“
The truth, indeed, is out—but the ears to hear it and the minds to learn from it seem to have been atrophied by a cultivated ignorance and a nearly total loss of critical insight.
”
”
Murray Bookchin (To Remember Spain: The Anarchist and Syndicalist Revolution of 1936)
“
Freedom of speech has a number.It was the WikiLeaks IP Address.
”
”
Daniel Domscheit-Berg (Inside WikiLeaks: My Time with Julian Assange at the World's Most Dangerous Website)
“
This is the paradox of public space: even if everyone knows an unpleasant fact, saying it in public changes everything. One of the first measures taken by the new Bolshevik government in 1918 was to make public the entire corpus of tsarist secret diplomacy, all the secret agreements, the secret clauses of public agreements etc. There too the target was the entire functioning of the state apparatuses of power.
(Žižek, S. "Good Manners in the Age of WikiLeaks." London Review of Books 33.2 (2011): 9-10. )
”
”
Slavoj Žižek
“
Google's colourful, playful logo is imprinted on human retinas just under six billion times each day, 2.1 trillion times a year - an opportunity for respondent conditioning enjoyed by no other company in history.
”
”
Julian Assange
“
There is no way that the new WikiLeaks leaks don't leave Hillary Clinton holding the smoking gun. The time for her departure may come next week or next month, but sooner or later, the weakened and humiliated secretary of state will have to pay.
”
”
Jack Shafer
“
But the crisis we face now is new. Its transnational nature and reliance on non–state actors who can use digital media to override borders—Julian Assange, the founder of WikiLeaks, is a prime example
”
”
Sarah Kendzior (Hiding in Plain Sight: The Invention of Donald Trump and the Erosion of America)
“
This is the paradox of public space: even if everyone knows an unpleasant fact, saying it in public changes everything. One of the first measures taken by the new Bolshevik government in 1918 was to make public the entire corpus of tsarist secret diplomacy, all the secret agreements, the secret clauses of public agreements etc. There too the target was the entire functioning of the state apparatuses of power.
”
”
Slavoj Žižek
“
It would have been nice to get this attention in any other context. WikiLeaks has kicked the hornet’s nest, and the swarm is headed towards us.
”
”
Dominic Frisby (Bitcoin: the Future of Money?)
“
You know you have a transparency problem when citizens of a democracy need to rely on WikiLeaks for details on changes to laws.
”
”
Ziad K. Abdelnour (Economic Warfare: Secrets of Wealth Creation in the Age of Welfare Politics)
“
The 2016 cyberattack was not just another case of simple Kompromat - meddling in the political affairs of a satellite nation or an individual dissenter. It was a direct attempt to hijack and derail the traditional processes and norms that held the United States together for more than 240 years. The attempt was even more brazen due to the apparent belief that Putin assumed that he and his oligarchy could charm, groom and select a candidate, then with the right amount of cybercrime and enough organized propaganda they could actually choose a president of the United States to do their bidding.
”
”
Malcolm W. Nance (The Plot to Hack America: How Putin's Cyberspies and WikiLeaks Tried to Steal the 2016 Election)
“
Snowden evidently knew of WikiLeaks, a niche transparency website
”
”
Luke Harding (The Snowden Files: The Inside Story of the World's Most Wanted Man)
“
in the hopes of proposing an alternative to the model of a hacker called “Mendax” (“speaker of lies”)—the pseudonym of the young man who’d grow up to become WikiLeaks’ Julian Assange.
”
”
Edward Snowden (Permanent Record)
“
I can support Al-Qaeda, the Ku Klux Klan, buy weapons and drugs and all kinds of porn with my Visa card. There is nobody investigating this, but I cannot support a human rights organisation which is fighting for freedom of expression, - Olafur Sigurvinsson, supporter of wikileaks, taken from article by RT discussing a court battle over freedom to donate money to wikileaks.
”
”
Olafur Sigurvinsson
“
He [Edward Snowden] has been careful with his info, doling it out to responsible news organizations — The Post, the New York Times, the Guardian, etc. — and not tossing it up in the air, WikiLeaks style, and echoing the silly mantra “Information wants to be free.” (No. Information, like most of us, wants a home in the Hamptons.)” – Richard Cohen, Washington Post (10/22/2013)
”
”
Richard Martin Cohen
“
Facebook in particular is the most appalling spying machine that has ever been invented,” Wikileaks founder Julian Assange said in 2011. “Here we have the world’s most comprehensive database about people, their relationships, their names, their addresses, their locations, and the communications with each other, their relatives, all sitting within the United States, all accessible to US intelligence.”37 Assange’s
”
”
Sarah Kendzior (They Knew: How a Culture of Conspiracy Keeps America Complacent)
“
Since September eleventh, the government’s rhetoric has been that if you have nothing to hide, you have nothing to worry about,” says Jones with just a hint of righteous anger in his voice. “I say if those are the rules of the game, play them across the board. Show us what goes on.
”
”
Andy Greenberg (This Machine Kills Secrets: How WikiLeakers, Cypherpunks, and Hacktivists Aim to Free the World's Information)
“
Due to their meddling, activities which were considered routine politics in America are now suspect.
”
”
Malcolm W. Nance (The Plot to Hack America: How Putin's Cyberspies and WikiLeaks Tried to Steal the 2016 Election)
“
There are no morals in politics; there is only expedience. A scoundrel may be of use to us just because he is a scoundrel. —Vladimir Ilyich Lenin
”
”
Malcolm W. Nance (The Plot to Hack America: How Putin's Cyberspies and WikiLeaks Tried to Steal the 2016 Election)
“
We don’t yet know the names of the architects who will build the next upgrade to the secret-killing machine. But we’ll know them by their work.
”
”
Andy Greenberg (This Machine Kills Secrets: How WikiLeakers, Cypherpunks, and Hacktivists Aim to Free the World's Information)
“
Nance’s Law of Intelligence Kismet: “Coincidence takes a lot of planning.
”
”
Malcolm W. Nance (The Plot to Hack America: How Putin's Cyberspies and WikiLeaks Tried to Steal the 2016 Election)
“
In a 2007 cable about Nauru, made public by WikiLeaks, an unnamed U.S. official summed up his government’s analysis of what went wrong on the island: “Nauru simply spent extravagantly, never worrying about tomorrow.” Fair enough, but that diagnosis is hardly unique to Nauru; our entire culture is extravagantly drawing down finite resources, never worrying about tomorrow. For a couple of hundred years we have been telling ourselves that we can dig the midnight black remains of other life forms out of the bowels of the earth, burn them in massive quantities, and that the airborne particles and gases released into the atmosphere - because we can’t see them - will have no effect whatsoever. Or if they do, we humans, brilliant as we are, will just invent our way out of whatever mess we have made.
And we tell ourselves all kinds of similarly implausible no-consequences stories all the time, about how we can ravage the world and suffer no adverse effects. Indeed we are always surprised when it works out otherwise. We extract and do not replenish and wonder why the fish have disappeared and the soil requires ever more “inputs” (like phosphate) to stay fertile. We occupy countries and arm their militias and then wonder why they hate us. We drive down wages, ship jobs overseas, destroy worker protections, hollow out local economies, then wonder why people can’t afford to shop as much as they used to. We offer those failed shoppers subprime mortgages instead of steady jobs and then wonder why no one foresaw that a system built on bad debts would collapse.
At every stage our actions are marked by a lack of respect for the powers we are unleashing - a certainty, or at least a hope, that the nature we have turned to garbage, and the people we have treated like garbage, will not come back to haunt us.
”
”
Naomi Klein (This Changes Everything: Capitalism vs. The Climate)
“
The 2016 presidential election was already surreal—a former reality TV host fueled by white backlash had completed a hostile takeover of the Republican Party—before the bears emerged.
”
”
Malcolm W. Nance (The Plot to Hack America: How Putin's Cyberspies and WikiLeaks Tried to Steal the 2016 Election)
“
Julian Assange, the founder of WikiLeaks, in a speech to Cambridge students in March 2011, it is also the greatest spying machine the world has ever seen. It is not a technology that favours freedom of speech. It is not a technology that favours human rights. It is not a technology that favours civil life. Rather it is a technology that can be used to set up a totalitarian spying regime, the likes of which we have never seen.
”
”
John Naughton (From Gutenberg to Zuckerberg: What You Really Need to Know about the Internet)
“
Imagine two global cyberwars being waged secretly against America and our political establishment incapable of passing a law or allocating funds to stop it because the legislators have already been influenced by a foreign power.
”
”
Malcolm W. Nance (The Plot to Hack America: How Putin's Cyberspies and WikiLeaks Tried to Steal the 2016 Election)
“
You'll have the right to be angry about Vault 7 only after you boycott dragnet surveillance data providers like Google, Microsoft, Skype, Facebook and LinkedIn. The true threat is coming from the private sector surveillance profiteers.
”
”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
“
The received wisdom in advanced capitalist societies is that there still exists an organic “civil society sector” in which institutions form autonomously and come together to manifest the interests and will of citizens. The fable has it that the boundaries of this sector are respected by actors from government and the “private sector,” leaving a safe space for NGOs and nonprofits to advocate for things like human rights, free speech, and accountable government.
This sounds like a great idea. But if it was ever true, it has not been for decades. Since at least the 1970s, authentic actors like unions and churches have folded under a sustained assault by free-market statism, transforming “civil society” into a buyer’s market for political factions and corporate interests looking to exert influence at arm’s length. The last forty years have seen a huge proliferation of think tanks and political NGOs whose purpose, beneath all the verbiage, is to execute political agendas by proxy.
”
”
Julian Assange (When Google Met Wikileaks)
“
Vietnam had never been a true civil war. It was a war of conquest, initiated and perpetuated for more than two decades by the United States, fueled by presidential secrecy and lies. It was no catastrophic accident. As Ellsberg wrote, it was simply “a crime.
”
”
Andy Greenberg (This Machine Kills Secrets: How WikiLeakers, Cypherpunks, and Hacktivists Aim to Free the World's Information)
“
WikiLeaks told us how keen the Coalition is to exploit the boats. In late 2009, in the dying days of Malcolm Turnbull’s leadership of the Opposition, a “key Liberal party strategist” popped in to the US embassy in Canberra to say how pleased the party was that refugee boats were, once again, making their way to Christmas Island. “The issue was ‘fantastic,’” he said. “And ‘the more boats that come the better.’” But he admitted they had yet to find a way to make the issue work in their favour: “his research indicated only a ‘slight trend’ towards the Coalition.
”
”
David Marr (Political Animal: The Making of Tony Abbott [Quarterly Essay 47])
“
campaign aides came to believe that there was a big and telling difference between the disclosure of DNC e-mails earlier in the summer and the reveal of the Podesta rounds. Rather than a massive, untargeted one-time release, this time there seemed to be greater political sophistication in the slow-burn method of daily releases for the final month of the campaign—and the Podesta e-mails were presented in an easily searchable format. The biggest difference they detected was that WikiLeaks had seemed to acquire a close enough understanding of American domestic politics to time its releases and publish e-mails on days when they would have greater relevance in the news.
”
”
Jonathan Allen (Shattered: Inside Hillary Clinton's Doomed Campaign)
“
Dotcom believes one of the reasons he was targeted was his support for Wikileaks founder Julian Assange. He says he was compelled to reach out to the site after US soldier Bradley Manning leaked documents to it. The infamous video recording of the Apache gunship gunning down a group of Iraqis (some of whom, despite widespread belief to the contrary, were later revealed to have been armed), including two Reuters journalists, was the trigger.
“Wow, this is really crazy,” Dotcom recalls thinking, watching the black-and-white footage and hearing the operators of the helicopter chat about firing on the group. He made a €20,000 donation to Wikileaks through Megaupload’s UK account. “That was one of the largest donations they got,” he says. According to Dotcom, the US, at the time, was monitoring Wikileaks and trying better to understand its support base. “My name must have popped right up.”
The combination of a leaking culture and a website dedicated to producing leaked material would horrify the US government, he says. A willing leaker and a platform on which to do it was “their biggest enemy and their biggest fear . . . If you are in a corrupt government and you know how much fishy stuff is going on in the background, to you, that is the biggest threat — to have a site where people can anonymously submit documents.”
Neil MacBride was appointed to the Wikileaks case, meaning Dotcom shares prosecutors with Assange. “I think the Wikileaks connection got me on the radar.”
Dotcom believes the US was most scared of the threat of inspiration Wikileaks posed. He also believes it shows just how many secrets the US has hidden from the public and the rest of the world. “That’s why they are going after that so hard. Only a full transparent government will have no corruption and no back door deals or secret organisations or secret agreements. The US is the complete opposite of that. It is really difficult to get any information in the US, so whistleblowing is the one way you can get to information and provide information to the public.
”
”
David Fisher (The Secret Life of Kim Dotcom: Spies, Lies and the War for the Internet)
“
The Obama administration warned federal employees that materials released by WikiLeaks remained classified—even though they were being published by some of the world’s leading news organizations including the New York Times and the Guardian. Employees were told that accessing the material, whether on WikiLeaks.org or in the New York Times, would amount to a security violation.21 Government agencies such as the Library of Congress, the Commerce Department and the US military blocked access to WikiLeaks materials over their networks. The ban was not limited to the public sector. Employees from the US government warned academic institutions that students hoping to pursue a career in public service should stay clear of material released by WikiLeaks in their research and in their online activity.
”
”
Julian Assange
“
Clinton recognized the challenge for the United States. Over a long lunch with Prime Minister Kevin Rudd of Australia in Washington in March 2009, she asked him for advice on dealing with China. “How do you deal toughly with your banker?” Clinton said, according to a State Department cable released in December 2010 by WikiLeaks. Rudd, describing himself as a “brutal realist on China,” told Clinton that the United States should adopt a policy of “multilateral engagement with bilateral vigor”—a polite way of saying “Make friends with China’s neighbors and get tough on China.” Whether Rudd knew it or not, he was describing the outlines of a policy already taking shape in the State Department. “China badly misread the United States, believing we were in a downward spiraling decline,” said Kurt Campbell, one of the principal architects of that new approach. “On that first trip, they did not treat Obama as well as they should have.
”
”
Mark Landler (Alter Egos: Hillary Clinton, Barack Obama, and the Twilight Struggle Over American Power)
“
There is an uncomfortable willingness among privacy campaigners to discriminate against mass surveillance conducted by the state to the exclusion of similar surveillance conducted for profit by large corporations. Partially, this is a vestigial ethic from the Californian libertarian origins of online pro-privacy campaigning. Partially, it is a symptom of the superior public relations enjoyed by Silicon Valley technology corporations, and the fact that those corporations also provide the bulk of private funding for the flagship digital privacy advocacy groups, leading to a conflict of interest.
At the individual level, many of even the most committed privacy campaigners have an unacknowledged addiction to easy-to-use, privacy-destroying amenities like Gmail, Facebook, and Apple products. As a result, privacy campaigners frequently overlook corporate surveillance abuses. When they do address the abuses of companies like Google, campaigners tend to appeal to the logic of the market, urging companies to make small concessions to user privacy in order to repair their approval ratings. There is the false assumption that market forces ensure that Silicon Valley is a natural government antagonist, and that it wants to be on the public’s side—that profit-driven multinational corporations partake more of the spirit of democracy than government agencies.
Many privacy advocates justify a predominant focus on abuses by the state on the basis that the state enjoys a monopoly on coercive force. For example, Edward Snowden was reported to have said that tech companies do not “put warheads on foreheads.” This view downplays the fact that powerful corporations are part of the nexus of power around the state, and that they enjoy the ability to deploy its coercive power, just as the state often exerts its influence through the agency of powerful corporations. The movement to abolish privacy is twin-horned. Privacy advocates who focus exclusively on one of those horns will find themselves gored on the other.
”
”
Julian Assange (When Google Met Wikileaks)
“
Former acting Director and former Deputy Director of the CIA, Michael Morell has served six presidents—three from each party—and has voted for both Democrats and Republicans. He has kept his politics to himself throughout his thirty-three year intelligence career, until now. He takes a dim view of the entire Russian constellation of “coincidences” that surrounds Donald Trump. We may recall the U.S. intelligence community’s observation that “coincidences take a lot of planning.” The Trump coincidences seemed to bear the hallmarks of the sword and the shield of the FSB.
”
”
Malcolm W. Nance (The Plot to Hack America: How Putin's Cyberspies and WikiLeaks Tried to Steal the 2016 Election)
“
You can have a lot of political “change” in the United States, but will it really change that much? Will it change the amount of money in someone’s bank account? Will it change contracts? Will it void contracts that already exist? And contracts on contracts? And contracts on contracts on contracts? Not really. So I say that free speech in many Western places is free not as a result of liberal circumstances but rather as a result of such intense fiscalization that it doesn’t matter what you say. The dominant elite doesn’t have to be scared of what people think, because a change in political view is not going to change whether they own their company or not; it is not going to change whether they own a piece of land or not. But China is still a political society, although it is rapidly heading toward a fiscalized society. And other societies, like Egypt, are still heavily politicized. Their rulers really do need to be concerned about what people think, so they expend proportionate efforts on controlling freedom of speech.
But I think young people actually innately have fairly good values. Of course it’s a spectrum, but they have fairly good values most of the time and they want to demonstrate them to other people, and you can see this when people first go to university. They become hardened as a result of certain things having a payoff and other things not having a payoff.
”
”
Julian Assange (When Google Met Wikileaks)
“
OBAMA WENT THROUGH STAGES. That first day, I was in multiple meetings where he tried to lift everyone’s spirits. That evening, he interrupted the senior staff meeting in Denis McDonough’s office and gave a version of the speech that I’d now heard three times as we all sat there at the table. He was the only one standing. It was both admirable and heartbreaking watching him take everything in stride, working—still—to lift people’s spirits. When he was done, I spoke first. “It says a lot about you,” I said, “that you’ve spent the whole day trying to buck the rest of us up.” People applauded. Obama looked down. On the Thursday after the election, he had a long, amiable meeting with Trump. It left him somewhat stupefied. Trump had repeatedly steered the conversation back to the size of his rallies, noting that he and Obama could draw big crowds but Hillary couldn’t. He’d expressed openness to Obama’s arguments about healthcare, the Iran deal, immigration. He’d asked for recommendations for staff. He’d praised Obama publicly when the press was there. Afterward, Obama called a few of us up to the Oval Office to recap. “I’m trying to place him,” he said, “in American history.” He told us Trump had been perfectly cordial, but he’d almost taken pride in not being attached to a firm position on anything. “He peddles bullshit. That character has always been a part of the American story,” I said. “You can see it right back to some of the characters in Huckleberry Finn.” Obama chuckled. “Maybe that’s the best we can hope for.” In breaks between meetings in the coming days, he expressed disbelief that the election had been lost. With unemployment at 5 percent. With the economy humming. With the Affordable Care Act working. With graduation rates up. With most of our troops back home. But then again, maybe that’s why Trump could win. People would never have voted for him in a crisis. He kept talking it out, trying on different theories. He chalked it up to multiple car crashes at once. There was the letter from Comey shortly before the election, reopening the investigation into Clinton’s email server. There was the steady release of Podesta emails from Wikileaks through October. There was a rabid right-wing propaganda machine and a mainstream press that gorged on the story of Hillary’s emails, feeding Trump’s narrative of corruption.
”
”
Ben Rhodes (The World As It Is: A Memoir of the Obama White House)
“
Vault 7 --- A series of documents published by WikiLeaks in 2017 that detail the capabilities of the CIA to perform electronic surveillance and cyber warfare. The files, dated from 2013–2016, include
”
”
Dave Hayes (Calm before the Storm (Q Chronicles Book 1))
“
It’s June 2018, and I’m in Washington to testify to the U.S. Congress about Cambridge Analytica, a military contractor and psychological warfare firm where I used to work, and a complex web involving Facebook, Russia, WikiLeaks, the Trump campaign, and the Brexit referendum.
”
”
Christopher Wylie (Mindf*ck: Cambridge Analytica and the Plot to Break America)
“
WikiLeaks revealed that Robert Mueller, as President Obama’s FBI Director, personally delivered a sample of highly enriched uranium to Moscow. Weapons grade uranium is a strategic commodity critical to our national security.
”
”
Mary Fanning (THE HAMMER is the Key to the Coup "The Political Crime of the Century": How Obama, Brennan, Clapper, and the CIA spied on President Trump, General Flynn ... and everyone else)
“
On March 7, 2017, WikiLeaks released CIA Vault 7, a cache of classified CIA documents containing information about the spy agency’s hacking tools. Vault 7
”
”
Mary Fanning (THE HAMMER is the Key to the Coup "The Political Crime of the Century": How Obama, Brennan, Clapper, and the CIA spied on President Trump, General Flynn ... and everyone else)
“
THE HAMMER is the supercomputer system, the hardware, the exploit-throwing system or simply the framework. HAMR is a collection of exploits, applications that work off of the HAMMER framework. Montgomery designed exploits such as WILDTURKEY and MEDUSA that work in conjunction with THE HAMMER. WikiLeaks confirmed the existence of HAMMER in its CIA Vault 7 document drop on March
”
”
Mary Fanning (THE HAMMER is the Key to the Coup "The Political Crime of the Century": How Obama, Brennan, Clapper, and the CIA spied on President Trump, General Flynn ... and everyone else)
“
March 7, 2017, just three days after the tweets from President Trump and The American Report, WikiLeaks dumped CIA
”
”
Mary Fanning (THE HAMMER is the Key to the Coup "The Political Crime of the Century": How Obama, Brennan, Clapper, and the CIA spied on President Trump, General Flynn ... and everyone else)
“
Zin also thinks about what WikiLeaks did historically. This organization had revealed the United States war crimes. There would not have been a revolution unless the dirty secrets of the ruling powers were out in the open for all to see. If war crimes had remained hidden, it would have been plenty more of the same—more oil pipelines on Native lands, more war and killing of innocents, more homeless while the billionaires only got richer, more working people dying without even adequate healthcare and unable to make a living wage.
”
”
Ruth Ann Oskolkoff (Zin)
“
Internally and anonymously funneled through channels like the New York Times and WikiLeaks, many dirty secrets of the CIA had quickly become public knowledge.
”
”
Michael C. Grumley (Mosaic (Breakthrough, #5))
“
The Afghans, the Iraqis, the Yemenis, the Pakistanis, and the Somalis know what American military forces do. They do not need to read WikiLeaks. It is we who remain ignorant. Our terror is delivered daily to the wretched of the earth with industrial weapons. But to us, it is left behind on city and village streets by our missiles, drones, and fighter jets. We do not listen to the wails and shrieks of parents embracing the shattered bodies of their children. We do not see the survivors of air attacks bury their mothers, fathers, brothers, and sisters. We are not conscious of the long night of collective humiliation, repression, and powerlessness that characterizes existence in Israel's occupied territories, Iraq, and Afghanistan. We do not see the boiling anger that war and injustice turn into a cauldron of hate over time. We are not aware of the very natural lust for revenge against those who carry out or symbolize this oppression. We see only the final pyrotechnics of terror, the shocking moment when the rage erupts into an inchoate fury and the murder of innocents. And willfully uninformed, we do not understand our own complicity. We self-righteously condemn the killers as subhuman savages who deserve more of the violence that created them. This is a recipe for endless terror.
”
”
Chris Hedges (Wages of Rebellion: The Moral Imperative of Revolt)
“
Legends of the Ancient Giants As is a common characteristic of ancient myths, Aztec stories of the Quinametzin echo similar stories told in other parts of the world. In Genesis 6:4, its ancient Israeli writers tell us about the Nephilim, a race of giants said to have walked the earth prior to the Great Flood.
”
”
Tom Head (World History 101: From Ancient Mesopotamia and the Viking Conquests to NATO and WikiLeaks, an Essential Primer on World History)
“
The United States of Ancient Persia While ancient Persia could be best understood as an absolute divine right monarchy, in many other respects it better conforms to the values we associate with modern liberal democracies than most of its rivals. The Persian Empire prohibited slavery, allowed women to own property, granted considerable local autonomy to conquered states, prioritized education and trade, and permitted an unprecedented level of religious freedom. In terms of basic human rights it is a far more accurate precursor to modern states than ancient Greece could ever have been.
”
”
Tom Head (World History 101: From Ancient Mesopotamia and the Viking Conquests to NATO and WikiLeaks, an Essential Primer on World History)
“
Athens is probably what you think of when you envision ancient Greece. The Parthenon, Socrates and Plato, most of the well-known works of Greek poetry and plays—all are the legacy of the city-state of Athens. Occupied off and on for the better part of five thousand years, Athens was a world of its own. But when educated Europeans rediscovered Greek political philosophy in the eighteenth century (as we’ll discuss later) they began to see classical Athens as a peaceful utopia. In reality, however, it was neither peaceful nor particularly utopian.
”
”
Tom Head (World History 101: From Ancient Mesopotamia and the Viking Conquests to NATO and WikiLeaks, an Essential Primer on World History)
“
The Arda Viraf (“Viraf the just”), which was probably written during the Sassanid period, tells the story of a devout Zoroastrian who travels to heaven and hell and returns to Earth to report what he found. Several centuries later, Dante Alighieri (1265–1341) would write a similar but much longer work, the Divine Comedy, from a Christian perspective.
”
”
Tom Head (World History 101: From Ancient Mesopotamia and the Viking Conquests to NATO and WikiLeaks, an Essential Primer on World History)
“
Although historians often describe Akhenaten as a monotheist, that wasn’t exactly right; he believed other gods existed. They just didn’t hold a candle to Aten. Aten was something special, something fundamental to the nature of reality itself. This belief in the supremacy of one god over other gods is generally called henotheism
”
”
Tom Head (World History 101: From Ancient Mesopotamia and the Viking Conquests to NATO and WikiLeaks, an Essential Primer on World History)
“
To hear some thinkers of the eighteenth and nineteenth centuries say it, the people of Greece had it all figured out two millennia ago. That’s not even remotely true, but what ancient Greece did accomplish in terms of science, architecture, literature, art, and philosophy is certainly enough to explain why so many people have come away with the impression.
”
”
Tom Head (World History 101: From Ancient Mesopotamia and the Viking Conquests to NATO and WikiLeaks, an Essential Primer on World History)
“
As you may remember from an earlier chapter, in all likelihood we owe the existence of the Hebrew Bible to the oppression of the Babylonians, who forced early Jewish communities to write down their oral histories before they were lost. These communities anxiously awaited a messiah, or rescuer, whom they identified with the Persian emperor Cyrus the Great (ca. 600–530 B.C.E.). This isn’t historical speculation; Isaiah 45 specifically calls Cyrus the messiah and identifies him as the divinely-anointed savior of the Jewish people.
”
”
Tom Head (World History 101: From Ancient Mesopotamia and the Viking Conquests to NATO and WikiLeaks, an Essential Primer on World History)
“
Civilizations never start off as civilizations. Like Sumer, Egypt sprouted from a cluster of river settlements. Sumer had the Tigris and Euphrates, and Egypt had the Nile.
”
”
Tom Head (World History 101: From Ancient Mesopotamia and the Viking Conquests to NATO and WikiLeaks, an Essential Primer on World History)
“
Presently we discovered two or three villages, and the people all came down to the shore, calling out to us, and giving thanks to God. Some brought us water, and others victuals: others seeing that I was not disposed to land, plunged into the sea and swam out to us, and we perceived that they interrogated us if we had come from heaven. An old man came on board my boat; the others, both men and women cried with loud voices—‘Come and see the men who have come from heavens. Bring them victuals and drink.’ There came many of both sexes, every one bringing something, giving thanks to God, prostrating themselves on the earth, and lifting up their hands to heaven . . . I could conquer the whole of them with fifty men, and govern them as I pleased.” —Christopher Columbus, from his journal entry of October 14, 1492
”
”
Tom Head (World History 101: From Ancient Mesopotamia and the Viking Conquests to NATO and WikiLeaks, an Essential Primer on World History)
“
The plunderers of the world, they have laid waste to the land till there is no more left, and now they scour the sea. If a people are rich they are worth robbing, if poor they are worth enslaving; and not the East nor the West can content their greedy maw. They are the only men in all the world whose lust of conquest makes them find in wealth and in poverty equally tempting baits. To robbery, murder, and outrage they give the lying name of government, and where they make a desert they call it peace.” —The native Scottish rebel Galgacus, speaking of the Romans, as quoted by the Roman historian Tacitus (56–120)
”
”
Tom Head (World History 101: From Ancient Mesopotamia and the Viking Conquests to NATO and WikiLeaks, an Essential Primer on World History)
“
But a cursory review of ancient Egyptian literature suggests that the Egyptians of three thousand years ago were already keenly aware of the insubstantial nature of human achievement. These monuments, these tombs, these mummies were not necessarily meant to escape the passage of time but rather to provide future generations with a past they could find, a past whose shadow would loom over them and offer them guidance. As archaeologists continue to study ancient Egypt thousands of years later, the pharaohs continue to guide posterity and provide humanity with permanent symbols of history, in more impressive and far-reaching ways than even they could have planned.
”
”
Tom Head (World History 101: From Ancient Mesopotamia and the Viking Conquests to NATO and WikiLeaks, an Essential Primer on World History)
“
navego por Wikileaks, que no está en activo debido a operaciones de mantenimiento y mejora de la seguridad, y contemplo el careto de Julian Assange, que encabeza todas las páginas como si fuera el gemelo de Jimmy Wales de la Deep Web.
”
”
Lucía Lijtmaer (Quiero los secretos del Pentágono y los quiero ahora: Artivismos, hackers y la cara menos espectacular de la Deep Web (Muckraker 02 nº 4) (Spanish Edition))
“
Underground: Tales of Hacking, Madness and Obsession from the Electronic Frontier—a
”
”
Daniel Domscheit-Berg (Inside WikiLeaks: My Time with Julian Assange at the World's Most Dangerous Website)
“
FREEDOM OF SPEECH HAS A NUMBER. It was the WikiLeaks IP address: 88.80.13.160.
”
”
Daniel Domscheit-Berg (Inside WikiLeaks: My Time with Julian Assange at the World's Most Dangerous Website)
“
Why all this fear and paranoia around Vault 7 and WikiLeaks? Solve the problem by demanding regulation that centers around Security by Design by technology manufactures, problem solved
”
”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology
“
Whether he knew it or not, Trump was the perfect candidate for a political asset. Former KGB officer Yuri Bezmenov said the KGB targeted “Ego-centric people who lack moral principles—who are either too greedy or who suffer from exaggerated self-importance. These are the people the KGB wants and finds easiest to recruit.” This
”
”
Malcolm W. Nance (The Plot to Hack America: How Putin's Cyberspies and WikiLeaks Tried to Steal the 2016 Election)
“
Once is happenstance. Twice is coincidence. Three times is enemy action. —Ian Fleming
”
”
Malcolm W. Nance (The Plot to Hack America: How Putin's Cyberspies and WikiLeaks Tried to Steal the 2016 Election)
“
With that said, Operation LUCKY-7 had its cut-out. The FSB’s Information Warfare Management Cell (IWMC) would create a false flag source to feed Assange the data taken from the DNC and any subsequent hacks through Guccifer 2.0. Assange was desperate to be relevant and the IWMC was going to create a new era where his own hatreds and agenda could be skillfully manipulated by the FSB’s active measures officers, while the cyber teams would keep him well fed. Assange was primed to do LUCKY-7’s bidding and now only needed the data they had stolen. WikiLeaks was now a wholly owned subsidiary of the FSB and essentially the cyber equivalent of a Laundromat, a Russian laundry —ready to clean and give a white appearance to the dirt.
”
”
Malcolm W. Nance (The Plot to Hack America: How Putin's Cyberspies and WikiLeaks Tried to Steal the 2016 Election)
“
Always remember: cyber or kinetic, your adversaries prefer your silence, apathy and inaction. Be the consequence, not the victim.” —ANTHONY COUCHENOUR, HOPLITE CYBER SECURITY T
”
”
Malcolm W. Nance (The Plot to Hack America: How Putin's Cyberspies and WikiLeaks Tried to Steal the 2016 Election)
“
Trump gave the New York Times a wide-ranging interview in which he remarked that he saw a major change for the seventy-year old NATO alliance. He said that if Russia attacked any NATO nation, he would first consult and determine if they had “fulfilled their obligations to us” before coming to their aid.13 Trump set forth a policy of extortion never before heard or seen in American politics:
”
”
Malcolm W. Nance (The Plot to Hack America: How Putin's Cyberspies and WikiLeaks Tried to Steal the 2016 Election)
“
If we cannot be properly reimbursed for the tremendous cost of our military protecting other countries, and in many cases the countries I’m talking about are extremely rich. Then if we cannot make a deal, which I believe we will be able to, and which I would prefer being able to, but if we cannot make a deal, I would like you to say, I would prefer being able to, some people, the one thing they took out of your last story, you know, some people, the fools and the haters, they said, “Oh, Trump doesn’t want to protect you.” I would prefer that we be able to continue, but if we are not going to be reasonably reimbursed for the tremendous cost of protecting these massive nations with tremendous wealth . . .Then yes, I would be absolutely prepared to tell those countries, “Congratulations, you will be defending yourself.”14
”
”
Malcolm W. Nance (The Plot to Hack America: How Putin's Cyberspies and WikiLeaks Tried to Steal the 2016 Election)
“
An example of the extent of the FSB and GRU covert cyber collection and exploitation was the exposure of what was most likely a Russian State Security & Navy Intelligence covert operation to monitor, exploit and hack targets within the central United States from Russian merchant ships equipped with advanced hacking hardware and tools. The US Coast guard boarded the merchant ship SS Chem Hydra and in it they found wireless intercept equipment associated with Russian hacking teams. Apparently the vessel had personnel on board who were tasked to collect intelligence on wireless networks and attempt hackings on regional computer networks in the heartland of America.59
”
”
Malcolm W. Nance (The Plot to Hack America: How Putin's Cyberspies and WikiLeaks Tried to Steal the 2016 Election)
“
All of these were drops in the bucket that could easily have been overlooked, but on August 17, 2016 the London Times released a bombshell report from Ukrainian prosecutors that Manafort had been paid by pro-Russian parties in the Ukraine to organize anti-NATO protests in Crimea, leading to the withdrawal of forces for a planned NATO exercise. The prosecutors wrote,
”
”
Malcolm W. Nance (The Plot to Hack America: How Putin's Cyberspies and WikiLeaks Tried to Steal the 2016 Election)
“
Carter Page joined Trump’s campaign in March 2016. In July 2016, Page went to Moscow and delivered a series of speeches on establishing a better relationship with Russia. His recommendations included easing of economic sanctions imposed after the invasion of Crimea in 2014. As the Trump campaign talks about ending TPP and other trade deals, the unelected candidate’s spokespeople are out inviting business with Russian partners especially in industries that are known to have crime bosses and Russian mafia ties.
”
”
Malcolm W. Nance (The Plot to Hack America: How Putin's Cyberspies and WikiLeaks Tried to Steal the 2016 Election)
“
Senators John McCain and Lindsey Graham were staunch advocates of arming the government of Ukraine in their fight with Russian separatists and Putin. During the Republican National Convention, the party platform committee proposed language to the effect that Ukraine needed U.S. weapons and NATO support to defend itself, in support of a long-held Republican position. Carter Page, now on the Trump campaign team, used to work in the Merrill Lynch’s Moscow office, has personal investments in Gazprom, a Russian state oil conglomerate. He told Bloomberg that his investments have been hurt by the sanctions policy against Russia over Ukraine.39 He has characterized the U.S. policy toward Russia as chattel slavery.
”
”
Malcolm W. Nance (The Plot to Hack America: How Putin's Cyberspies and WikiLeaks Tried to Steal the 2016 Election)
“
Russia is changing Russia’s face and not towards democracy. Karen Dawisha, a Professor at Miami University, told PBS Frontline that “Instead of seeing Russia as a democracy in the process of failing, see it as an authoritarian system that’s in the process of succeeding.”22 Putin is that authoritarian. For him to succeed at the mission of damaging the United States he will use all tools of the Russian statecraft such as forging alliances, but also including blackmail, propaganda, and cyberwarfare. To Putin, the best of all possible worlds would be an economically crippled America, withdrawn from military adventurism and NATO, and with leadership friendly to Russia. Could he make this happen by backing the right horse? As former director of the KGB, now in control of Russia’s economic, intelligence and nuclear arsenal, he could certainly try.
”
”
Malcolm W. Nance (The Plot to Hack America: How Putin's Cyberspies and WikiLeaks Tried to Steal the 2016 Election)
“
To some it may come as a surprise that the KGB considered extremist leftists, communists, and so forth, ill-suited to divulge the secrets the KGB wanted, or to gain the highest levels of government clearance. After the 1950s it was KGB policy to always try to recruit the highest level spies from circles that were unexpected; they specifically targeted Westerners from conservative ideological profiles. Bezmenov said: My KGB instructors specifically made a point. Never border with leftists. Forget about these political prostitutes. Aim higher. Try to get into wide circulation, established conservative media. The rich. Filthy rich movie makers. Intellectuals. So-called academic circles. Cynical egocentric people who can look into your eyes with an angelic expression and tell you a lie.9
”
”
Malcolm W. Nance (The Plot to Hack America: How Putin's Cyberspies and WikiLeaks Tried to Steal the 2016 Election)
“
There are entire professions that justify their existence only in terms of fluency in a self-referential system. A person’s actions might be completely banal in reality, but a description of them using these specialized terms would make them sound like high science. It’s no wonder Julian likes jargon. Jargon is a fraudulent form of significance, in which the person who is speaking automatically seems to know what he’s doing. This
”
”
Daniel Domscheit-Berg (Inside WikiLeaks: My Time with Julian Assange at the World's Most Dangerous Website)
“
Ultimately, of course, it was Julian who made the decisions. The rest of us were too indecisive and skittish or simply lacked the resolve to set any limits for him. Julian thus became the autocratic head of WL, accountable to no one and tolerating no challenges to his authority. This had emerged as a problem when Bradley Manning was arrested, and clearly it was going to be a problem in the weeks to come. The investigations in Sweden would prove to be the wedge that finally broke up our team. Within
”
”
Daniel Domscheit-Berg (Inside WikiLeaks: My Time with Julian Assange at the World's Most Dangerous Website)
“
Julian had his own ideas about how WL should develop. He wanted to release one leak after another, as aggressively as possible, and generate a maximum of conflict. He seemed to have no interest in content or further technological development. Probably he was just not the sort of person who plans for the long-term future. The
”
”
Daniel Domscheit-Berg (Inside WikiLeaks: My Time with Julian Assange at the World's Most Dangerous Website)
“
Every selection process involves a kind of censorship, and every instance of censorship has a political component. It begins with the people involved agreeing to solicit public attention for a certain topic. And no one would deny anymore that WL attracts public attention. Because one person, Julian Assange, held too many of the strings, WikiLeaks became a global political player—something it was never intended to be. That spelled the end of our pledge to maintain strict neutrality—one of WL’s most important principles. At
”
”
Daniel Domscheit-Berg (Inside WikiLeaks: My Time with Julian Assange at the World's Most Dangerous Website)
“
their own. People who do not shy away from critical questions because they’re afraid of being disappointed. Our society needs individuals who are able to distinguish good information from bad and to make good decisions based on that knowledge, instead of relinquishing all personal responsibility to messiahs, leaders, and alpha wolves. I
”
”
Daniel Domscheit-Berg (Inside WikiLeaks: My Time with Julian Assange at the World's Most Dangerous Website)
“
he knows the mind of the wrestling-loving, under-educated, authoritarian-admiring white male populous. This
”
”
Malcolm W. Nance (The Plot to Hack America: How Putin's Cyberspies and WikiLeaks Tried to Steal the 2016 Election)
“
But it would not hurt to have a powerful, rich, American blowhard who could inspire the common man in one’s pocket. This
”
”
Malcolm W. Nance (The Plot to Hack America: How Putin's Cyberspies and WikiLeaks Tried to Steal the 2016 Election)
“
Though we have yet to see an actual disruption that matters in the lives of the average American citizen, one can be sure that it will come at a time when, once recognized, the only alternative to the attack may be a real war.
”
”
Malcolm W. Nance (The Plot to Hack America: How Putin's Cyberspies and WikiLeaks Tried to Steal the 2016 Election)
“
It was well known that Paul Manafort is the lawyer who led what is known as the “Torturer’s Lobby.”4
”
”
Malcolm W. Nance (The Plot to Hack America: How Putin's Cyberspies and WikiLeaks Tried to Steal the 2016 Election)
“
The Chaos Computer Club was an important point of social connection for me, and the space where the club met in Berlin was always one of the first addresses I visited whenever I was in the German capital. How can I describe what I liked about the people there? All of them were complete curmudgeons. Very creative, clever, but somewhat gruff individuals who had no time for superficial social niceties. But what they lacked in grace, they compensated for ten times over in loyalty, once they had accepted you into their ranks.
”
”
Daniel Domscheit-Berg (Inside WikiLeaks: My Time with Julian Assange at the World's Most Dangerous Website)
“
Even back then I thought that his uncompromising judgments and unprompted opinions, which he would simply spit out undiplomatically, would put him at odds with a lot of people. There was so much to plan and discuss. I didn’t ask myself back then whether his behavior was normal or not. I didn’t ask myself whether I could trust Julian or whether he might get me in trouble. On the contrary, I was somewhat flattered that he was interested in working with me. For me, Julian Assange was not only the founder of WL but also the hacker known as Mendax, a member of the International Subversives, one of the greatest hackers in the world, and the coauthor/researcher (with Suelette Dreyfus) of Underground: Tales of Hacking, Madness and Obsession from the Electronic Frontier—a highly respected book among connoisseurs. We hit it off right from the start. He
”
”
Daniel Domscheit-Berg (Inside WikiLeaks: My Time with Julian Assange at the World's Most Dangerous Website)
“
Julian seemed to delight in provoking people as much as possible. He was of the opinion that people liked to get upset. He thought, for instance, that spam was a welcome evil because it gave people an excuse to complain. You were doing them a favor by spamming them. As it happened, he had himself pressed the wrong button on our mailing list at one point so that 350,000 people received repeated e-mails. Our mailing address was put on a number of spam lists, and it wasn’t easy to get off them. Nonetheless, Julian succeeded in putting a positive spin on the mishap by claiming that people were happy when you gave them the chance to get pissed off. Another
”
”
Daniel Domscheit-Berg (Inside WikiLeaks: My Time with Julian Assange at the World's Most Dangerous Website)
“
Looking back, I ask myself whether WikiLeaks itself during my last months there had developed into a kind of religious cult. It had become a system that admitted little internal criticism. Anything that went wrong had to be the fault of something on the outside. The guru was untouchable and beyond question. Any external danger encouraged internal cohesion. Anyone who offered too much criticism was punished by being withdrawn from communication or by being threatened with possible consequences. Moreover, WL participants were only allowed to know as much as was absolutely necessary for them to carry out their appointed tasks. In any case, this much can be said: From reading the Scientology documents, and the philosophy and teachings of L. Ron Hubbard, Julian learned only too well how a cult of personality functions.
”
”
Daniel Domscheit-Berg (Inside WikiLeaks: My Time with Julian Assange at the World's Most Dangerous Website)
“
After being turned away by American banks due to bankruptcies, Trump has been getting considerable investments from Russian sources, including many with known criminal ties. At
”
”
Malcolm W. Nance (The Plot to Hack America: How Putin's Cyberspies and WikiLeaks Tried to Steal the 2016 Election)
“
The New York Times had set a new editorial policy stipulating that anything Trump said needed fact checking. Editorial writer Charles Blow wrote an article suggesting that if you support Trump, you support racism.44 Sure enough, within days the CYBER BEARS hacked the New York Times in what appears to be an attempt to gain information to discredit Blow and others. What it did was reveal that anyone who publically goes against Trump is subject to attack.
”
”
Malcolm W. Nance (The Plot to Hack America: How Putin's Cyberspies and WikiLeaks Tried to Steal the 2016 Election)
“
The Intelligence Professionals Weigh In As the public has come to learn about more cyber-attacks, numerous officials and cyber security experts have weighed in on the possibility of Russian interference on the 2016 election cycle. Numerous intelligence officials, government, and cyber security experts alike, weighed in on possible Russian involvement. They overwhelmingly agreed that though more evidence is needed, the CYBER BEARS paw prints are all over the hacks.
”
”
Malcolm W. Nance (The Plot to Hack America: How Putin's Cyberspies and WikiLeaks Tried to Steal the 2016 Election)
“
President Obama also said “anything’s possible” to NBC, since Russian hackers “on a regular basis, they try to influence elections in Europe.”48
”
”
Malcolm W. Nance (The Plot to Hack America: How Putin's Cyberspies and WikiLeaks Tried to Steal the 2016 Election)
“
Without any question, no matter what side of the aisle one sits on, the simple fact is that the United States was attacked by Russian cyber commandos deployed by Vladimir Putin and organized by his intelligence apparatus, the FSB and GRU. It was a serious act of political warfare.
”
”
Malcolm W. Nance (The Plot to Hack America: How Putin's Cyberspies and WikiLeaks Tried to Steal the 2016 Election)
“
When asked at the Iraq and Afghanistan Veteran’s of America’s Commander-in-Chief’s forum about Putin Trump said “Well, he does have an 82 percent approval rating, according to the different pollsters, who, by the way, some of them are based right here.” Trump continued,
”
”
Malcolm W. Nance (The Plot to Hack America: How Putin's Cyberspies and WikiLeaks Tried to Steal the 2016 Election)
“
Nor are any of the statements or activities of the Trump campaign, no matter how distasteful, the behaviors or actions of clandestine agents of the Russian regime. However, even a cursory glance at the evidence reveals to intelligence professionals that the probability that Vladimir Putin has handled Trump and his associates, doing their bidding without even knowing it, is well within the KGB playbook. These Americans may be not be real agents of the Russian Federation but they may have unwittingly exposed themselves to a massive intelligence manipulation machine that, once involved, may be completely out of their control to extract themselves. The rhetoric election of 2016 reveals that damage has already been done.
”
”
Malcolm W. Nance (The Plot to Hack America: How Putin's Cyberspies and WikiLeaks Tried to Steal the 2016 Election)
“
So what should be secret, then? “Every situation is different,” he (Domscheit-Berg) answers. “Drawing the line is the toughest question in this field.
”
”
Andy Greenberg (This Machine Kills Secrets: How WikiLeakers, Cypherpunks, and Hacktivists Aim to Free the World's Information)
“
With all their variation in goals and means, OpenLeaks, IMMI, BalkanLeaks, GlobaLeaks, and even Jones’s OpenWatch smartphone apps are all stepchildren of a movement that stretches back to the cypherpunks two decades earlier and the Pentagon Papers two decades before that. And with its greatest successes in just the last few of those forty years, its work is only starting.
”
”
Andy Greenberg (This Machine Kills Secrets: How WikiLeakers, Cypherpunks, and Hacktivists Aim to Free the World's Information)
“
The barriers to modern megaleakers like Manning have crumbled: They needn’t spend a year photocopying. They needn’t be Eagle Scouts or war heroes who penetrate the government’s most elite layer only to go rogue—just one of the millions of Americans with access to secret government documents or the many, many uncountable millions more with access to secret corporate information. And perhaps most important, they needn’t risk reprisal by exposing their identities to the journalists they hope will amplify their whistleblowing.
”
”
Andy Greenberg (This Machine Kills Secrets: How WikiLeakers, Cypherpunks, and Hacktivists Aim to Free the World's Information)
“
The forces that caught Manning are real and significant: The greatest vulnerability for any leaker remains his or her human connections. But the lesson of Manning’s story for a generation of digital natives will be, above all else, that he nearly got away with it. Use the right cryptographic tools, keep your mouth shut, and you, too, can anonymously, frictionlessly, eviscerate an entire institution’s information.
”
”
Andy Greenberg (This Machine Kills Secrets: How WikiLeakers, Cypherpunks, and Hacktivists Aim to Free the World's Information)
“
The attempt was even more brazen due to the apparent belief that Putin assumed that he and his oligarchy could charm, groom, and select a candidate, then with the right amount of cybercrime and enough organized propaganda they could actually choose a president of the United States to do their bidding. The
”
”
Malcolm W. Nance (The Plot to Hack America: How Putin's Cyberspies and WikiLeaks Tried to Steal the 2016 Election)
“
This morning Anja handed me a stack of papers. Our very own WikiLeaks!
”
”
Hendrik Groen (The Secret Diary of Hendrik Groen, 83¼ Years Old)
“
In my view, Assange is a hypocrite who deserves to be held accountable for his actions. He claims to be a champion of transparency, but for many years, he’s been helpful to Putin, one of the most repressive and least transparent autocrats in the world. It’s not just that WikiLeaks avoids publishing anything Putin won’t like and instead targets Russia’s adversaries—Assange actually hosted a television show on RT, Putin’s propaganda network, and receives adoring coverage there. And if hypocrisy isn’t bad enough, Assange was charged with rape in Sweden. To avoid facing those charges, he jumped bail and fled to the Ecuadorian embassy in London. After years of waiting, Sweden eventually said it would no longer try to extradite him, but promised that if Assange came back to the country, the investigation could be reopened.
”
”
Hillary Rodham Clinton (What Happened)
“
It has long been a dictum of warfare that forewarned is forearmed.
”
”
Malcolm W. Nance (The Plot to Hack America: How Putin's Cyberspies and WikiLeaks Tried to Steal the 2016 Election)