >> At:  2/11  5:32:42
> > >> > > > >>
> > >> > > > >> ---------- Forwarded message ----------
> > >> > > > >> From: John <bigleagues@gmail.com>
> > >> > > > >> Date: Fri, Feb 11, 2011 at 4:29 AM
> > >> > > > >> Subject: Re: Jussi - Does he work for Nokia? As a Chief of
> > >> Security?
> > >> > > > >> To: barriticus@gmail.com
> > >> > > > >>
> > >> > > > >>
> > >> > > > >> Barrett,
> > >> > > > >>
> > >> > > > >> This is getting juicy regarding jussi. I've been obsessed
> with
> > >> this
> > >> > > all
> > >> > > > >> night . . .
> > >> > > > >>
> > >> > > > >> I came across this article:
> > >> > > > >>
> > >> > > > >>
> > >> > > >
> > >> > >
> > >> >
> > >>
> >
> http://www.tietoyhteiskuntaohjelma.fi/parhaatkaytannot/tietoliikenne_ja_digitv/fi_FI/1146729681443/
> > >> > > > >>
> > >> > > > >> At the top of the page is a familiar email:
> jussij@gmail.comand
> > >> it
> > >> > > > >> appears
> > >> > > > >> the article was published in 2006.
> > >> > > > >>
> > >> > > > >> At the bottom of the page is a PDF link. I have attached the
> > PDF.
> > >> At
> > >> > > the
> > >> > > > >> bottom of the PDF document, are references to Jussi and his
> > >> > co-author
> > >> > > > and
> > >> > > > >> what they do at Nokia. What'ya know. Google Translate doesn't
> > do
> > >> > well
> > >> > > > with
> > >> > > > >> Finnish to English, but there enough out there to make the
> case
> > >> that
> > >> > > > >> jussij@gmail.com aka* jussi.jaakonahonokia.com aka
> > >> > > > jussi@mataaratanga.com
> > >> > > > >> *aka
> > >> > > > >> jussi.jaakonaho@sentor.se belong to the same guy.
> > >> > > > >>
> > >> > > > >> Meaning the Chief Security Analyst (or Chief Advisor,
> > Enterprise
> > >> > Risk
> > >> > > &
> > >> > > > >> Security) at NOKIA (and the "Industry Keynote Speaker" at the
> > >> 2009
> > >> > > > >> Forrester's Security Forum in London) . . . wait for it . . .
> > >>  got
> > >> > > > >> socially
> > >> > > > >> engineered by a 16-year-old-girl.
> > >> > > > >>
> > >> > > > >> www.tietoyhteiskuntaohjelma.fi <
> > >> > http://www.tietoyhteiskuntaohjelma.fi
> > >> > > > >> %20>has
> > >> > > > >> an English version you can switch too, but then strangely no
> > >> > reference
> > >> > > > to
> > >> > > > >> our boy Jussi will come up in the site search.
> > >> > > > >>
> > >> > > > >> *Supporting Links*
> > >> > > > >> http://www.spoke.com/info/p30H9Zc/JussiJaakonaho (Nokia:
> Chief
> > >> > > Security
> > >> > > > >> Analyst since 2006, Design Engineer 1999-2006)
> > >> > > > >>
> > >> > > > >>
> > >> > > > >>
> > >> > > > >>
> > >> > > >
> > >> > >
> > >> >
> > >>
> >
> http://www.forrester.com/Speaker_Bio/0,9010,2358,00.html?speakerID=1659&speakerType=Outside
> > >> > > > >> *
> > >> > > > >> And it gets funny (not really) when you realize that he is
> > >> sitting
> > >> > on
> > >> > > > >> security advisory boards and speaking at conferences:*
> > >> > > > >>
> > >> > > > >>
> > >> http://www.mail-archive.com/darklab@lists.darklab.org/msg00142.html
> > >> > > > >>
> > >> > > > >>
> > >> > > > >>
> > >> > > >
> > >> > >
> > >> >
> > >>
> >
> http://www.lesc.net/blog/intersecting-ideas-cross-disciplineshellipand-taking-boydrsquos-theories-beyond
> > >> > > > >>
> > >> > > > >> http://zenpundit.com/?cat=340
> > >> > > > >> *This quote should be attributed to Jussi: “companies won’t
> die
> > >> > > because
> > >> > > > of
> > >> > > > >> their false actions. they die because of the continuing of
> the
> > >> same
> > >> > > > >> actions
> > >> > > > >> for too long (which once were right).”*
> > >> > > > >>
> > >> > > > >>
> > >> > > > >> *And Jussi offers a lot of expertise . . . including the
> > >> discovery
> > >> > of
> > >> > > a
> > >> > > > >> Windows DDoS vulnerability back in 2003:*
> > >> > > > >>
> > >> > > > >>
> > >> > > >
> > >> > >
> > >> >
> > >>
> >
> http://www.windowsitpro.com/article/windows-2000/denial-of-service-in-microsoft-rpc-endpoint-mapper.aspx
> > >> > > > >>
> > >> > > > >> http://www.securityfocus.com/archive/101/475022
> > >> > > > >> "pentests can tell client only like "your security sucks or
> we
> > >> are
> > >> > > > >>  unsure"
> > >> > > > >>
> > >> > > > >>
> > >> >
> http://archives.neohapsis.com/archives/nfr-wizards/1999-q3/0638.html
> > >> > > > >>
> > >> > > > >>
> > >> > > > >> - John
> > >> > > > >>
> > >> > > > >>
> > >> > > > >>
> > >> > > > >>
> > >> > > > >> On Fri, Feb 11, 2011 at 12:37 AM, barri2009 <
> > >> barriticus@gmail.com>
> > >> > > > wrote:
> > >> > > > >>
> > >> > > > >> > Hmm. I hadn't heard of this. Will look at link when I get
> > home
> > >> in
> > >> > a
> > >> > > > bit.
> > >> > > > >> >
> > >> > > > >> > Sent via BlackBerry by AT&T
> > >> > > > >> > ------------------------------
> > >> > > > >> > *From: * John <bigleagues@gmail.com>
> > >> > > > >> > *Date: *Fri, 11 Feb 2011 01:40:43 -0500
> > >> > > > >> > *To: *<barriticus@gmail.com>
> > >> > > > >> > *Subject: *Jussi - Does he work for Nokia? As a Chief of
> > >> Security?
> > >> > > > >> >
> > >> > > > >> > Barrett,
> > >> > > > >> >
> > >> > > > >> >
> > >> > > > >> > Nothing you couldn't have found out already, but in reading
> > up
> > >> on
> > >> > > > >> > everything I was curious who this Jussi dude is from
> > >> rootkit.com-
> > >> > > > >> could
> > >> > > > >> > this be the same jussi?:
> > >> > > > >> >
> > >> > > > >> >
> > >> > > > >> >
> > >> > > > >>
> > >> > > >
> > >> > >
> > >> >
> > >>
> >
> http://www.forrester.com/Speaker_Bio/0,9010,2358,00.html?speakerID=1659&speakerType=Outside
> > >> > > > >> >
> > >> > > > >> > I mean how many jussi jaakonaho's can there be?
> > >> > > > >> >
> > >> > > > >> > - John
> > >> > > > >> >
> > >> > > > >>
> > >> > > > >>
> > >> > > > >>
> > >> > > > >>
> > >> > > > >> --
> > >> > > > >> Regards,
> > >> > > > >>
> > >> > > > >> Barrett Brown
> > >> > > > >> 512-560-2302
> > >> > > > >>
> > >> > > > >
> > >> > > > >
> > >> > > > >
> > >> > > > > --
> > >> > > > > Regards,
> > >> > > > >
> > >> > > > > Barrett Brown
> > >> > > > > 512-560-2302
> > >> > > > >
> > >> > > >
> > >> > > >
> > >> > > >
> > >> > > > --
> > >> > > > Regards,
> > >> > > >
> > >> > > > Barrett Brown
> > >> > > > 512-560-2302
> > >> > > >
> > >> > >
> > >> > >
> > >> > >
> > >> > > --
> > >> > > Regards,
> > >> > >
> > >> > > Barrett Brown
> > >> > > 512-560-2302
> > >> > >
> > >> >
> > >> >
> > >> >
> > >> > --
> > >> > Regards,
> > >> >
> > >> > Barrett Brown
> > >> > 512-560-2302
> > >> >
> > >>
> > >>
> > >>
> > >> --
> > >> Regards,
> > >>
> > >> Barrett Brown
> > >> 512-560-2302
> > >>
> > >
> > >
> > >
> > > --
> > > Regards,
> > >
> > > Barrett Brown
> > > 512-560-2302
> > >
> >
> >
> >
> > --
> > Regards,
> >
> > Barrett Brown
> > 512-560-2302
> >
>
>
>
> --
> Regards,
>
> Barrett Brown
> 512-560-2302
>



--
Regards,

Barrett Brown
512-560-2302



--
Regards,

Barrett Brown
512-560-2302