At: 2/13 0:16:56
Surfaced again, eh? Responded to an e-mail?
On Sat, Feb 12, 2011 at 11:11 PM, MICHAEL RILEY, BLOOMBERG/ NEWSROOM: <
michaelriley@bloomberg.net> wrote:
> ok. thx. Karen has surfaced again and I'm supposed to talk to Greg on
> Monday.
>
> ------------------------------------------------------------
> Michael Riley
> Washington bureau/Bloomberg News
> (202) 624 1982
> (720) 635 8553 (cell)
>
> ----- Original Message -----
> From: Barrett Brown <
barriticus@gmail.com>
> To: MICHAEL RILEY (BLOOMBERG/ NEWSROOM:)
> At: 2/12 16:50:35
>
> The lawyer reached me by phone from an Unknown Number line. I recorded it
> as
> is my policy with all of these low-end sort of people and have attached
> here. Didn't catch his name; ask for the guy who sounds like a pussy.
>
> On Sat, Feb 12, 2011 at 3:32 PM, MICHAEL RILEY, BLOOMBERG/ NEWSROOM: <
>
michaelriley@bloomberg.net> wrote:
>
> > Backed out? Do u have the email for said lead cousel u can send me? I
> won't
> > say where I got it.
> >
> > I need to ask these guys some questions and they aren't returning calls.
> >
> >
> >
> >
> > ---
> > Sent From Bloomberg Mobile MSG
> >
> > ---- Original Message ----
> > From: Barrett Brown <
barriticus@gmail.com>
> > At: 2/12/2011 13:19
> >
> > He was simply surprised. Said, "Wow. Yes, I'm interested in all of this."
> > Then I sent him our brand new compilation on why it is that Michael
> > Steckman's clear, specific, fundamental, and longterm involvement with
> the
> > conspiracy against Glenn Greenwald and Wikileaks shows that that
> Palantir,
> > founded by several Paypal vets, was deceitful in its apology and why its
> > disassociation with HBGary does not change the fact that, unless Steckman
> > is
> > fired, it is still the exact same company that played a pivotal role in
> > this
> > conspiracy - and, of course, we are still looking into the extent to
> which
> > others at the company were aware or involved in this conspiracy. Oh,
> look,
> > here's that document now, composed by a crack team of Anons with legal
> and
> > other relevant backgrounds last night in preparation for the 1:00 pm EST
> > conference call that their lead counsel scheduled with me yesterday and
> out
> > of which he has nonetheless quite wisely backed out!
> >
> >
> > *
> > Overview
> >
> > The following emails clearly establish Matthew Steckman's involvement in
> > the
> > creation of the leaked presentation/proposal entitled, "The Wikileaks
> > Threat," including content allegedly considered unethical by the Internet
> > security firm, Palantir, and possibly illegal under U.S. law. According
> to
> > emails sent and received by Steckman, Matthew Steckman:
> >
> > - Was the first to correspond with Bank of America's legal
> > representation, Hunton & Williams regarding Wikileaks, a publisher
> > allegedly
> > holding leaked documents from Bank of America;
> >
> >
> > - Was aware that Hunton & Williams had been recommended to Bank of
> > America by the U.S. Department of Justice;
> >
> >
> > - Solicited the involvement of the security firms Berico and HBGary, in
> > addition to his own firm, Palantir;
> >
> >
> > - Outlined the format of the presentation to be made to Hunton &
> Williams
> > by Palantir, Berico and HBGary, including the number of slides and the
> > possible content of slides;
> >
> >
> > - Received and approved suggestions for the proposal from
> representatives
> > from HBGary, Berico and Palantir, including HBGary CEO Aaron Barr;
> >
> >
> > - Specifically approved suggestions for the proposal, made by Aaron
> Barr,
> > regarding strategic "attacks" on journalist Glenn Greenwald and others
> in
> > the media for the purpose of undermining Wikileaks' support in the
> media;
> >
> >
> > - Specifically approved suggestions for the proposal, made by Aaron
> Barr,
> > regarding the exploitation of weaknesses in Wikileaks' infrastructure,
> > including its network of staff, volunteers and leakers; its submission
> > servers; its finances; its founder, Julian Assange; etc;
> >
> >
> > - Incorporated the above-described suggestions for the proposal, made
> by
> > Aaron Barr, into the finished proposal;
> >
> >
> > - Personally created, formatted, revised, edited, approved and
> > distributed the presentation document in question.
> >
> >
> > Listed emails also detail correspondance between employees of the firms
> > HBGary and Palantir (including Aaron Barr and Matthew Steckman) among
> > others, concerning the internet movement called Anonymous, its alleged
> > connections to Wikileaks, and Aaron's Barr's research on Anonymous,
> > including its alleged connections to Wikileaks.
> >
> >
> >
> > List of emails TO Matthew Steckman RE: Wikileaks
> >
> > - John Woods (Hunton for BoA) requests slides for a presentation to a
> > "large US bank" re: Wikileaks:
> >
> >
> > -
http://search.hbgary.anonleaks.ru/index.php?id<
> >
http://search.hbgary.anonleaks.ru/index.php?id=15036><
> >
http://piratepad.net/ep/search?query=15036>
> > =15036 <
http://search.hbgary.anonleaks.ru/index.php?id=15036>
> >
> >
> > - Eli Bingham (Palantir) requests for sec reps from Palantir, Berico
> and
> > HBGary to join a conference call regarding the "large US bank"
> > opportunity
> > discussed above:
> >
> >
> > -
http://search.hbgary.anonleaks.ru/index.php?id<
> >
http://search.hbgary.anonleaks.ru/index.php?id=15039><
> >
http://piratepad.net/ep/search?query=15039>
> > =15039 <
http://search.hbgary.anonleaks.ru/index.php?id=15039>
> >
> >
> > - Aaron Barr informs Matthew Steckman that he cannot open a file
> > attachment from Steckman's previous email (linked):
> >
> >
> > -
http://search.hbgary.anonleaks.ru/index.php?id<
> >
http://search.hbgary.anonleaks.ru/index.php?id=15059><
> >
http://piratepad.net/ep/search?query=15059>
> > =15059 <
http://search.hbgary.anonleaks.ru/index.php?id=15059>
> >
> >
> > - Aaron Barr discusses sending analysis information to Matthew
> Steckman,
> > regarding BoA/Wikileaks. Barr mentions "mapping" [speculation: the
> > analysis
> > maps seen in the presentation made to Hunton for BoA]:
> >
> >
> > -
http://search.hbgary.anonleaks.ru/index.php?id<
> >
http://search.hbgary.anonleaks.ru/index.php?id=15061><
> >
http://piratepad.net/ep/search?query=15061>
> > =15061 <
http://search.hbgary.anonleaks.ru/index.php?id=15061>
> >
> >
> > - Aaron Barr, to Matthew Stuckman, explicitly lays out potential
> "attack"
> > strategies against Wikileaks' "weak points," citing Wikileaks'
> > volunteers,
> > staff, financials, submission servers, Julian Assange, the perceived
> > security of leakers, etc. [speculation: this appears to be the
> > origination
> > of most of the points made in the palantir/berico/hbgary presentation
> to
> > BoA
> > legal defense]:
> >
> >
> > -
http://search.hbgary.anonleaks.ru/index.php?id<
> >
http://search.hbgary.anonleaks.ru/index.php?id=15069><
> >
http://piratepad.net/ep/search?query=15069>
> > =15069 <
http://search.hbgary.anonleaks.ru/index.php?id=15069>
> >
> >
> > - Aaron Barr introduces Matthew Steckman to the idea of attacking Glenn
> > Greenwald specifically, and makes a case for strategically undermining
> > Wikileaks' support in the "liberal" media. Barr explicitly uses the
> word
> > "attack" in relation to organizations/individuals supporting Wikileaks:
> >
> >
> > -
http://search.hbgary.anonleaks.ru/index.php?id<
> >
http://search.hbgary.anonleaks.ru/index.php?id=15070><
> >
http://piratepad.net/ep/search?query=15070>
> > =15070 <
http://search.hbgary.anonleaks.ru/index.php?id=15070>
> >
> >
> > - Aaron Barr informs Matthew Steckman that he cannot open a file
> > attachment sent by Steckman. Attachment appears to be a draft of the
> > presentation to be made to Hunton for BoA:
> >
> >
> > -
http://search.hbgary.anonleaks.ru/index.php?id<
> >
http://search.hbgary.anonleaks.ru/index.php?id=15075><
> >
http://piratepad.net/ep/search?query=15075>
> > =15075 <
http://search.hbgary.anonleaks.ru/index.php?id=15075>
> >
> >
> > - Aaron Barr agrees with Matthew Steckman that they should find out
> > "later" on whose end is the technical issue keeping Barr from accessing
> > Steckman's BoA/Wikileaks proposal file attachments:
> >
> >
> > -
http://search.hbgary.anonleaks.ru/index.php?id<
> >
http://search.hbgary.anonleaks.ru/index.php?id=15079><
> >
http://piratepad.net/ep/search?query=15079>
> > =15079 <
http://search.hbgary.anonleaks.ru/index.php?id=15079>
> >
> >
> >
> > List of emails FROM Matthew Steckman RE: Wikileaks
> >
> > - Matthew Steckman invites Aaron Barr (and reps from Palantir and
> Berico)
> > to join a conference call about an opportunity from a "large US bank"
> re:
> > Wikileaks (mentioned in previous email):
> >
> >
> > -
http://search.hbgary.anonleaks.ru/index.php?id<
> >
http://search.hbgary.anonleaks.ru/index.php?id=15038><
> >
http://piratepad.net/ep/search?query=15038>
> > =15038 <
http://search.hbgary.anonleaks.ru/index.php?id=15038>
> >
> >
> > - Matthew Steckman summarizes, for Palantir, Berico and HBGary sec
> reps,
> > a phonecall from Hunton and Williams; outlines BoA/Wikileaks
> opportunity
> > as
> > "internal investigation;" mentions BoA seeking injunction against
> > wikileaks;
> > mentions US Department of Justice's recommendation of Hunton &
> Williams,
> > specifically Richard Wyatt, whom steckman refers to as "the emperor,"
> to
> > BoA's general counsel; mentions roles of Palantir, Berico and HBGary;
> > mentions potential prosecution of Wikileaks:
> >
> >
> > -
http://search.hbgary.anonleaks.ru/index.php?id<
> >
http://search.hbgary.anonleaks.ru/index.php?id=15041><
> >
http://piratepad.net/ep/search?query=15041>
> > =15041 <
http://search.hbgary.anonleaks.ru/index.php?id=15041>
> >
> >
> > - Matthew Steckman outlines possible presentation slides for proposal
> to
> > Hunton for BoA, and organizes logistics of upcoming conference call:
> >
> >
> > -
http://search.hbgary.anonleaks.ru/index.php?id<
> >
http://search.hbgary.anonleaks.ru/index.php?id=15044><
> >
http://piratepad.net/ep/search?query=15044>
> > =15044 <
http://search.hbgary.anonleaks.ru/index.php?id=15044>
> >
> >
> > - Matthew Steckman sends "a cleaned up version" of a document for sec
> > reps to "work from" [original attachment is not included at listed
> link,
> > document is an early draft of the BoA proposal.] Steckman informs sec
> > reps
> > from HBGary, Palantir and Berico that he is only collecting information
> > for
> > the time being, regarding the BoA/WIkileaks proposal:
> >
> >
> > -
http://search.hbgary.anonleaks.ru/index.php?id<
> >
http://search.hbgary.anonleaks.ru/index.php?id=15050><
> >
http://piratepad.net/ep/search?query=15050>
> > =15050 <
http://search.hbgary.anonleaks.ru/index.php?id=15050>
> >
> >
> > - Matthew Steckman sends Berico and HBGary reps another "cleaned up
> > version to work from":
> >
> >
> > -
http://search.hbgary.anonleaks.ru/index.php?id<
> >
http://search.hbgary.anonleaks.ru/index.php?id=15051><
> >
http://piratepad.net/ep/search?query=15051>
> > =15051 <
http://search.hbgary.anonleaks.ru/index.php?id=15051>
> >
> >
> > - Matthew Steckman informs John Woods (Hunton for BoA) that the three
> > firms (Palantir, Berico, HBGary) will have coordinated an early
> proposal
> > by
> > "tonight" [Dec 02, 2010]:
> >
> >
> > -
http://search.hbgary.anonleaks.ru/index.php?id<
> >
http://search.hbgary.anonleaks.ru/index.php?id=15052><
> >
http://piratepad.net/ep/search?query=15052>
> > =15052 <
http://search.hbgary.anonleaks.ru/index.php?id=15052>
> >
> >
> > - Matthew Steckman and John Woods (Hunton for BoA) organize logistics
> of
> > morning conference call:
> >
> >
> > -
http://search.hbgary.anonleaks.ru/index.php?id<
> >
http://search.hbgary.anonleaks.ru/index.php?id=15055><
> >
http://piratepad.net/ep/search?query=15055>
> > =15055 <
http://search.hbgary.anonleaks.ru/index.php?id=15055>
> >
> >
> > - Matthew Steckman sends "working draft" of BoA/Wikileaks proposal to
> sec
> > reps from Berico, Palantir and HBGary:
> >
> >
> > -
http://search.hbgary.anonleaks.ru/index.php?id<
> >
http://search.hbgary.anonleaks.ru/index.php?id=15057><
> >
http://piratepad.net/ep/search?query=15057>
> > =15057 <
http://search.hbgary.anonleaks.ru/index.php?id=15057>
> >
> >
> > - Matthew Steckman sends conference call details [date, time, phone
> > number] to John Woods (Hunton for BoA) and Berico, Palantir and HBGary
> > sec
> > reps:
> >
> >
> > -
http://search.hbgary.anonleaks.ru/index.php?id<
> >
http://search.hbgary.anonleaks.ru/index.php?id=15058><
> >
http://piratepad.net/ep/search?query=15058>
> > =15058 <
http://search.hbgary.anonleaks.ru/index.php?id=15058>
> >
> >
> > - Matthew Steckman sends proposal notes ["document"] for upcoming
> > conference call/presentation to John Woods (Hunton for BoA) and Berico,
> > Palantir and HBGary sec reps:
> >
> >
> > -
http://search.hbgary.anonleaks.ru/index.php?id<
> >
http://search.hbgary.anonleaks.ru/index.php?id=15067><
> >
http://piratepad.net/ep/search?query=15067>
> > =15067 <
http://search.hbgary.anonleaks.ru/index.php?id=15067>
> >
> >
> > - Matthew Steckman informs Aaron Barr that he approves of Barr's
> earlier
> > suggestions regarding Wikileaks' strengths/weaknesses and that he plans
> > to
> > "spotlight" an attack on Glenn Greenwald in the upcoming presentation,
> > also
> > per Barr's earlier suggestion [see earlier emails TO Steckman]:
> >
> >
> > -
http://search.hbgary.anonleaks.ru/index.php?id<
> >
http://search.hbgary.anonleaks.ru/index.php?id=15071><
> >
http://piratepad.net/ep/search?query=15071>
> > =15071 <
http://search.hbgary.anonleaks.ru/index.php?id=15071>
> >
> >
> > - Matthew Steckman informs Aaron Barr that Barr's suggestions have been
> > added to the updated proposal and thanks Barr for his suggestions
> > [detailed
> > in emails/synopses above]:
> >
> >
> > -
http://search.hbgary.anonleaks.ru/index.php?id<
> >
http://search.hbgary.anonleaks.ru/index.php?id=15073><
> >
http://piratepad.net/ep/search?query=15073>
> > =15073 <
http://search.hbgary.anonleaks.ru/index.php?id=15073>
> >
> >
> > - Matthew Steckman sends Aaron Barr a "Pfd" [sic] and suggests that
> they
> > need to work out Barr's technical difficulties opening steckman's email
> > attachments "afterwards":
> >
> >
> > -
http://search.hbgary.anonleaks.ru/index.php?id<
> >
http://search.hbgary.anonleaks.ru/index.php?id=15076><
> >
http://piratepad.net/ep/search?query=15076>
> > =15076 <
http://search.hbgary.anonleaks.ru/index.php?id=15076>
> >
> >
> >
> > List of emails TO/FROM Aaron Barr RE: Anonymous Research and/or Anonymous
> > Connections to Wikileaks
> >
> > - Aaron Barr contacts John Woods (Hunton for BoA) about Barr's research
> > on Anonymous. Barr claims to have information about Anonymous that
> > possibly
> > no one else has regarding "organization operations and communications
> > infrastructure as well as key players by name." Barr mentions possible
> > application of this information to another "opportunity" previously
> > discussed with Woods, but does not elaborate:
> >
> >
> > -
http://search.hbgary.anonleaks.ru/index.php?id<
> >
http://search.hbgary.anonleaks.ru/index.php?id=16499><
> >
http://piratepad.net/ep/search?query=16499>
> > =16499 <
http://search.hbgary.anonleaks.ru/index.php?id=16499>
> >
> >
> > - Aaron Barr and Matthew Steckman discuss sharing Barr's research on
> > Anonymous:
> >
> >
> > -
http://search.hbgary.anonleaks.ru/index.php?id<
> >
http://search.hbgary.anonleaks.ru/index.php?id=16379><
> >
http://piratepad.net/ep/search?query=16379>
> > =16379 <
http://search.hbgary.anonleaks.ru/index.php?id=16379>
> >
> >
> > - Aaron Barr and Matthew Stechman discuss meeting and sharing Barr's
> > research on Anonymous:
> >
> >
> > -
http://search.hbgary.anonleaks.ru/index.php?id<
> >
http://search.hbgary.anonleaks.ru/index.php?id=16419><
> >
http://piratepad.net/ep/search?query=16419>
> > =16419 <
http://search.hbgary.anonleaks.ru/index.php?id=16419>
> >
> >
> > - Aaron Barr contacts Dawn Meyerriecks (Office of the Director of
> > National Intelligence) and informs her of his research on Anonymous.
> Barr
> > claims to have put together "a significant data set" and offers to
> > discuss
> > his "results, methodologies, and significance of social media for
> > analysis
> > and exposure":
> >
> >
> > -
http://search.hbgary.anonleaks.ru/index.php?id<
> >
http://search.hbgary.anonleaks.ru/index.php?id=16574><
> >
http://piratepad.net/ep/search?query=16574>
> > =16574 <
http://search.hbgary.anonleaks.ru/index.php?id=16574>
> >
> >
> > - Aaron Barr corresponds with John Woods (Hunton) and claims that he
> has
> > mapped out 80-90% of Anonymous' leadership. Barr claims to be meeting
> > with
> > "govies" [speculation: government officials] "next week" [dated
> > 01/31/2011.]
> > Follow-up to email in which Barr alleges ties between Anonymous and
> > Wikileaks.
> >
> >
> > -
http://search.hbgary.anonleaks.ru/index.php?id<
> >
http://search.hbgary.anonleaks.ru/index.php?id=16834><
> >
http://piratepad.net/ep/search?query=16834>
> > =16834 <
http://search.hbgary.anonleaks.ru/index.php?id=16834>
> >
> >
> > - Aaron Barr discusses with Bill Wansley (Booz, Allen, Hamilton) the
> > possibility of researching ties between Anonymous and Wikileaks; Barr
> > claims there are "many" such ties:
> >
> >
> > -
http://search.hbgary.anonleaks.ru/index.php?id<
> >
http://search.hbgary.anonleaks.ru/index.php?id=16633><
> >
http://piratepad.net/ep/search?query=16633>
> > =16633 <
http://search.hbgary.anonleaks.ru/index.php?id=16633>
> >
> >
> >
> > List of emails TO/FROM Other HBGary Employees RE: Wikileaks and/or
> > Anonymous
> >
> > - Bob Slapnik (HBGary) recounts to HBGary's sales department a recent
> > conversation at a "customer site" about potential markets created by
> the
> > Wikileaks release (i.e. China's resultant access to classified US
> > security
> > intelligence and the US's subsequent need for new sec.) Slapnik
> stresses
> > the
> > importance of targeted language when proposing such products:
> >
> >
> > -
http://search.hbgary.anonleaks.ru/index.php?id<
> >
http://search.hbgary.anonleaks.ru/index.php?id=31460><
> >
http://piratepad.net/ep/search?query=31460>
> > =31460 <
http://search.hbgary.anonleaks.ru/index.php?id=31460>
> >
> >
> > - David Willson informs Ted Vera (HBGary) that the Bank of
> > America/Wikileaks news has been broken by FOX:
> >
> >
> > -
http://search.hbgary.anonleaks.ru/index.php?id<
> >
http://search.hbgary.anonleaks.ru/index.php?id=43197><
> >
http://piratepad.net/ep/search?query=43197>
> > =43197 <
http://search.hbgary.anonleaks.ru/index.php?id=43197>
> >
> >
> >
> > "The Wikileaks Threat" (Original Document) Discussed in Listed Emails
> >
> > - WikiLeaks Response v5:
http://www.mediafire.com/?d08n3fiw6c02bju
> >
> >
> > - WikiLeaks Response v6:
http://www.mediafire.com/?ki4tjk8iaunn5f6
> >
> >
> > - Differences between drafts/versions:
> >
> >
> > - Organizational breakdown expanded
> >
> >
> > - White space changed
> >
> >
> > - Minor wording changes
> >
> >
> > - The rest seems to be identical
> > -
> >
> >
> > Background Brief
> >
> >
> > Based on what Ive seen of their corporate positioning, Palantir seem to
> be
> > invested in the idea that they are one of the good guys. They claim to
> > offer technology which better distinguishes and discriminates amongst
> > information acquired via mass-surveillance, and to permit the tagging
> of
> > this information so that it is accessible only to those with the
> > appropriate
> > clearance and jurisdiction.
> >
> > dedicated to working for the common good and doing
> whats
> > right
> >
> >
> > That deeply felt commitment has been clear since the companys
> inception
> > and is evident in the companys roster of advisors, leaders, engineers,
> and
> > technology experts.
> >
> > White Paper: Privacy and Civil
> Liberties
> > are in Palantirs DNA
> >
> >
http://www.palantir.com/privacy-and-civil-liberties
> >
> > Dam it feels good to be a gangsta...
> >
> > Matthew Steckman
> >
> > (worthwhile background: positioned as trying to make a
> > bad system better
> >
> >
http://www.npr.org/templates/story/story.php?storyId<
> >
>
http://www.npr.org/templates/story/story.php?storyId=106479613&ft=1&f=1014
> > ><
http://piratepad.net/ep/search?query=106479613&ft>
> > =106479613&ft<
> >
>
http://www.npr.org/templates/story/story.php?storyId=106479613&ft=1&f=1014
> > ><
http://piratepad.net/ep/search?query=1&f>
> > =1&f<
> >
>
http://www.npr.org/templates/story/story.php?storyId=106479613&ft=1&f=1014
> > ><
http://piratepad.net/ep/search?query=1014>
> > =1014<
> >
>
http://www.npr.org/templates/story/story.php?storyId=106479613&ft=1&f=1014
> > >
> > )
> >
> > Theyre also pretty high profile, with a market capitalisation of over $1
> > billion (mostly courtesy of PayPal cofounder Peter Thiel) - ie, theyre
> a
> > little more serious than the HBGary fools.
> >
> >
> >
> >
> >
>
http://blogs.forbes.com/oliverchiang/2010/11/12/names-you-need-to-know-in-2011-palantir-technologies/
> >
> >
> > All of which makes it likely that theyre going to be looking to isolate
> > Steckman, emphasising the disparity between their corporate values and
> his
> > conduct. Obviously, having THEIR emails would make it easier to
> determine
> > just how much upper management knew about his work without having to
> > actually ask them only to receive the standard incredulous insistence of
> > virtue. Either way, probing this is likely to give some insight into the
> > scale of the threat as they presently perceive it.
> >
> >
> > On that threat, I think the safest thing to say at the moment is that
> > nobody
> > is quite sure where all of this is going to end up. Equally safe is that
> > whatever we might be able to reduce the Anonymous position to, it will
> > likely be directly contrary to Palantir and their ilk they want this to
> > be
> > a momentary blip, we want it to be the chink that proves the undoing of
> > this
> > sick machine weve all ended up serving and despising. The following is
> > intended to outline some of the bigger picture factors in the form of
> some
> > choice extracts from authoritative sources. This will hopefully yield
> > insights into particular pressure points, fissures and weaknesses to be
> > exploited.
> >
> >
> >
> >
> >
> > Privatization and the Federal Government: An Introduction
> > December 28, 2006 Kevin R. Kosar Congressional Reporting Service
> >
http://www.fas.org/sgp/crs/misc/RL33777.pdf
> >
> > Furthermore, the movement of an activity from the governmental sector to
> > the
> > private sector, or vice versa, has significant ramifications. Most
> > obviously, the behavior of the entity carrying out the task will differ
> > because each sector has different incentives and constraints. One public
> > administration scholar has suggested that the incentives amount to this:
> a
> > government entity may do only what the law permits and prescribes; a
> > private
> > entity may do whatever the law does not forbid.
> >
> > Government agencies, unlike private firms, usually operate under complex
> > accountability hierarchies that include multiple and even conflicting
> > goals.
> > Federal agencies, for example, are subject to the corpus of federal
> > management laws. These laws serve as means for keeping executive branch
> > agencies accountable to Congress, the President, and the public. They
> also
> > embody principles of democratic justice, such as the allowance for public
> > participation and government transparency.
> >
> >
> > Thus, in shifting an activity from the governmental to the private
> sector,
> > the nature of government oversight is transformed. As the components of
> > government provision of goods and services are privatized, the
> jurisdiction
> > of federal management laws, Congress, the President, and the courts is
> > reduced.
> >
> >
> >
> > Privatizations Pretensions
> > Jon D. Michaels
> > [77:717 2010] The University of Chicago Law Review
> >
> >
>
http://lawreview.uchicago.edu/issues/backissues/v77/77_2/77-2-PrivatizationsPretensions-Michaels.pdf
> >
> > Workarounds provide outsourcing agencies with the means of accomplishing
> > distinct policy goals thatbut for the pretext of technocratic
> > privatizationwould either be legally unattainable or much more difficult
> > to
> > realize.
> >
> > Consider the following scenario:
> > Exploiting Legal-Status Differentials. The Department of Homeland
> Security
> > (DHS) would like to establish a data mining operation to gather
> > intelligence
> > on potential terrorist threats. Bristling under stringent federal
> privacy
> > laws imposed on government officialslaws that inhibit DHSs ability to
> > collect and analyze personal information without court
> > authorizationpolicymakers turn to private contractors. Contractors, like
> > most other private individuals, are largely beyond the scope of these
> > federal laws. For the most part, these laws were enacted well before
> > contractors were hired with great regularity to assist with law
> enforcement
> > and counterterrorism initiatives. Now, in an era where outsourcing is
> the
> > norm, DHS may use the statutes narrowness to its advantage and award
> > government contracts to the unencumbered private data brokers. The
> > contractors can then acquire the information more liberally on their own
> > and
> > submit raw data or synthesized intelligence to the government. DHS thus
> > gets
> > the benefit of more sweeping, intrusive searches than would otherwise be
> > permitted of government officials, short of their first obtaining
> warrants
> > or securing legislative change.
> >
> >
> >
> >
> > Report of the Special Rapporteur on the promotion and protection of human
> > rights and
> > fundamental freedoms while countering terrorism, Martin Scheinin
> > HUMAN RIGHTS COUNCIL Thirteenth session
> > A/HRC/13/37 28 December 2009
> >
> >
>
http://www2.ohchr.org/english/bodies/hrcouncil/docs/13session/A-HRC-13-37.pdf
> >
> > [20]States that previously lacked constitutional or statutory safeguards
> > have been able to radically transform their surveillance powers with few
> > restrictions. In countries that have constitutional and legal safeguards,
> > Governments have endangered the protection of the right to privacy by not
> > extending these safeguards to their cooperation with third countries
> > and private
> > actors, or by placing surveillance systems beyond the jurisdiction of
> their
> > constitutions.
> >
> > [41]The Special Rapporteur notes that since September 2001 there has been
> a
> > trend towards outsourcing the collection of intelligence to private
> > contractors... [raising concerns about] lack of proper training, the
> > introduction of a profit motive into situations which are prone to human
> > rights violations, and the often questionable prospect that such
> > contractors
> > will be subject to judicial and parliamentary accountability mechanisms
> >
> >
> >
> >
> > Report of the Special Rapporteur on the promotion and protection of
> human
> > rights and fundamental freedoms while countering terrorism, Martin
> Scheinin
> > HUMAN RIGHTS COUNCIL Tenth session
> > A/HRC/10/3 4 February 2009
> >
> >
>
http://www2.ohchr.org/english/issues/terrorism/rapporteur/docs/A.HRC.10.3.pdf
> >
> > B. Recommendations
> > For legislative assemblies
> > 65. The Special Rapporteur recommends that any interference with the
> right
> > to privacy, family, home or correspondence by an intelligence agency
> should
> > be authorized by provisions of law that are particularly precise,
> > proportionate to the security threat, and offer effective guarantees
> > against
> > abuse. States should ensure that competent authorities apply less
> intrusive
> > investigation methods than special investigation techniques if such
> methods
> > enable a terrorist offence to be detected, prevented or prosecuted with
> > adequate effectiveness. Decision-making authority should be layered so
> that
> > the greater the invasion of privacy, the higher the level of necessary
> > authorization. Furthermore, in order to safeguard against the arbitrary
> use
> > of special investigative techniques and violations of human rights, the
> use
> > of special investigative techniques by the intelligence agencies must be
> > subject to appropriate supervision and review.
> > 66. There should be a domestic legal basis for the storage and use of
> data
> > by intelligence and security services, which is foreseeable as to its
> > effects and subject to scrutiny in the public interest. The law should
> also
> > provide for effective controls on how long information may be retained,
> the
> > use to which it may be put, and who may have access to it, and ensure
> > compliance with international data protection principles in the handling
> of
> > information. There should be audit processes, which include external
> > independent personnel, to ensure that such rules are adhered to.
> >
> > 67. The Special Rapporteur also recommends the adoption of legislation
> that
> > clarifies the rights, responsibilities, and liability of private
> companies
> > in submitting data to government agencies.
> >
> > For the executive power
> > 71. The executive should have effective powers of control, provided for
> in
> > law, over the intelligence agencies and have adequate information about
> > their actions in order to be able to effectively exercise control over
> > them.
> > The minister responsible for the intelligence and security services
> should
> > therefore have the right to approve matters of political sensitivity
> (such
> > as cooperation with agencies from other countries) or undertakings that
> > affect fundamental rights (such as the approval of special investigative
> > powers, whether or not additional external approval is required from a
> > judge).
> >
> > *
> > On Sat, Feb 12, 2011 at 12:50 PM, MICHAEL RILEY, BLOOMBERG/ NEWSROOM: <
> >
michaelriley@bloomberg.net> wrote:
> >
> > > That must have been an interesting conversation. How is he taking all
> > this?
> > >
> > > ------------------------------------------------------------
> > > Michael Riley
> > > Washington bureau/Bloomberg News
> > > (202) 624 1982
> > > (720) 635 8553 (cell)
> > >
> > > ----- Original Message -----
> > > From: Barrett Brown <
barriticus@gmail.com>
> > > To: MICHAEL RILEY (BLOOMBERG/ NEWSROOM:)
> > > At: 2/12 10:18:51
> > >
> > > K. Also finally got in touch with Greenwald for first time since this
> all
> > > went down and laid everything on him at once, including still-secret
> > stuff,
> > > etc. He didn't know I was Anon; we're only very passing acquaintances
> > > despite him quoting me occasionally and speaking at our deal.
> > >
> > > On Sat, Feb 12, 2011 at 9:16 AM, MICHAEL RILEY, BLOOMBERG/ NEWSROOM: <
> > >
michaelriley@bloomberg.net> wrote:
> > >
> > > > That's fascinating stuff.
> > > >
> > > > I'm hoping a flight today just after the time you'll be doing the
> call.
> > > But
> > > > I'll call on the stop-over and see how it went.
> > > >
> > > >
> > > >
> > > >
> > > >
> > > > ---
> > > > Sent From Bloomberg Mobile MSG
> > > >
> > > > ---- Original Message ----
> > > > From: Barrett Brown <
barriticus@gmail.com>
> > > > At: 2/12/2011 3:42
> > > >
> > > > Also, I have a conference call with the lead counsel of Palintir and
> > > > Matthew
> > > > Steckman, who was central to the firm's work on the
> Wikileaks/Greenwald
> > > > conspiracy. This will take place today at 1:00 pm EST and is prompted
> > by
> > > an
> > > > e-mail I wrote Steckman last night telling him he needs to get in
> touch
> > > > with
> > > > me. His lawyer called me and I explained a bit about how Anon
> operates
> > in
> > > > these situations. I will be offering him a deal that will prevent him
> > and
> > > > the company from becoming the next central target so long as he
> > provides
> > > us
> > > > with actionable intel leading to the ruin of the other firms
> involved,
> > > > particularly info on the "secret" partner firms like Endgame.
> > Meanwhile,
> > > > we've determined that a couple of firms involved are close to NSA;
> > we'll
> > > be
> > > > staying away from those for the moment. Unless, of course, someone
> > wants
> > > > info on them for a major story.
> > > >
> > > > On Fri, Feb 11, 2011 at 6:26 PM, Barrett Brown <
barriticus@gmail.com
> >
> > > > wrote:
> > > >
> > > > > oh hai lol.
> > > > >
> > > > >
http://www.lacy.ie/hbgary.php?id=1493
> > > > >
> > > > > <
http://www.lacy.ie/hbgary.php?id=1493>
> > > > >
http://www.lacy.ie/hbgary.php?id=40501
> > > > >
> > > > > <
http://www.lacy.ie/hbgary.php?id=40501>I just spoke to David
> > > Gerulski,
> > > > vp
> > > > > of sales and marketing. Asked him if he had any association with
> > > HBGary.
> > > > He
> > > > > said he couldn't talk about it. Told him I know he is because I
> have
> > > his
> > > > > e-mails in front of me, and that if he wanted to open up
> > communication,
> > > > he
> > > > > can call or e-mail me. Let me know if you'd like recording.
> > > > >
> > > > >
> > > > > On Fri, Feb 11, 2011 at 6:04 PM, MICHAEL RILEY, BLOOMBERG/
> NEWSROOM:
> > <
> > > > >
michaelriley@bloomberg.net> wrote:
> > > > >
> > > > >> ok...thx
> > > > >>
> > > > >> ------------------------------------------------------------
> > > > >> Michael Riley
> > > > >> Washington bureau/Bloomberg News
> > > > >> (202) 624 1982
> > > > >> (720) 635 8553 (cell)
> > > > >>
> > > > >> ----- Original Message -----
> > > > >> From: Barrett Brown <
barriticus@gmail.com>
> > > > >> To: MICHAEL RILEY (BLOOMBERG/ NEWSROOM:)
> > > > >> At: 2/11 19:04:28
> > > > >>
> > > > >> Those are unlikely to come out till Monday.
> > > > >>
> > > > >> On Fri, Feb 11, 2011 at 3:17 PM, barri2009 <
barriticus@gmail.com>
> > > > wrote:
> > > > >>
> > > > >> > Will find out in a few minutes.
> > > > >> > Sent via BlackBerry by AT&T
> > > > >> >
> > > > >> > -----Original Message-----
> > > > >> > From: "MICHAEL RILEY, BLOOMBERG/ NEWSROOM:" <
> > > >
michaelriley@bloomberg.net
> > > > >> >
> > > > >> > Date: 11 Feb 2011 17:21:07
> > > > >> > To: <
barriticus@gmail.com>
> > > > >> > Subject: Re: Fwd: Jussi - Does he work for Nokia? As a Chief of
> > > > >> >
> > > > >> > Hey, barrett. will you let me know when greg's emails go up?
> > > > >> >
> > > > >> > Is it likely to happen tonight?
> > > > >> >
> > > > >> > ------------------------------------------------------------
> > > > >> > Michael Riley
> > > > >> > Washington bureau/Bloomberg News
> > > > >> > (202) 624 1982
> > > > >> > (720) 635 8553 (cell)
> > > > >> >
> > > > >> > ----- Original Message -----
> > > > >> > From: Barrett Brown <
barriticus@gmail.com>
> > > > >> > To: MICHAEL RILEY (BLOOMBERG/ NEWSROOM:)
> > > > >> > At: 2/11 15:36:41
> > > > >> >
> > > > >> > > >
> > > > >> > > > Here you go.
http://ru.phiral.net/~noyx/em.txt
> > > > >> > > >
> > > > >> > > > On Fri, Feb 11, 2011 at 2:00 PM, Barrett Brown <
> > > > >>
barriticus@gmail.com>
> > > > >> > > > wrote:
> > > > >> > > >
> > > > >> > > > > Still looking for that one but wanted to make sure you
> have
> > > this
> > > > >> too.
> > > > >> > > > >
> > > > >> > > > >
http://img52.imageshack.us/img52/5192/pwnedx.jpg
> > > > >> > > > >
> > > > >> > > > >
> > > > >> > > > > On Fri, Feb 11, 2011 at 1:48 PM, MICHAEL RILEY, BLOOMBERG/
> > > > >> NEWSROOM:
> > > > >> > <
> > > > >> > > > >
michaelriley@bloomberg.net> wrote:
> > > > >> > > > >
> > > > >> > > > >> this is great stuff.
> > > > >> > > > >>
> > > > >> > > > >> can i ask one more favor. All those emails where barr is
> > > > bragging
> > > > >> > > about
> > > > >> > > > >> having the goods on anonymous, and then about how pissed
> he
> > > is
> > > > >> once
> > > > >> > > the
> > > > >> > > > >> attack starts. Do you have a copy of them or know where I
> > can
> > > > get
> > > > >> > > them?
> > > > >> > > > the
> > > > >> > > > >> arstechnica piece is pretty comprehensive but i just need
> > to
> > > > lay
> > > > >> > hands
> > > > >> > > > on
> > > > >> > > > >> them to satisfy the bosses that they're real.
> > > > >> > > > >>
> > > > >> > > > >> thoughts?
> > > > >> > > > >>
> > > > >> > > > >>
> > ------------------------------------------------------------
> > > > >> > > > >> Michael Riley
> > > > >> > > > >> Washington bureau/Bloomberg News
> > > > >> > > > >> (202) 624 1982
> > > > >> > > > >> (720) 635 8553 (cell)
> > > > >> > > > >>
> > > > >> > > > >> ----- Original Message -----
> > > > >> > > > >> From: Barrett Brown <
barriticus@gmail.com>
> > > > >> > > > >> To: MICHAEL RILEY (BLOOMBERG/ NEWSROOM:),
> > >
barryeisler@mac.com,
> > > > >> > > > >>
campbell@vertesi.com,
greggatghc@gmail.com,
> > > > >>
ravi.somaiya@gmail.com,
> > > > >> > > > >>
robinsonchicago@gmail.com
> > > > >> > > > >> At: 2/11 5:32:42
> > > > >> > > > >>
> > > > >> > > > >> ---------- Forwarded message ----------
> > > > >> > > > >> From: John <
bigleagues@gmail.com>
> > > > >> > > > >> Date: Fri, Feb 11, 2011 at 4:29 AM
> > > > >> > > > >> Subject: Re: Jussi - Does he work for Nokia? As a Chief
> of
> > > > >> Security?
> > > > >> > > > >> To:
barriticus@gmail.com
> > > > >> > > > >>
> > > > >> > > > >>
> > > > >> > > > >> Barrett,
> > > > >> > > > >>
> > > > >> > > > >> This is getting juicy regarding jussi. I've been obsessed
> > > with
> > > > >> this
> > > > >> > > all
> > > > >> > > > >> night . . .
> > > > >> > > > >>
> > > > >> > > > >> I came across this article:
> > > > >> > > > >>
> > > > >> > > > >>
> > > > >> > > >
> > > > >> > >
> > > > >> >
> > > > >>
> > > >
> > >
> >
>
http://www.tietoyhteiskuntaohjelma.fi/parhaatkaytannot/tietoliikenne_ja_digitv/fi_FI/1146729681443/
> > > > >> > > > >>
> > > > >> > > > >> At the top of the page is a familiar email:
> > > jussij@gmail.comand
> > > > >> it
> > > > >> > > > >> appears
> > > > >> > > > >> the article was published in 2006.
> > > > >> > > > >>
> > > > >> > > > >> At the bottom of the page is a PDF link. I have attached
> > the
> > > > PDF.
> > > > >> At
> > > > >> > > the
> > > > >> > > > >> bottom of the PDF document, are references to Jussi and
> his
> > > > >> > co-author
> > > > >> > > > and
> > > > >> > > > >> what they do at Nokia. What'ya know. Google Translate
> > doesn't
> > > > do
> > > > >> > well
> > > > >> > > > with
> > > > >> > > > >> Finnish to English, but there enough out there to make
> the
> > > case
> > > > >> that
> > > > >> > > > >>
jussij@gmail.com aka*
jussi.jaakonahonokia.com aka
> > > > >> > > >
jussi@mataaratanga.com
> > > > >> > > > >> *aka
> > > > >> > > > >>
jussi.jaakonaho@sentor.se belong to the same guy.
> > > > >> > > > >>
> > > > >> > > > >> Meaning the Chief Security Analyst (or Chief Advisor,
> > > > Enterprise
> > > > >> > Risk
> > > > >> > > &
> > > > >> > > > >> Security) at NOKIA (and the "Industry Keynote Speaker" at
> > the
> > > > >> 2009
> > > > >> > > > >> Forrester's Security Forum in London) . . . wait for it .
> .
> > .
> > > > >> got
> > > > >> > > > >> socially
> > > > >> > > > >> engineered by a 16-year-old-girl.
> > > > >> > > > >>
> > > > >> > > > >>
www.tietoyhteiskuntaohjelma.fi <
> > > > >> >
http://www.tietoyhteiskuntaohjelma.fi
> > > > >> > > > >> %20>has
> > > > >> > > > >> an English version you can switch too, but then strangely
> > no
> > > > >> > reference
> > > > >> > > > to
> > > > >> > > > >> our boy Jussi will come up in the site search.
> > > > >> > > > >>
> > > > >> > > > >> *Supporting Links*
> > > > >> > > > >>
http://www.spoke.com/info/p30H9Zc/JussiJaakonaho (Nokia:
> > > Chief
> > > > >> > > Security
> > > > >> > > > >> Analyst since 2006, Design Engineer 1999-2006)
> > > > >> > > > >>
> > > > >> > > > >>
> > > > >> > > > >>
> > > > >> > > > >>
> > > > >> > > >
> > > > >> > >
> > > > >> >
> > > > >>
> > > >
> > >
> >
>
http://www.forrester.com/Speaker_Bio/0,9010,2358,00.html?speakerID=1659&speakerType=Outside
> > > > >> > > > >> *
> > > > >> > > > >> And it gets funny (not really) when you realize that he
> is
> > > > >> sitting
> > > > >> > on
> > > > >> > > > >> security advisory boards and speaking at conferences:*
> > > > >> > > > >>
> > > > >> > > > >>
> > > > >>
>
http://www.mail-archive.com/darklab@lists.darklab.org/msg00142.html
> > > > >> > > > >>
> > > > >> > > > >>
> > > > >> > > > >>
> > > > >> > > >
> > > > >> > >
> > > > >> >
> > > > >>
> > > >
> > >
> >
>
http://www.lesc.net/blog/intersecting-ideas-cross-disciplineshellipand-taking-boydrsquos-theories-beyond
> > > > >> > > > >>
> > > > >> > > > >>
http://zenpundit.com/?cat=340
> > > > >> > > > >> *This quote should be attributed to Jussi: companies
> wont
> > > die
> > > > >> > > because
> > > > >> > > > of
> > > > >> > > > >> their false actions. they die because of the continuing
> of
> > > the
> > > > >> same
> > > > >> > > > >> actions
> > > > >> > > > >> for too long (which once were right).*
> > > > >> > > > >>
> > > > >> > > > >>
> > > > >> > > > >> *And Jussi offers a lot of expertise . . . including the
> > > > >> discovery
> > > > >> > of
> > > > >> > > a
> > > > >> > > > >> Windows DDoS vulnerability back in 2003:*
> > > > >> > > > >>
> > > > >> > > > >>
> > > > >> > > >
> > > > >> > >
> > > > >> >
> > > > >>
> > > >
> > >
> >
>
http://www.windowsitpro.com/article/windows-2000/denial-of-service-in-microsoft-rpc-endpoint-mapper.aspx
> > > > >> > > > >>
> > > > >> > > > >>
http://www.securityfocus.com/archive/101/475022
> > > > >> > > > >> "pentests can tell client only like "your security sucks
> or
> > > we
> > > > >> are
> > > > >> > > > >> unsure"
> > > > >> > > > >>
> > > > >> > > > >>
> > > > >> >
> > >
http://archives.neohapsis.com/archives/nfr-wizards/1999-q3/0638.html
> > > > >> > > > >>
> > > > >> > > > >>
> > > > >> > > > >> - John
> > > > >> > > > >>
> > > > >> > > > >>
> > > > >> > > > >>
> > > > >> > > > >>
> > > > >> > > > >> On Fri, Feb 11, 2011 at 12:37 AM, barri2009 <
> > > > >>
barriticus@gmail.com>
> > > > >> > > > wrote:
> > > > >> > > > >>
> > > > >> > > > >> > Hmm. I hadn't heard of this. Will look at link when I
> get
> > > > home
> > > > >> in
> > > > >> > a
> > > > >> > > > bit.
> > > > >> > > > >> >
> > > > >> > > > >> > Sent via BlackBerry by AT&T
> > > > >> > > > >> > ------------------------------
> > > > >> > > > >> > *From: * John <
bigleagues@gmail.com>
> > > > >> > > > >> > *Date: *Fri, 11 Feb 2011 01:40:43 -0500
> > > > >> > > > >> > *To: *<
barriticus@gmail.com>
> > > > >> > > > >> > *Subject: *Jussi - Does he work for Nokia? As a Chief
> of
> > > > >> Security?
> > > > >> > > > >> >
> > > > >> > > > >> > Barrett,
> > > > >> > > > >> >
> > > > >> > > > >> >
> > > > >> > > > >> > Nothing you couldn't have found out already, but in
> > reading
> > > > up
> > > > >> on
> > > > >> > > > >> > everything I was curious who this Jussi dude is from
> > > > >> rootkit.com-
> > > > >> > > > >> could
> > > > >> > > > >> > this be the same jussi?:
> > > > >> > > > >> >
> > > > >> > > > >> >
> > > > >> > > > >> >
> > > > >> > > > >>
> > > > >> > > >
> > > > >> > >
> > > > >> >
> > > > >>
> > > >
> > >
> >
>
http://www.forrester.com/Speaker_Bio/0,9010,2358,00.html?speakerID=1659&speakerType=Outside
> > > > >> > > > >> >
> > > > >> > > > >> > I mean how many jussi jaakonaho's can there be?
> > > > >> > > > >> >
> > > > >> > > > >> > - John
> > > > >> > > > >> >
> > > > >> > > > >>
> > > > >> > > > >>
> > > > >> > > > >>
> > > > >> > > > >>
> > > > >> > > > >> --
> > > > >> > > > >> Regards,
> > > > >> > > > >>
> > > > >> > > > >> Barrett Brown
> > > > >> > > > >> 512-560-2302
> > > > >> > > > >>
> > > > >> > > > >
> > > > >> > > > >
> > > > >> > > > >
> > > > >> > > > > --
> > > > >> > > > > Regards,
> > > > >> > > > >
> > > > >> > > > > Barrett Brown
> > > > >> > > > > 512-560-2302
> > > > >> > > > >
> > > > >> > > >
> > > > >> > > >
> > > > >> > > >
> > > > >> > > > --
> > > > >> > > > Regards,
> > > > >> > > >
> > > > >> > > > Barrett Brown
> > > > >> > > > 512-560-2302
> > > > >> > > >
> > > > >> > >
> > > > >> > >
> > > > >> > >
> > > > >> > > --
> > > > >> > > Regards,
> > > > >> > >
> > > > >> > > Barrett Brown
> > > > >> > > 512-560-2302
> > > > >> > >
> > > > >> >
> > > > >> >
> > > > >> >
> > > > >> > --
> > > > >> > Regards,
> > > > >> >
> > > > >> > Barrett Brown
> > > > >> > 512-560-2302
> > > > >> >
> > > > >>
> > > > >>
> > > > >>
> > > > >> --
> > > > >> Regards,
> > > > >>
> > > > >> Barrett Brown
> > > > >> 512-560-2302
> > > > >>
> > > > >
> > > > >
> > > > >
> > > > > --
> > > > > Regards,
> > > > >
> > > > > Barrett Brown
> > > > > 512-560-2302
> > > > >
> > > >
> > > >
> > > >
> > > > --
> > > > Regards,
> > > >
> > > > Barrett Brown
> > > > 512-560-2302
> > > >
> > >
> > >
> > >
> > > --
> > > Regards,
> > >
> > > Barrett Brown
> > > 512-560-2302
> > >
> >
> >
> >
> > --
> > Regards,
> >
> > Barrett Brown
> > 512-560-2302
> >
>
>
>
> --
> Regards,
>
> Barrett Brown
> 512-560-2302
>
--
Regards,
Barrett Brown
512-560-2302